Welcome Guest ( Log In | Register )

Bump Topic Topic Closed RSS Feed

Outline · [ Standard ] · Linear+

Unifi Official TM UniFi High Speed Broadbrand Thread V7, News: VIP20, free instalation till 31/12

views
     
rizvanrp
post Oct 10 2010, 01:06 AM

Getting Started
Group Icon
Elite
195 posts

Joined: Sep 2006



Okay.. so I used an old web GUI exploit for the 7.05 firmware to grab the new 'operator' account password for the 7.05b firmware (thank you random 7.05b router on the internet! biggrin.gif). No hardware required. I'll be posting a guide on how to do this soon as it will allow any Unifi user to grab their wifi, PPPoE and operator account password directly from the router without going through TM customer support.

It's an old security exploit I posted here a while ago and it will expose every router that's on the Unifi network with web management enabled to attacks (regardless if they have changed their pass or not) but TM has to learn how to secure shit properly or they're going to keep pushing this crap on us.
rizvanrp
post Oct 10 2010, 01:57 AM

Getting Started
Group Icon
Elite
195 posts

Joined: Sep 2006



QUOTE(cannavaro @ Oct 10 2010, 01:55 AM)
Somewhere in Menara TM....
» Click to show Spoiler - click again to hide... «

*
Ahhahahha

Anyway, here's the guide : http://unifi.athena.my/index.php?option=co...id=56&Itemid=68

Don't bother calling TM for any router password information anymore smile.gif

EDIT : I posted about this config file exploit thing a few months ago. If you left their stupid remote management open, people can just visit http://your.unifi.ip.here:8080/config.bin, grab your config file and decrypt it. No amount of passwords will protect you from this.. you have to just turn the damn thing off which is why it was an extremely stupid idea in the first place to leave it open for 'troubleshooting'.

This post has been edited by rizvanrp: Oct 10 2010, 02:01 AM
rizvanrp
post Oct 10 2010, 05:10 AM

Getting Started
Group Icon
Elite
195 posts

Joined: Sep 2006



QUOTE(myjunk @ Oct 10 2010, 04:55 AM)
thanks to all, I've got my operator password changed. (1 day old unifi user)
speed is quite OK lah (am very happy actually. FB video no need to buffer. etc..etc.. upload speed is good.. 2+MB/s to 4+MB/s from speedtest)

Operator account, 7.05b, i do not see any vlan tagging leh.


Added on October 10, 2010, 5:05 amhmm... my vlan ID is different from the athena's site.. it's 500 and 600 not 500 and 700..

wan 1 = router = 500, VLAN Priority = 1
wan 2 = bridge = 600, VLAN Priority = 5
*
It's correct.. 700 is a random value I chose when you perform the VLAN bridging so it doesn't conflict with any existing VLANs. It's also cool that they've added VLAN priority tagging to the firmware. I guess this was done to improve the IPTV performance. Still a POS firmware which they're not configuring properly IMO
rizvanrp
post Oct 10 2010, 07:51 AM

Getting Started
Group Icon
Elite
195 posts

Joined: Sep 2006



QUOTE(billytong @ Oct 10 2010, 07:23 AM)
I am guessing the new operator password are "unique" now (or a few variants) otherwise you would have just give the password directly.
*
I did give the pass directly, check the router security page where I list the operator passwords.. it's even in the screenshot for the password dumping guide smile.gif At the moment it's 'h566UniFi' and it's the same for all new routers.. "unique" in the sense that they threw in a few numbers and uppercase letters but all routers use the same password. Another diff between 7.05b and 7.05 is that they've reconfigured the tr-069 settings to point to some TM server.

There's no point in them setting a new password now anyway. The config.bin download bypass vulnerability means everyone who has remote management enabled is going to get pwned. If you don't get pwned through the internet, you will get pwned through the LAN (if you're running some kinda public network la). TM never learns and at this point it's pretty obvious that whoever thought it was a brilliant idea to leave remote management enabled should be kept far away from decisions involving the DLINK router.

Out of 5000 IPs I scanned in the Unifi block, 3500+ had remote management enabled. I (or anyone, actually) could physical brick all these routers by pushing corrupted firmware onto them if I wanted to and cause some major trouble for TM. Since the config.bin can be downloaded without logging into the router, I guess it would make more sense to just hit every Unifi IP.. download their config.bin and harvest their Unifi passwords for future use.

I don't even have a 7.05b rev G2 router physically with me and was able to figure this out.. I'm guessing people who don't read Lowyat are screwed as long as TM continues down this path. Since they're forcing the hardware on us, imagine in 5-10 years when Unifi becomes the norm (with people running their TV services and phone lines through the fiber). One click from some guy who hates Malaysia/TM and the entire network goes down for a few days. They had the opportunity the fix all these issues with this new revision and firmware release but they didn't.

The messed up part is that it's hardware which they're placing on your home network which they're locking you out of.. and it has all these vulnerabilities due to backward ass policies they want to implement and it opens your network to attacks. They can just cooperate and tell users the damn password but instead they choose to make it hard and tell you things like 'its confidential'. Even moarrr confidential than the files random people are pulling off your NAS while you're asleep after reconfiguring your port forwarding settings wink.gif
rizvanrp
post Oct 10 2010, 08:23 AM

Getting Started
Group Icon
Elite
195 posts

Joined: Sep 2006



QUOTE(billytong @ Oct 10 2010, 08:14 AM)
Lol h566unifi is actually real password? Initially I tot the h566unifi password is just another random password example that you gave to show everyone how to retrieve their own password. I overestimate TM security.
*
And they underestimate us. I think they assumed that I guessed the password the first time because it was so simple, so they decided to make it more complex. The PS3 can be hacked using a USB based buffer overflow, Apple products can be jailbroken.. yet to TM, the mighty orange TM DIR-615 password cannot be cracked using any form of technology known to man at this point. The person who decided to lock down the router should have his head checked.

This post has been edited by rizvanrp: Oct 10 2010, 08:25 AM
rizvanrp
post Oct 10 2010, 12:33 PM

Getting Started
Group Icon
Elite
195 posts

Joined: Sep 2006



QUOTE(klseet @ Oct 10 2010, 10:31 AM)
If the network is down, they can't connect through remotely; and if the network no problem, why they want to connect for??  doh.gif
Not to mention how lousy built that DIR-615 is, I don't think looking at that 615 remotely can do anything better to either support or trouble-shooting  yawn.gif
*
Exactly, it's totally pointless IMO :3 The security tradeoff is not worth the risk.

Anyway this is my final shot at the config.bin exploit before I go to bed. Spent the last 4 hours working on it (reversing the config.bin packing/unpacking process, coding, bleh..) and realized something silly.. the config.bin isn't even encrypted. It only uses gzip compression with some dummy data thrown in :3 It's a compressed XML file biggrin.gif !

user posted image

Don't even have to use RouterPassView anymore.. I made an unpacker in PHP which neatly displays all the needed info after you upload your config.bin to the site tongue.gif
rizvanrp
post Oct 11 2010, 12:53 PM

Getting Started
Group Icon
Elite
195 posts

Joined: Sep 2006



QUOTE(iv'N @ Oct 11 2010, 12:40 PM)
wah.. if i knew it earlier, i could do without the 250gs!
*
Didn't er 76radius mention this like back in May or something =x? ZTE VDSL2 is the only BTU that can perform port based VLAN tagging on its own AFAIK
rizvanrp
post Oct 11 2010, 05:32 PM

Getting Started
Group Icon
Elite
195 posts

Joined: Sep 2006



QUOTE(gamerfantasy @ Oct 11 2010, 05:17 PM)
Thanks but i already bridge the tmnet router to my own router. Its jz i duno hw configure my router to the fibre unit straight (on the athena website it says to do some vlan tagging beforehand which I dont know whether its do-able in my linksys router) . I know i cant access the iptv but i dont nid it. Oh well, i want to check out the linksys E3000 high performance router but its not available in Mly i guess and i dont want to order online, get it only to realise i dont know how to configure it.  sweat.gif
*
If your linksys which is running dd-wrt rejects the usage of a vlan interface (using eth0.500 as WAN port assignment and the setting reverts), it's probably running on a Broadcom chipset and you won't be able to do a direct fiber <-> router WAN port link with it.

QUOTE(ayamstim @ Oct 11 2010, 04:14 PM)
Found this intriguing post on Slashdot while snaking at work. I wonder when incidents like this will happen in Malaysia...?

"In Australia, Rising VoIP Attacks Mean Huge Bills For Victims"
*
Idk, same user/pass for every BTU.. full access to every dir-615 on the Unifi network due to the config.bin exploit.. and an ISP which is encouraging every user to leave it all open (even to the extent of sending out mass SMSes telling everyone to leave it enabled). You guess lar tongue.gif

This post has been edited by rizvanrp: Oct 11 2010, 05:37 PM
rizvanrp
post Oct 12 2010, 08:22 PM

Getting Started
Group Icon
Elite
195 posts

Joined: Sep 2006



QUOTE(efarhan @ Oct 12 2010, 08:19 PM)
yea..is that bad or good ?? its always been like dat...how ar ?
*
40ms+ is normal if you're on VDSL2 due to interleaving, which is why people recommend getting fiber if possible. The speed is also not 100% symmetrical with VDSL.. in many cases your max upload will be lower than your download.

This post has been edited by rizvanrp: Oct 12 2010, 08:23 PM
rizvanrp
post Oct 12 2010, 08:26 PM

Getting Started
Group Icon
Elite
195 posts

Joined: Sep 2006



QUOTE(efarhan @ Oct 12 2010, 08:23 PM)

Added on October 12, 2010, 8:24 pm

since now my installation is done already...how do i get them to come and install the fiber ?? will there a be a charge ???
*
I don't know if they will willingly reinstall for you. Definitely will be some charge and it really just depends on your location. I think if you're on a low floor of a high rise building you can opt for fiber in some cases but if you're high up definitely not.

The way they've configured their VDSL2 setup means you'll always have 40ms+ latency at minimum whereas its about 1-3ms for fiber users. Ask them lar biggrin.gif
rizvanrp
post Oct 14 2010, 06:33 PM

Getting Started
Group Icon
Elite
195 posts

Joined: Sep 2006



@solarmystic

They've upgraded it to revision G2 now. Those of you who have fried routers will probably be getting a rev G2 unit with firmware 7.05b as a replacement. Hopefully they have a lower failure rate than the previous revision. But it's true that the DIR-615 was a bad choice by TM. Extremely short hardware life + very poorly coded firmware with tons of exploits = epic failure.

@yaofong

Get a Mikrotik RB250GS/RB750 smile.gif
rizvanrp
post Oct 18 2010, 06:14 PM

Getting Started
Group Icon
Elite
195 posts

Joined: Sep 2006



QUOTE(yongkailoon @ Oct 18 2010, 06:08 PM)
So I can terminate my copper line right if that's the case?
*
Yeah but keep one existing copper line as a backup. Unifi VOIP is susceptible to attacks over the network + power failure.
rizvanrp
post Oct 19 2010, 04:51 PM

Getting Started
Group Icon
Elite
195 posts

Joined: Sep 2006



QUOTE(vergas @ Oct 19 2010, 04:38 PM)
Hmmm... so its confirmed that they follow your STB MAC address then... hmm.gif
*
No it's not, lol
rizvanrp
post Oct 21 2010, 06:53 PM

Getting Started
Group Icon
Elite
195 posts

Joined: Sep 2006



QUOTE(joeaggas @ Oct 21 2010, 06:38 PM)
Hi Hi,

My Hyyptv reception has a intermittent hissing spike sound, especially those premium channels. Has anyone experience this before? I suspect is me connecting two TV to the STB, one via HDMI and the other via Video Component cables.

Another thing I just found out, recently I noticed from my router logs, someone tried to telnet into my network. Notice several attempts perhaps he or she using brute force attempt. Therefore, I urge everyone to secure their routers. Below is the screenshot of the log.
[attachmentid=1845823]
*
This is normal traffic for servers with SSH running on TCP port 22. It's usually just a couple of bruteforce attempts on 'root' or some standardized user:pass file which they use. This traffic originates from skiddies or botnet drones looking for easy targets to compromise. Anyway, if you have SSHd running and need it to be accessible from the WAN side for some reason.. be sure to switch its port number to something non standard (over port 1024 would be best).
rizvanrp
post Oct 22 2010, 12:30 AM

Getting Started
Group Icon
Elite
195 posts

Joined: Sep 2006



QUOTE(joeaggas @ Oct 21 2010, 10:46 PM)
Hey Riz,

I've configured the service list to only allow local IP. That should be good enuf I presume?
*
http://www.utorrent.com/testport?port=22

If it says the port is open then your SSHd is still exposed to the WAN side biggrin.gif

QUOTE
The UniFi BIZ10 and BIZ 20 package also have one fixed IP address which will be the identity of the company and will not be shared, a plus for security reasons, Shanti explained.

1) wget http://175.136.2xx.x:8080/config.bin
2) Unpack collected config.bin's using gzip decompression + extract PPPoE user/pass combo
3) Identify username -> company relationships and access LAN as necessary
4) Thanks Unifi remote management! biggrin.gif
rizvanrp
post Oct 22 2010, 08:38 PM

Getting Started
Group Icon
Elite
195 posts

Joined: Sep 2006



QUOTE(rexio @ Oct 22 2010, 07:59 PM)
Hi rizvanrp,

I don't know why are you keep on exposing this hack or whatever "hole" to the public.
If you know there's a "hole", can't you just post to the public saying that please close this and that so that no one won't be able to hack/get into the router? From what I can see is you're teaching people in the public step by step on how to hack other people's unifi router. Do you think every Unifi subscriber will read your post/guide on how to secure their router? Even since Streamyx era many people dont know that other people can get into thier modem/router given by TM.

If you're trying to help others, please post on what to do, not what they shouldn't do.
Even if one of the reader don't bother about this before reading your post, I'm pretty sure most of them will start doing what you've posted here on other people's router.
*
EDIT:

Dear rexio,

You know what.. I posted a long ass reply but I decided to remove it. This is probably going to be the last post from me for a while. I've been here from v1 and like others who already have their network setup nicely (radius, moogle, etc.), there's no real need to post here anymore. There's nothing for me to gain or lose and that was always the case. I've spent countless hours working on this in my free time, never got anything except personal satisfaction out of it and I honestly do not care what people think about me. If you can read and utilize my unifi.athena.my guides to secure your network then turn on me when I talk about the reason those guides exist, there's nothing I can say that will convince you that I mean no harm.

So cya.

This post has been edited by rizvanrp: Oct 22 2010, 09:09 PM
rizvanrp
post Oct 23 2010, 12:27 AM

Getting Started
Group Icon
Elite
195 posts

Joined: Sep 2006



Rexio,

I deleted the post because I wanted to avoid a flame war with you.

QUOTE
Do you think that other ISP in other countries didn't do the same thing for the modem/router password?
What are you expecting? Expecting each of thier internet service installer/technician to have the same attitude(think about customer's security?) and change the password for each of the customer? From what I can see in this forum, most of the subscriber prefer the technician/installer to install the unifi as soon as possible, do you think the technician/installer even bother to help you change the username/password for each of the unifi's subscriver's house, it'll take longer time isn't it? Please do a simple google about other country's ISP(for consumer) default username/password for thier modem/router before you start bashing TM about this.

I'm fully agree with you regarding the ssh, but without the ssh, I still be able to turn on/off/reset your modem/router with just the username/password right?
No, other ISPs give you a router with a single admin account and allow you to change the password at any given time. They do not create a secondary admin account on the router and lock you out of it. They also do not force you to enable remote management from the WAN side or supply you with routers where the firmware itself is not secure. And finally, they do not push PPPoE traffic over a bloody tagged VLAN to basically narrow down your hardware choices to their own custom router.

QUOTE
Please check you previous PM message box, is the "LYN user" refers to me? If its not me, I'm wondering how come on the same day I PMed you about 7.05B firmware's operator password, then suddenly you post it to the public about 7.05B's password?
Did you give any credit to anyone that've helped you on this?

I'm saying this because I felt a bit pissed off when I saw your post without crediting anybody like you're the one who "SUCCESSFULLY" cracked the password without crediting anybody. I've found Router Pass View software with a simple google before I PM you that I've successfully cracked 7.05B password.
I'm sorry about this. I actually totally forgot it was you who PMed me about it because I get tons of PMs per day about Unifi. That's right everybody, rexio was the first to crack the password. He used RouterPassView. That's right guys, he dragged his config.bin into the program and it told him the operator password.

He has mad skills. I could not possibly beat him, even if I disassembled RouterPassView in ollydbg and reverse engineered the decompression routine.

user posted image

Nope, rexio is best rexio and deserves all the credit. smile.gif

You want to know another reason I didn't credit you? It's because I didn't get the bloody password from you. I sent you a second PM 20 minutes before you replied to me and told you NEVERMIND BECAUSE I ALREADY FOUND IT MYSELF. You had a 7.05b sitting in front of your lap, I had to port scan the bloody network, ID a firmware 7.05b unit, extract the config.bin and figure out how to decompress it.

user posted image

I was kind enough to say thank you even though you did not even send me a reply or do anything except inhale oxygen.

QUOTE
Do you think that a good company won't have thier own hardware firewall? Please ask around which big company don't have thier own firewall. Only "junk" company don't have thier own firewall and fully rely on TM's hardware for thier P&C company's documents and informations.


QUOTE
Joke? How about Streamyx? Don't you think you're actually encouraging people to become "people who have the knowledge and intention to do these" when you post about the exploit(download config file, crack using Router Pass view?) to the public? How about improving your guide, no need to download the config file and just go to the router's WAN setup page and click "View Source" on your IE/Firefox menu? Isn't that easier? Ah! Seems like you've found a better solution to crack other people's password and successfully posted it here!


QUOTE
Even linux noob know's about "wget" command right?

No, I'm not asking you to keep quiet about this, please read my previous post about "If you're trying to help others, please post on what to do, not what they shouldn't do.".

Don't you think that you're actually promoting more problem and complains to this thread and forum by posting the guide/tutorial/how-to/how hacker hack your unifi router to the public? Let's say I'm a layman/non-technical person, after reading your post, I'll be like "Wah! Can hack other people's router lah! There, just follow what he said/google a bit what's the step to do port scan or just tembak any unifi IP range on port 80.!" Then after he get the username/password, if he's on VIP5, don't you think he'll try to find a VIP20's username/password, disconnect other people's connection and try thier luck on the username/password that they get? After that, the poor subscriber(the one who've been hacked) will call and complain to TM, complain here, TM sux suddenly disconnect but cannot connect back(because only 1 session is allowed at a time for 1 username, unless TM reset the session).

This exploit, I mean default modem's or router's login/password has been like this since long time ago, since Streamyx era.
You want to know the biggest joke of all rexio?

QUOTE(rexio @ Oct 9 2010, 05:39 PM)
Hi guys!

I've got my Unifi installed today.
Using DIR-615 G2 and able to get the operator password. tongue.gif
*
You're bloody spoonfed. Every single technical thing you knew about the service when you applied for Unifi was because of the effort I put in since March. You come in here, you ask me why I didn't credit you for shit (I honestly forgot it was you), you talk big about Google-ing a bloody program. You tell me not to write guides that assist people in breaking into routers and counter me by saying default combo's are well known since Streamyx days. It's standard for exploit disclosure that you describe why the exploit occurs and provide a proof of concept.

Everyone has been able to break into Unifi routers since I wrote the guide on how to secure it. If you secured your router using my guide, you would know that other router are still accessible using the 'telekom' password so what the f**k do you want from me really?

And you're asking me.. which company doesn't have a firewall? I've done over 10 Unifibiz 10/20mbps installs, how many have you done rexio? What knowledge do you have regarding corporate firewall integration with Unifi from a previous system?

You want credit? Where's my credit for letting you know about the existence of a secondary account in the first place?
rizvanrp
post Oct 23 2010, 12:39 AM

Getting Started
Group Icon
Elite
195 posts

Joined: Sep 2006



QUOTE(rexio @ Oct 23 2010, 12:33 AM)
Please read what I've posted before you start bashing me dude.
I'm just saying the fact. Don't you even use your brain and bother reading what I'm trying to say before you start saying bad words towards me?
I'm not bashing him, I'm just saying from the fact/truth. Read and understand it.
*
Rexio, you obviously cannot use your own brain. You want me to write guides to help people secure their router. I tell them the operator password is 'telekom' or whatever, to log in and untick this and that. You honestly think that the 'bad guys' wont use the same login on other peoples routers? You tell me about Linux noobs.. this is like logic failure if they can't make that connection.

I was angry at you because you want me to practice security through obscurity. Keeping quiet == keeping it safe. That's bloody stupid and is basically what TM is doing. And now I'm just plain pissed because you're demanding credit for something you didn't do. Something you could not have done without my help in the first place. Seriously la, use your head.
rizvanrp
post Oct 23 2010, 01:00 AM

Getting Started
Group Icon
Elite
195 posts

Joined: Sep 2006



QUOTE(rexio @ Oct 23 2010, 12:46 AM)
Ya bro, you're the only one that knows about networking.
Other people don't and they really need you and only you can help them.
Thanks for every effort that you've put for all unifi users.

I'm sorry to cause so much trouble in this thread and I wont be posting anymore. Thanks and sorry.
*
There are many people on this forum who are more knowledgeable than me + I respect. If you scroll back a few threads I had an interesting discussion with someone regarding Unifi VDSL latency vs Unifi FTTH, he's one of them smile.gif That's why I like coming to LYN forums because you have knowledgeable people in almost every field.

I've said it from day one, I'm just here to help people. I pay the server rent for the Unifi dc++ hub so that we have a local p2p network to fall back onto in the event there's some international b/w cap, I write the guides to assist people in getting the best out of the service. I earn RM0/mth from all this and I don't expect people to pay me anyway. I'm a uni student and all of this comes from my allowance and free time.

However, what I cannot stand are assholes. I understand that I've talked about this exploit a lot and my purpose is merely to educate new Unifi users about it so they don't fall prey to other assholes on the Internet. You suddenly decided to confront me like a jerk and accuse me of doing a lot of things, so I treated you likewise. I've never once bragged about what I've accomplished because it's just part of the learning process for me.. but you were just asking for it tonight.

Moral of the story? Don't be a d*ck.

This post has been edited by rizvanrp: Oct 23 2010, 01:02 AM
rizvanrp
post Oct 24 2010, 05:23 AM

Getting Started
Group Icon
Elite
195 posts

Joined: Sep 2006



@ archonixm/billytong

No offense but I don't want to address this issue anymore. I refuse to believe that by writing that wget comment as a joke (in response to the idiotic comment made in that news article) I've somehow compromised the security of routers on the network more than when I disclosed the vulnerability back in May. Infact, I posted a command that would not even work in an actual shell. If you believe that by only posting the current 'operator' passwords you've somehow prevented skiddies from doing what I described, you're absolutely wrong.

That's just how computer security works. It's fair game for both the vendors and the attackers when an exploit is published. The fact remains that TM/DLINK have had months to patch this/change their policy and they have not.

I'm not taking the blame for anything especially after the person who started all this shit basically revealed his butthurt 'I is get no credits for something I didnt do' mentality in his following posts. I'm not saying he didn't have a point, I'm just saying he screwed up his chance to have a mature discussion with me when he revealed that side of himself. I removed my initial post because I knew this is what it would come to but he decided to basically draft a MS Word document using a cached copy just to spite me.

If you have used any of my guides on the athena site, do not expect me to believe that it has never occurred to you an attacker could use that information to break into routers which are not secure. You can link an incomplete 'wget' command to a whole series of possible attacks but stuff like this did not occur to you when you were reading my earlier guides? Let me reiterate here : I posted a full technical guide back in May which contains the master password for all DIR-615 G1 routers so that you can secure your own router (you agreed that this is what I should do).. and you don't think people will use that information to attack other users? Do you now realize why I'm like "OH GOD MY HEAD ASPLODE" over here?

That's honestly why I'm questioning your logic and intentions here. I mentioned this back in May that it was a difficult decision.. but as Moogle put it, I felt the benefits of revealing such information far outweighed the bad (especially in a system where you are forced to use the buggy software/hardware). So I ask, where was all your paranoia then? There wasn't any; some troll just decided to vent his anger at me for not crediting him and you took the bait.

I have never written and published a tool to automate attacks on the Unifi network. I have never even described how to perform the attacks I said were possible on compromised routers (turning them into zombies/open proxies/whatever). Doing that would indeed be unnecessary and not beneficial to anyone. I'm a Unifi user myself and I understand your concerns. However from the security analyst point of view, many of you can't put yourselves in my shoes.

I cannot teach people how to protect themselves if I do not tell them what they're going up against. Do you know how many users ignored my advice to disable the remote management option because TM sent out an SMS 'encouraging' people to re-enable it? They assumed that they were safe simply because they changed the operator password however because I didn't make it a point to tell them that the remote management option was also an attack vector, they left it open as per TM's advice.

But at the end of the day, the sheer hypocrisy of using my knowledge to protect yourself then attacking me for distributing that information in the first place.. frankly just astounds me. Start asking TM why they're allowing such a terrible policy to continue instead of blaming me for exposing all of their problems (to your benefit). You're asking me to do the impossible here for the most trivial of reasons, it's starting to become annoying and I hope you understand that.

I apologize if I offended anyone but that's basically what I'm feeling myself after reading these posts. It feels like I'm shouting at the world because they fail to notice something that is right in front of their eyes.

---

QUOTE(rexio @ Oct 22 2010, 09:45 PM)
Let's say I'm a layman/non-technical person, after reading your post, I'll be like "Wah! Can hack other people's router lah! There, just follow what he said/google a bit what's the step to do port scan or just tembak any unifi IP range on port 80.!" Then after he get the username/password, if he's on VIP5, don't you think he'll try to find a VIP20's username/password, disconnect other people's connection and try thier luck on the username/password that they get? After that, the poor subscriber(the one who've been hacked) will call and complain to TM, complain here, TM sux suddenly disconnect but cannot connect back(because only 1 session is allowed at a time for 1 username, unless TM reset the session).
So using the logic some of you are condemning me with, with this single post alone, rexio has basically :

1) Made it known that Unifi is capped by the account type and there is no physical cap
2) That you will need to disconnect another user in order to use his account as your own
3) Made it clear that the attacker will use the typical Malaysian slang to express his delight in breaking into your router
4) Described in detail that TM will reset the session if you dual log as only one session is allowed at a time

In an attempt to prove a point to me, he has literally written a bloody blueprint here on port scanning the Unifi IP range, breaking into routers, extracting passwords, destroying the victims router and using his details to re-enter the Unifi network. I never described anything about breaking into the routers to increase your speed nor the effects of that in my post. I touched on how an IP address can be re-linked to its original account. I wonder how does rexio know this anyway because his 'layman' sounds pretty experienced *hint hint*.

Most of you who have read every post here from v1-v7 know that nobody has ever posted such an in depth guide like this on 'increasing' your speed. We should TOTALLY add this on the frontpage as rexio's guide to illegally 'upgrading' your Unifi package speed. /s

Seriously, this is why I think all of this is a bloody joke.. and you want to support this moron's cause?

FYI, I've edited this post like 10 times and I'm actually laughing my ass off at 6.30am on a Sunday morning because I just noticed this.

@ Acrisius

TM is constantly adding new IP ranges for Unifi and not all of them have their reverse DNS pointer set yet .. so that's not really a sure fire way to figure out if someone is on Unifi sad.gif

This post has been edited by rizvanrp: Oct 24 2010, 06:44 AM

3 Pages < 1 2 3 >Top
Topic ClosedOptions
 

Change to:
| Lo-Fi Version
0.0487sec    1.15    8 queries    GZIP Disabled
Time is now: 30th November 2025 - 03:31 PM