Hack BSNL

Document Sample
Hack BSNL Powered By Docstoc
					Hacking Bsnl Broadband Accounts
BSNL Broadband users - save yourself!

Disclaimer : The information provided below is for educational purpose
only. The author is not responsible for any misuse of the information and
discourages any illegal use of it.

Bsnl Broadband continues to grow as one the most popular broadband
services in India with high speed facilities of upto 2 mpbs. But a large
number of users of this service are vulnerable to hacker attacks because
discovering and hacking the vulnerable victims of this network is
shockingly simple. If you are a Bsnl Broadband user then immediately
assess the security of your internet connection and take appropriate
steps to secure yourself.

First lets see how simple it is to get bsnl broadband usernames and
passwords. For this you shall need a ipscanner tool called Angry IP
Scanner http://www.angryziber.com/ipscan/ or anything similar.

Ok so lets begin...

Step 1 : Start Angry IP scanner and goto options > ports. Type in 80 in
the first ports textbox and click ok.
Then goto options > options ; in the display section select "only open
ports" and click ok&save.

Now on the main screen put in the ip scan range as something 59.*.0.0 -
59.*.255.255 (for e.g. 59.95.2.3) and click the start button. And the
list that shall follow next are the victims. In this example we choose
the range 59.95.0.0 - 59.95.255.255. You will be surprised at the number
of victims you discover.

Step 2 : Pick the ip-address of any of them and open up your browser and
type in http://59.*.*.* (the * should be replaced by the values from the
ip you are using. A box will popup asking for username and password.
Enter the username : admin and password : admin .There is a high chance
that you will be able to login with that username and password.
admin-admin is the default username and password that is set while
manufacturing the adsl modem devices.


What follows next is the modem administration panel.
Simply search for the "WAN" option and click it. On the next page you
will find the username and password of that user. now right-click on the
page and click view source. in Mozilla/Opera This frame -> view frame
source

Now in the source code search for this : INPUT TYPE="PASSWORD"

and the value field of this input element will have the password


if its not there as in case of D-Link DSL 502T ADSL Routers the search
for this
input type="hidden" name="connection0:pppoe:settings/password"
value="password" id="uiPostPppoePassword"

and the value field will have the password

Well each steps take less than 1 minute so getting username passwords
wont take even 2 minutes and is easier than sending a mail.

And this exposes the weak security of bsnl broadband users.

Well this is not a weakness but more of a mis-configuration which leads
to insecurity. If you understand networking then you would probably
realise that it was merely logging into the remote administration service
of the modem and nothing else. This was not really hacking but a simple
search of victims who are absolutely ignorant of their weak security on
the internet.

Most routers have an option where remote management can be disabled. In
other words, you can only connect to the configuration interface from the
internal network, not the WAN(Internet) side. You would definitely want
to make sure remote management is not active to protect yourself.

Note : On SmartAX MT880 eventhough Remote Management is disabled , it
permits remote logins from over the Internet. So change your mode
administration passwords immediately.



The problem is that the professionals at Bsnl are ignorant of such
simplicity of networking and unable to advise the users or guide them to
take proper security measures leaving their customers and themselves
absolutely unsecure.

Now lets check a few more options related to this issue. A bsnl broadband
modem can be used in two modes. RFC Bridged mode and pppoe mode.

In the RFC Bridged mode the device behaves like a modem device that is
attached to your computer and you use some dialup software to dial into
the isp through this modem.This is PPPOE from the PC and the adsl device
is a good modem. This mode is safer as the username password are on your
pc and nothing is on the mode.

In the PPPOE mode the adsl device becomes a router - a distinct network
device with many features enabled. In this mode the username password is
stored in the modem which will dial to the isp and establish the internet
connectivity. The computers will just connect to this router who would be
their primary gateway. Now this is the mode where the risk exists.

If remote administration is enabled the remote   users from the internet
can login to this modems administration panel.   Now the main problem is
the default admin username-password which most   users dont change due to
ignorance. "admin-admin" is pair that works in   most cases giving you full
access to the modems internals. What follows next is simple as drinking a
glass of orange juice.

Many users install firewalls and think they are safe, but they fail to
understand that the firewall protects their PC not the "router" since the
topology is like

(PC) -> router -> internet

So how should you secure yourself ?

1. Use RFC Bridged mode if it is sufficient for you.

2. Change the default admin password of your modem.

3. Disable wan ping reply . ( this will prevent the hackers from directly
discovering your pc when it is on the internet)

4. Disable remote configuration feature.

5. Check your broadband usage on a regular basis and compare it with your
own surfing schedules to check whether someone else has used it or not.
If suspiscious usage is indicated then immediately change your bband
password as well. Or a better suggestion will be to change broadband
passwords on a regular basis.

Try to spread the security awareness to your friends and other relatives
who are using Bsnl broadband and encourage them to secure their internet
connectivity.

				
DOCUMENT INFO
Shared By:
Categories:
Tags:
Stats:
views:15
posted:10/15/2011
language:English
pages:3