Premium
Datum registracije: Oct 2010
Lokacija: Kaštel Lukšić
Postovi: 1,564
|
A1 Ubee TVW625
Malo sam se zaigrao sa A1 Ubee TVW625.
Unutra nalazimo sljedeće.
https://i.imgur.com/8SCsl80.jpg
https://i.imgur.com/Bs3RYHa.jpg
Pristup GUIu rutera kao obični korisnik glasi :
username:user
password:zadnjih 8 znamenaka serijskog broja
Postoji i admin user za kojeg neznam točan username a probao sam klasične supervisor i ostale iz Innbox V45 teme a password za tog admina glasi
0915VEzbogVA5
Skeniranjem NPMapom dolazimo do sljedećeg
Code:
Starting Nmap 7.91 ( https://nmap.org ) at 2021-07-14 22:13 Central European Summer Time
NSE: Loaded 153 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 22:13
Completed NSE at 22:13, 0.00s elapsed
Initiating NSE at 22:13
Completed NSE at 22:13, 0.00s elapsed
Initiating NSE at 22:13
Completed NSE at 22:13, 0.00s elapsed
Initiating ARP Ping Scan at 22:13
Scanning 192.168.1.1 [1 port]
Completed ARP Ping Scan at 22:13, 0.03s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 22:13
Completed Parallel DNS resolution of 1 host. at 22:13, 0.00s elapsed
Initiating SYN Stealth Scan at 22:13
Scanning Broadcom.Home (192.168.1.1) [1000 ports]
Discovered open port 139/tcp on 192.168.1.1
Discovered open port 21/tcp on 192.168.1.1
Discovered open port 445/tcp on 192.168.1.1
Discovered open port 80/tcp on 192.168.1.1
Discovered open port 443/tcp on 192.168.1.1
Discovered open port 5060/tcp on 192.168.1.1
Completed SYN Stealth Scan at 22:13, 1.38s elapsed (1000 total ports)
Initiating Service scan at 22:13
Scanning 6 services on Broadcom.Home (192.168.1.1)
Completed Service scan at 22:14, 23.51s elapsed (6 services on 1 host)
Initiating OS detection (try #1) against Broadcom.Home (192.168.1.1)
NSE: Script scanning 192.168.1.1.
Initiating NSE at 22:14
Completed NSE at 22:15, 42.00s elapsed
Initiating NSE at 22:15
Completed NSE at 22:15, 6.54s elapsed
Initiating NSE at 22:15
Completed NSE at 22:15, 0.00s elapsed
Nmap scan report for Broadcom.Home (192.168.1.1)
Host is up (0.0011s latency).
Not shown: 992 closed ports
PORT STATE SERVICE VERSION
21/tcp open pwdgen pwdgen
22/tcp filtered ssh
23/tcp filtered telnet
80/tcp open tcpwrapped
139/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
443/tcp open ssl/http micro_httpd
| ssl-cert: Subject: commonName=Daniel/organizationName=Broadcom/stateOrProvinceName=Califonia/countryName=UA
| Issuer: commonName=Daniel/organizationName=Broadcom/stateOrProvinceName=Califonia/countryName=UA
| Public Key type: rsa
| Public Key bits: 1024
| Signature Algorithm: md5WithRSAEncryption
| Not valid before: 2006-08-07T23:31:21
| Not valid after: 2006-09-06T23:31:21
| MD5: e7d8 e15b 4f7c 236c 630c dbcc 28cc d1bb
|_SHA-1: f919 3349 c450 2020 51f0 c376 d6ee 2c26 2041 af61
445/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
5060/tcp open sip (SIP end point; Status: 404 Not Found)
| fingerprint-strings:
| SIPOptions:
| SIP/2.0 404 Not Found
| From: ;tag=root
| ;tag=dfdbc8-0-13c4-50029-1ea-780810f0-1ea
| Call-ID: 50000
| CSeq: 42 OPTIONS
| Via: SIP/2.0/TCP nm;received=192.168.1.2;branch=foo
| Supported: replaces,100rel,timer
| Accept: application/sdp
| Allow: INVITE,ACK,CANCEL,BYE,OPTIONS,REFER,INFO,NOTIFY,PRACK,MESSAGE
|_ Content-Length: 0
|_sip-methods: INVITE,ACK,CANCEL,BYE,OPTIONS,REFER,INFO,NOTIFY,PRACK,MESSAGE
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port5060-TCP:V=7.91%I=7%D=7/14%Time=60EF4599%P=i686-pc-windows-windows%
SF:r(SIPOptions,15C,"SIP/2\.0\x20404\x20Not\x20Found\r\nFrom:\x20;tag=root\r\nTo:\x20;tag=dfdbc8-0-13c4-50029-1ea-780810f
SF:0-1ea\r\nCall-ID:\x2050000\r\nCSeq:\x2042\x20OPTIONS\r\nVia:\x20SIP/2\.
SF:0/TCP\x20nm;received=192\.168\.1\.2;branch=foo\r\nSupported:\x20replace
SF:s,100rel,timer\r\nAccept:\x20application/sdp\r\nAllow:\x20INVITE,ACK,CA
SF:NCEL,BYE,OPTIONS,REFER,INFO,NOTIFY,PRACK,MESSAGE\r\nContent-Length:\x20
SF:0\r\n\r\n");
MAC Address: 6C:38:A1:81:A1:C4 (Ubee Interactive, Limited)
Device type: general purpose
Running: Linux 2.6.X|3.X
OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3
OS details: Linux 2.6.32 - 3.10
Uptime guess: 0.004 days (since Wed Jul 14 22:09:34 2021)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=258 (Good luck!)
IP ID Sequence Generation: All zeros
Host script results:
|_clock-skew: -18822d20h04m34s
| smb-security-mode:
| account_used: guest
| authentication_level: user
| challenge_response: supported
|_ message_signing: disabled (dangerous, but default)
|_smb2-time: Protocol negotiation failed (SMB2)
TRACEROUTE
HOP RTT ADDRESS
1 1.13 ms Broadcom.Home (192.168.1.1)
NSE: Script Post-scanning.
Initiating NSE at 22:15
Completed NSE at 22:15, 0.00s elapsed
Initiating NSE at 22:15
Completed NSE at 22:15, 0.00s elapsed
Initiating NSE at 22:15
Completed NSE at 22:15, 0.00s elapsed
Read data files from: C:\Program Files (x86)\Nmap
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 75.35 seconds
Raw packets sent: 1025 (45.894KB) | Rcvd: 1021 (41.642KB)
__________________
Pošten trgovac:
1,2,3,
|