Welcome Guest ( Log In | Register )

Bump Topic Topic Closed RSS Feed
19 Pages « < 3 4 5 6 7 > » Bottom

Outline · [ Standard ] · Linear+

Unifi WARNING TO ALL UNIFI USERS, Threat warning, read inside

views
     
darkskies
post May 30 2010, 12:23 AM

Look at all my stars!!
*******
Senior Member
2,336 posts

Joined: Nov 2007
From: 特別壱参番対ゴミ人間調査隊大将



Yup it's their death trap to get user into Unifi. After enough users they won't listen to anymore complaints and continue to do like what they do to streamyx users. Somemore it's a 2yrs contract which u must be vary of. The price doesnt sounds cheap when u terminate within 2 years.

Tmnet's greed had turn very ugly recently. Their technology and services still sux then before but their strategy to market their failure products is improving. They know how to avoid complaints and cover up their problems perfectly.

This post has been edited by darkskies: May 30 2010, 12:28 AM
ysc
post May 30 2010, 12:26 AM

Enthusiast
*****
Senior Member
860 posts

Joined: Nov 2008
QUOTE(darkskies @ May 30 2010, 12:23 AM)
Yup it's their death trap to get user into Unifi. After enough users they won't listen to anymore complaints and continue to do like what they do to streamyx users. Somemore it's a 2yrs contract which u must be vary of. The price doesnt sounds cheap when u terminate within 2 years.
*
the contract bandwidth cap thingy was removed after the QQ but i think it'll come back soon

edit- lol typo

This post has been edited by ysc: May 30 2010, 01:48 AM
ciohbu
post May 30 2010, 12:28 AM

Group: Senior Member
*******
Senior Member
2,104 posts

Joined: Oct 2006
QUOTE(darkskies @ May 30 2010, 12:23 AM)
Yup it's their death trap to get user into Unifi. After enough users they won't listen to anymore complaints and continue to do like what they do to streamyx users. Somemore it's a 2yrs contract which u must be vary of. The price doesnt sounds cheap when u terminate within 2 years.
*
the worst thing is u have to pay + u will have high blood pressure dealing with their customer service within this 2 years tongue.gif
andrew9292
post May 30 2010, 12:29 AM

-/Livin' On A Prayer/-
*****
Senior Member
955 posts

Joined: Sep 2008
From: Petaling Jaya


QUOTE
13.1 The Customer shall:-
not use the Service for any unlawful purpose including without limitation for any criminal purposes;
not use the Service to send unsolicited electronic messages or any message which is obscene, threatening or offensive on moral, religious, racial or political grounds to any person including a company or a corporation;
not compromise or infect any systems with computer viruses or otherwise;
not infringe any intellectual property rights of TM, its related companies and subsidiaries or any third party;
not gain unauthorised access to any computer system connected to the Internet or any information regarded as private by any person including a company or corporation;
not share the Service with any person including a company or corporation without the prior written approval of TM and shall use the Service only for the purpose for which it is subscribed;
not resell or sublet the Service to any third parties without prior written consent from TM; and,
not use the Service in any manner, which in the opinion of TM may adversely affect the use of the Service by other Customers or efficiency or security as a whole.


Probably why they put that up ;p

Okay, good job for TS as he found out this major security risk considering the number of IT grads and professionals these days are out there...
But posting this here is actually publicity to this loophole.

Only those who came to LYN would find out about this and if they are tech savvy enough, they will know how to get around it to minimize the exposure risk as much as possible.

But again, if someone with unholy intention stumbles upon this, it could mean disaster for those unaware and incapable to prevent it...

I would like to ask TS, now that you have found out and posted it to public, what is your next step? Will you report to relevant authorities?
Otherwise the purpose of this thread will be:

1. Publicize a major loophole in UniFi
2. Giving knowledgeable users the chance to avoid the risk, a really small amount of people in LYN.
3. Exposing a mass mount of UniFi-ers to exploits...

So, just be aware of that. I'm no IT expert with any qualification btw. TS, u're doing the right thing, salute! but there is still a loophole in what you are doing tongue.gif haha

This post has been edited by andrew9292: May 30 2010, 12:30 AM
darkskies
post May 30 2010, 12:32 AM

Look at all my stars!!
*******
Senior Member
2,336 posts

Joined: Nov 2007
From: 特別壱参番対ゴミ人間調査隊大将



QUOTE(ysc @ May 30 2010, 12:26 AM)
the contract thingy was removed after the QQ but i think it'll come back soon
*
Bandwidth cap lifted but not contract. Check the Term & Condition on the website. They are not stupid enough to lift their contract which is where their bait gonna be.
TSrizvanrp
post May 30 2010, 01:00 AM

Getting Started
Group Icon
Elite
195 posts

Joined: Sep 2006



QUOTE(andrew9292 @ May 30 2010, 12:29 AM)
Probably why they put that up ;p

Okay, good job for TS as he found out this major security risk considering the number of IT grads and professionals these days are out there...
But posting this here is actually publicity to this loophole.

Only those who came to LYN would find out about this and if they are tech savvy enough, they will know how to get around it to minimize the exposure risk as much as possible.

But again, if someone with unholy intention stumbles upon this, it could mean disaster for those unaware and incapable to prevent it...

I would like to ask TS, now that you have found out and posted it to public, what is your next step? Will you report to relevant authorities?
Otherwise the purpose of this thread will be:

1. Publicize a major loophole in UniFi
2. Giving knowledgeable users the chance to avoid the risk, a really small amount of people in LYN.
3. Exposing a mass mount of UniFi-ers to exploits...

So, just be aware of that. I'm no IT expert with any qualification btw. TS, u're doing the right thing, salute! but there is still a loophole in what you are doing  tongue.gif haha
*
I spent some time thinking about it. There were a lot of things I took into consideration..

In the end I feel as though its my duty to notify the community about these things. It's not my job to fix it, it's TM's job. If they had planned this through and allowed for open access to their hardware in the first place, we wouldn't be in this mess. Why even bother putting the PPPoE server on VLAN 500? Why didn't they just not use any tagging in the first place? It wouldn't make a difference to them but it would give their customers tons of new options and better security. It's because they chose to follow this closed method that all these flaws are starting to come out. If I'm not mistaken, I even mentioned on LYN in the first week I got Unifi that there's a telnet daemon on the set top box and SSH daemon on the DIR-615.. and it would only be a matter of time till someone found the keys.

It took me less than 2 months to completely break the system (from the users end). Sure, I have a lot of experience in this field but I'm just a final year network security student and I did this in my free time because I was trying to help people @ LYN. 2 months in however, all these flaws in their system start to get noticed. You hand this system to a professional blackhat hacker and the entire network is going to go down in a week or so.

I know sending a message to LYN isn't exactly sending a message to every Unifi user in Malaysia, there are tons of users (even TM staff) which have their routers exposed at the moment. Eventually however, the word is going to get out. They will either patch their firmware 7.05 and fix it or notify their technicians to not enable these particular features doing install. The best case scenario I can hope for is that they start doing installs with this secondary admin account so people have full control over the hardware and service they're dishing out RM200+ a month for.

And you know, even though this 'fix' blocks WAN access.. I believe the SSH daemon is still running on the LAN subnet. It cannot be turned off without using the secondary admin account and logging into the SSH server using PuTTy or something. Those people who are running Unifi hotspots (aka kopitiam shops) are still vulnerable.

I know some of you are going to hate me with the typical 'why did you let others know' mentality.. but lets be honest here, just because I don't tell you something it doesn't magically make it non-existent okay? I'm not going to release the account details yet and I'm hoping those of you who have also found this account wont either.. and I know that's not a perfect solution but its better than closing both your eyes and pretending there is no problem with the system.
squall0833
post May 30 2010, 01:00 AM

Regular
******
Senior Member
1,473 posts

Joined: Oct 2006
From: Jupiter


this is bad, force to use a device that's not secure than usual device,

biggrin.gif good job rivan, nice find
Moogle Stiltzkin
post May 30 2010, 01:00 AM

Look at all my stars!!
*******
Senior Member
4,455 posts

Joined: Jan 2003
QUOTE(andrew9292 @ May 30 2010, 12:29 AM)
Probably why they put that up ;p

Okay, good job for TS as he found out this major security risk considering the number of IT grads and professionals these days are out there...
But posting this here is actually publicity to this loophole.

Only those who came to LYN would find out about this and if they are tech savvy enough, they will know how to get around it to minimize the exposure risk as much as possible.

But again, if someone with unholy intention stumbles upon this, it could mean disaster for those unaware and incapable to prevent it...

I would like to ask TS, now that you have found out and posted it to public, what is your next step? Will you report to relevant authorities?
Otherwise the purpose of this thread will be:

1. Publicize a major loophole in UniFi
2. Giving knowledgeable users the chance to avoid the risk, a really small amount of people in LYN.
3. Exposing a mass mount of UniFi-ers to exploits...

So, just be aware of that. I'm no IT expert with any qualification btw. TS, u're doing the right thing, salute! but there is still a loophole in what you are doing  tongue.gif haha
*
No no, i think it was right making this public. Maybe this will get into the star and we can pressure tmnut to let their users use their own routers.

If we do have any problem, we would call tmnut helpline 100 and they can send a technician over. No need to expose our security just for that doh.gif


So anyway, anyone working for the newspaper, and please copy paste riv's statement into the news, thx. A good headline would be "TMnut obsession with control leads to security loophole for Unifi consumer and business users alike" rolleyes.gif

This post has been edited by Moogle Stiltzkin: May 30 2010, 01:03 AM
darkskies
post May 30 2010, 01:11 AM

Look at all my stars!!
*******
Senior Member
2,336 posts

Joined: Nov 2007
From: 特別壱参番対ゴミ人間調査隊大将



QUOTE(Moogle Stiltzkin @ May 30 2010, 01:00 AM)
No no, i think it was right making this public. Maybe this will get into the star and we can pressure tmnut to let their users use their own routers.

If we do have any problem, we would call tmnut helpline 100 and they can send a technician over. No need to expose our security just for that  doh.gif
So anyway, anyone working for the newspaper, and please copy paste riv's statement into the news, thx. A good headline would be "TMnut obsession with control leads to security loophole for Unifi consumer and business users alike"  rolleyes.gif
*
It'll nv appear in the news. Everything is controlled. The only way is to discourage users frm signing up for unifi. Money is still the best way to deal with them rather then going on with complaints. If they are still earning money they'll just continue to do what they want. Once their budget is blown they'll learn their lesson.
Neptern
post May 30 2010, 01:16 AM

On my way
****
Junior Member
518 posts

Joined: Aug 2005
Yea keeping quiet won't solve anything.It is better knowing than mati katak for unifi users.Good job.
AZNo.O
post May 30 2010, 01:18 AM

New Member
*
Junior Member
42 posts

Joined: Dec 2009
Thanks rivanvp.
Time to fire up my backtrack.
celicaizpower
post May 30 2010, 01:25 AM

Race : ☐ Malay ☐ Chinese ☐ India ☑ /k/tard
******
Senior Member
1,177 posts

Joined: Jan 2009
From: No 1, Moon of Earth, Milky Way Galaxy, Universe #1



Hi guys,

I think as what @Riz already mention, as a Unifi owner do you think you can SUE TMNUT?

ermmm.. food for thought.
ysc
post May 30 2010, 01:47 AM

Enthusiast
*****
Senior Member
860 posts

Joined: Nov 2008
QUOTE(darkskies @ May 30 2010, 12:32 AM)
Bandwidth cap lifted but not contract. Check the Term & Condition on the website. They are not stupid enough to lift their contract which is where their bait gonna be.
*
lol

i wanted to say bandwidth but didnt notice.. dunno why my hand typed contrct instead
didnt notice till some1 pm me
xbomer
post May 30 2010, 01:47 AM

New Member
*
Newbie
1 posts

Joined: Sep 2008
From: Ipoh


any1 care to explain this thing...im so noob btw
VengenZ
post May 30 2010, 02:59 PM

La la la~
****
Senior Member
608 posts

Joined: Nov 2009
From: 127.0.0.1



QUOTE(xbomer @ May 30 2010, 01:47 AM)
any1 care to explain this thing...im so noob btw
*
Simple, TM can spy ur porn. Rizvan can spy ur porn.(If u r using unifi)
thumbup.gif
almaty
post May 30 2010, 05:57 PM

Enthusiast
*****
Senior Member
944 posts

Joined: Jan 2003
From: does not exist
QUOTE(VengenZ @ May 29 2010, 04:24 PM)
I think their monitoring the usage for the cap limit?
*
firstly, GOOD exposé rizwan!!

@vengenz, they dont need to touch the dir-615 to check usage of cap limit.
eg. your mobile usage for billing telco dont need to touch your phone wink.gif


Added on May 30, 2010, 6:02 pm
QUOTE(night_wolf_in @ May 29 2010, 06:07 PM)
ya. it is management. there is no security issues to worry about. the moment you connected to the internet with your own router/modem with only your account, you are screwed by anyone who wants to screw you.

It is remote mangment of the ROUTER/MODEM. so if someone who is very smart, go play with the settings, then internet doesn't work. they dont have to send a guy to fix it. and dont tell me there are no people who screw their own modem then swear at tmnuts.

this great discovery is not worth the rant. If you think you know better than ISP bout network and security. then do what you want to do. Otherwise, i suggest keeping things the way they are.
*
wahh!! started already. deflect. trivialise. ridicule.


Added on May 30, 2010, 6:37 pm
QUOTE(rizvanrp @ May 29 2010, 09:20 PM)
Sorry I forgot to add this in, Unifi's main VLAN has no caps on it. Every user is capped at the account level only. This means if a 5mbps breaks into a 20mbps users router and takes his user/pass, he will get 20mbps at home. Nice job TM smile.gif

Since you're going to be implementing an account cap, I can't imagine what people would do to get past it  sweat.gif
*
in future...this will be a fav pastime for some. and the unsuspecting user after 3 days. eh?!@ why so slow?!?
call helpdesk...quota used LOL...sorry we cant help you. no proof that you did not use it yourself.




This post has been edited by almaty: May 30 2010, 06:37 PM
eddie_lim
post May 30 2010, 07:12 PM

You Never Walk Alone
Group Icon
Elite
4,024 posts

Joined: Jan 2003
From: In the deepest part of your heart !




They so called CCNP in the whole design of TM network sucks, if they are so call clever, they won't design the whole network layout like this in the first place. enterprise user won't be using their DIR-615 for default router anyway, but double NAT-ed behind DIR-615 is not doing any good with application like FTP except DMZ it; futhermore if the DIR-615 being exploited, they will be a middleman which can run something like SSLstrip, ur maybank2u, pbebank will be monitored without SSL.

night_wolf_in, i do not mean to hurt ur feeling but, get your old school cisco rules knowledge away, go learn some linux and get certified with RHCE instead of CCNP anyway.
TSrizvanrp
post May 30 2010, 08:13 PM

Getting Started
Group Icon
Elite
195 posts

Joined: Sep 2006



I already updated the first page with a FAQ for all those "CCNP"s who are somehow still unaware of the capabilities of embedded systems in the year 2010.
almaty
post May 30 2010, 08:14 PM

Enthusiast
*****
Senior Member
944 posts

Joined: Jan 2003
From: does not exist
really who cares ccna/ccnp. blow a whistle, hundreds/thousands will come.
in constrast, banks/big corps will pay big $$$ to consultants to verify security.

anyway rizwan good on ya. some people would have kept quiet so that they can exploit for their personal gain for as long as possible/forever...

i think tm owes you at least 1 years free subscription wink.gif

eddie_lim
post May 30 2010, 10:41 PM

You Never Walk Alone
Group Icon
Elite
4,024 posts

Joined: Jan 2003
From: In the deepest part of your heart !




Btw, rizvanrp, didn't notice that u have promoted to Elite member, congrats!

19 Pages « < 3 4 5 6 7 > » Top
Topic ClosedOptions
 

Change to:
| Lo-Fi Version
0.0165sec    0.36    6 queries    GZIP Disabled
Time is now: 2nd December 2025 - 09:05 AM