Skip to main content

Hacking ISP Subscribers For Fun and Profit

This post is about how I could hack my ISP subscribers to get free Internet so if you are not interested then you can get back to your work :)

*Let's start*

From last few days I have been participating in bug bounty programs but I got bored and tired of testing web applications so I decided to leave bug hunting for a while and started to play with my router's configurations then I saw a option named "Remote Web Management".  It allows users to access and manage their router from Internet.




I was wondered why do we even need this feature?
And what is it's use since IP addresses are assigned dynamically (unless you are rich enough to get a static IP address)?

So I thought there could be some router's which may have this option enabled by default and also there's a chance that one would enable this option unknowingly or knowingly (static IP address people ,remember ?).

And fortunately some thug people don't even bother to change their default password of router web interface and some router don't even provide an option to change the password of web interface.  #ultra_thug_life


So I thought to look for such routers in my ISP network.





I have DSL Broadband Internet connection so each user is provided with a username and password to connect to Internet via PPPOE .

And the server only checks MAC address, username and password before establishing the connection. In other words if you can get users MAC, username and password you can login to their PPPOE account to connect to Internet.

So first thing I did was I went to my router's status page and checked the internet connection information



Ok! Here WAN IP address is 172.x.x.10 which was a public IP address (class B).
So we can now conclude that after successful authentication, ISP is allowing my router to establish P2P connection to IP 172.x.x.10.

In short ISP is assigning my router a public IP address 172.x.x.10 which can be accessed over Internet and that means anyone can access my router over Internet by IP address 172.x.x.10 if I enabled remote web management feature.


Now next thing I had to do is find out IP addresses block range owned by my ISP.

So our old friend "whois" is agreed to help me with it.







According to "whois" my ISP owns Ip addresses block range 172.x.x.0-172.x.x.255 .

Now next thing that I need to do is to find out all IP addresses in this range having 80 and 8080 open port.

This time our old friend "nmap" is agreed to help me with it.






Note : I just scanned small range of IP address from ISP range to get results faster , you can scan whole range of IP owned by ISP to get more results


Here I got 3 IP addresses with open ports 80 and 8080

 So I opened all IP addresses in browser :

http://172.x.x.84:8080
http://172.x.x.129
http://127.x.x.228

One of them was Surveillance Camera, one showed just a blank html page and one was a Router - http://172.x.x.84:8080

It was a Linksys Router , I tried my luck with very hard to guess password "admin" and you guessed it right. I was in.

Always remember "admin":"admin" and "admin":BLANK PASSWORD never fails in such situations.


Now what?

Obviously I went to status page of that router and copied the MAC address and PPPOE credentials (username and password) .

Then I simply put those information into my router and I got connection to internet ;)
I did speed test to check the speed :


Note : If a user is already connected to Internet then you can't use their credential to connect to Internet. You can't establish two connections using single account.



Conclusion:

-Think before you enable "Remote Web Management" feature in your router
-Always change default password of your router
-Never assign same passwords to all users  (for ISP)


Thanks



Comments

Post a Comment

Popular posts from this blog

Xssing Web Part - 1

Xssing Web Part - 1 Hello, I'm thinking about sharing everything I know about XSS :) However it's not possible to put all methods in one single post so I would be making several parts of "Xssing Web". Mostly I would be talking about how to bypass XSS filters and how to turn most of non exploitable XSS to exploitable. All of you might have encountered one such end point that takes URL as parameter and redirects to it using javascript like : location.href='URL'  or window.location.href='URL'  or window.location.replace('URL')  or window.location='URL' In this post I would be talking about how to get XSS in such situations and how to bypass their filters. First thing we can do here is try ' javascript ' protocol or ' data ' URI scheme. window.location='javascript:alert(1)' or window.location='data:html;base64,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg' It would execute 'aler...

Xssing Web Part - 2

Xssing Web With Unicodes Hello friends,  This is the second part of "Xssing Web". In this post I would show how to abuse unicodes to bypass XSS filters.  BTW if you want to check previous part click here . Note : If you think there are any mistakes in this post then kindly mention it in comments. I have developed several XSS challenges to show how unicodes can be used to bypass filters. If you want to try those challenges first then click here , get back here if you couldn't solve any. Abusing Unicode : So what is Unicode? -> Unicode is nothing but the encoding standard. It  defines  UTF-8 ,  UTF-16 , UTF-32 , etc encodings. 1) UTF-8 : Characters Size : 1 byte to 4 byte Example : Character "A" => 0x41 Character "¡"  => 0xC2 0xA1 Character "ಓ" => 0xE0 0xB2 0x93 Character "𪨶" => 0xF0 0xAA 0xA8 0xB6 2) UTF-16 : Character Size : 2 byte However in UTF-16 there are two...

Controlling Raspberry Pi B/B+ from your smartphone (Tutorial)

In this tutorial I'll tell you how to control your raspberry pi from your smartphone. So follow below tutorial and say good bye to monitor,keyboard and mouse. Requirements: 1)Raspberry Pi 2)Wi-Fi adapter 3)Smartphone with Wi-Fi Hotspot feature (I would be using Android in this tutorial) Tutorial:- Step 1) First install Raspbian OS in SD card and connect SD card to your PC Step 2) Raspberry Pi Configuration  : -Open SD card using file manager as shown in this SS:-   -Now press Ctrl+L and copy the location as show in this SS:- -Now open terminal and change directory to SD card location like this :-        cd /media/c1398422-7a7c-4863-8a8f-45a1db26b4f2 -Now run below commands  :- Command 1: sudo echo " auto wlan0 iface lo inet loopback iface eth0 inet dhcp iface default inet dhcp iface wlan0 inet dhcp allow-hotplug wlan0 wpa-conf /etc/wpa_supplicant/wpa_supplicant.conf">etc/network/...