What's new

Closed Smartbro mac sniping manual hunt using cmd and angry ip [08/2/2k14]

Status
Not open for further replies.
anjan napo ang mga tutorial wag nalang ikalat pa
wait nalang sa update po sir
abang ka ng update baka sa isang linggo pa update nito pero ma vbs cripf naman na jan para makakuha kayo ng cert. ang prvte kêy sa mac na ma scan nyo
mga sir paturo po plz...
 
Last edited by a moderator:
pano boss pag nag upgrade o nag downgrade ka pwede pa ba to?
Cnxa na po di ako naka pag back read! Thanks po!
 
UPDATE MAC SNIPING

As of June 26, 2014 the PLDT/Smart Telco 4G wireless Internet Service Provider made its first clearing operation on its network and wireless system to eliminate the country's number one rampant in cloning the 4G wireless broadband CPEs. According to this forum the usual MAC address base authentication of the SMART myBRO 4G wireless modem is no long effective as of the said date, this is because the AAA is already been implemented such as the Device Certificate + Private kêy + MAC address, if this three is not much on your Green Packet device such as DV235T and OX230 then you will no longer be welcome to the network. In short you will be denied to access to the Smart 4G Base Station, there's no way for you to use even the proxy server to bypass their portal.


Here's simple step on how to retrieve your myBRO 4G wireless broadband modem device certificate, private kêy and the mac address either via telnet or ssh make sure to enable port 23 or 22 to be able to get this terminal open.

Once you are login to the
command line interface (cli) e.g. telnet or ssh, just type this following command respectively.


cd /etc
M7NjmpF.png

The ls /etc command is to view the list directory of the /etc now you will be able to see the filename wmx_client_ca.pem this is the device certificate and the wmx_priv_key.kêy filename is the private kêy.


cat wmx_client_ca.pem
MnZZ1WZ.png

cat wmx_priv_key.kêy

niXaQRj.png

After you have viewed the device certificate and the private kêy in plain text, you can copy paste this to notepad and save it as wmx_client_ca.pem, wmx_priv_key.kêy filename respectively. Now you already successfully retrieved your myBRO device certificate likewise the private kêy.


Additionally, the next command is if you wanted to retrieve your myBRO 4G wireless broadband WAN MAC address just type this command and you will prompted your device WAN MAC.


sncfg get WAN_MAC
76aTg12.png

have included this extra screenshot because of some myBRO 4G Wireless broadband CPEs their device certificate and private kêy are hidden, just like on this screen. The Green Packet equipment which Chipset is MediaTek is embedded with Linux OS and therefore it is equip with tiny all in one Busybox you can use the tool to unhide the device certificate and the private kêy.

PARA NAMAN DI KA MAHIRAPAN dôwnlôad MO NALANG YUNG TUTORIAL NASA ATTACH MENT PO..
Download ko sir for future porpuses, samamat.
 

Attachments

balita dito? may nakapag unhide naba ng mga certificates sa pem and key? may tool or script ba para makita ung wmc_client.pem sa mga telnet ...
 
tanx for sharing bro more power to you......
thank you very much for sharing
 
thank you very much for sharing
 
Last edited by a moderator:
alam ko na pasukin yung Busybox na yan kaso diko makita parin si pem at key.. lahat ng laman ni #ls nakita at napasok ko still searching
 
sana di yan magamit sa panluluko ng kapwa mga master...di katulad ng nasa unang comment..comsatkid man luluko yan....wag kau manilawa sa taong yan...
sir enge nga po tut, para mareconnect ko ung dv ko sa new updates ng smart. newbie lang po kasi ako..
sana di yan magamit sa panluluko ng kapwa mga master...di katulad ng nasa unang comment..comsatkid man luluko yan....wag kau manilawa sa taong yan...
 
Last edited by a moderator:
nagbebenta sya ng mac 500php daw 15macs... malay ko kung 22o or baka yung 15macs na yun gamit na ng iba sa ibat ibang area.. kung baga pokpok na kaya alanganin..
nagbebenta sya 500php 15mac daw.. alanganin nga din ako e...
 
Last edited by a moderator:
guys meron ako scan sa angry ip den tru cmd ... ask ko lang kung pede po cia gamitin dko po pa na try..den kung me gusto mag try pm lan ako a send ko sau..pero sana mag feedback kung working ...SMARt
You do not have permission to view the full content of this post. Log in or register now.
 
di mo yan ma gagamit.. hindi po yan yun dapat mong kunin.. yung wmx_client_ca.pem po talaga dapat pero yung mga .pem na mkikita mo lng sa #ls di mo yan magagamit
 
ginamitan ko pa cia ng " # cat wmx_client_ca.pem" inalis ko lang don sa notepad... pero bakit prang me key na nakasulat...e nung linagay ko # cat wmx_priv_key.key <--- ala cia makita na key nya..idol eto po ung lumalabas
# cat /etc/wmx_priv_key.key
cat: can't open '/etc/wmx_priv_key.key': No such file or directory....so ang tanung ko po ung key na ksali don nak circle lan...
 
medjo diko gets sinasabi mo boss.. pero explain ko po sainyo kung ano po yan,,,yung # cat meaning ipapakita nya yung loob ni file 2lad nyan...

# cat wmx_client_ca.pem

bubuksan nya laman nya in a text format..dahil file sya.. yung # cd yan yung directory napipiliin mo... yung #ls yan yung magpapakita ng list of directory sa loob ni # cd...

#cd
#cd /etc or #cd etc = pinili mo si etc na directory
#ls = pinakita nya laman ni etc

pag si wmx_priv_key.kêy at wmx_client_ca.pem ay hindi lumitaw sa #ls ganito lilitaw

# cat /etc/wmx_priv_key.kêy
cat: can't open '/etc/wmx_priv_key.kêy': No such file or directory

meaning nakatago sila.. or naka hide.. yan po yung ginagawan ko ng paraan kung nasaan sila papano sila iuunhide papasila ilalabas.. kasi nabubuksan ko lahat ng directory list ni #cd etc... pero yung mga directory na yon sa loob din nila wala sila wmx_priv_key.kêy at wmx_client_ca.pem... yun ang sinosolve ko papano iunhide.. pero still meron parin pong mga ibang modems na pag nag telnet ka e nakalitaw sila,, base sa observations ko po.. yung mga tulad po natin na nag ssnipe like mybro modem tayo tapos dv235t FW tayo tapos diba nag papalit tayo ng FW ng dv natin.. kadalasan ginagamit sa mga ganyan e si mybro.. talino dapat yung FW pero pag open mo si globo pala.. sila kadalasan yung nakikitaan mo ng wmx_priv_key.kêy at wmx_client_ca.pem sa telnet kasi sinasalpak natin sila.. base sa observation ko kasi ox230 FW ko ginamitan ko ng telnet nakalitaw yung wmx_priv_key.kêy at wmx_client_ca.pem ko.. pero pag sina legit ayun wala.. diko makitaan.. kahit naka open pa telnet at ssh nila kahit http pa.. parang lumilitaw na kapwa natin ang makukuhanan natin ng wmx_priv_key.kêy at wmx_client_ca.pem so sa 3days kong pag aangry ip e naka isa palang ako at nung binuksan ko sya admin/admin user at pass nya meaning baka tulad natin sya... correct me if im wrong sa mga veterans dito,, dagdag info ko po yan para sa mga may alam...
 
ask lang newbie po kac ako idol...salamat din sa pag clear... saka sanay po ay matuklasan mu po kung pnu i unhide..pra ma ishare samin na dpa nkaka alam...
 
Last edited:
Status
Not open for further replies.
Back
Top