Dear rizvanrp,I'm doing this because it's not a new security problem. It's been around since April and TM has not done anything about it except blindly trust their own firmware. It's like having a huge, well known Windows RPC exploit and Microsoft not doing anything for half a year. When it came out in the newspapers, what did TM do? They said they would 'fix' it. All they ended up doing was changing the password to something more complex, ignoring the possibility that their firmware itself could be vulnerable to attacks. If they had only listened and practiced some basic security measures, we would not have any of these problems. If they had been open about how their system works from the beginning and not try to lock us down into their shitty hardware, this Unifi thread would be about 2 maybe 3 topics long with only people talking about service coverage. I would not even have to run a website on how to basically
break into the hardware you own because your ISP has decided to lock you out.I'm fully agree with the bolded sentence.We're talking about Malaysia's next generation, billion ringgit broadband network here and it's plagued by the most basic security problems. There's a huge difference between TMs stock Streamyx routers with their 512kbps uplinks and a Linux router which manages 10-40x that amount of bandwidth. I'm not even getting started on the security of their BTUs.. but imagine a single user being able to take out our IPTV, VOIP and Internet infrastructure with a single click in the future because your ISP decided not to change the default password.
Do you think that other ISP in other countries didn't do the same thing for the modem/router password?
What are you expecting? Expecting each of thier internet service installer/technician to have the same attitude(think about customer's security?) and change the password for each of the customer? From what I can see in this forum, most of the subscriber prefer the technician/installer to install the unifi as soon as possible, do you think the technician/installer even bother to help you change the username/password for each of the unifi's subscriver's house, it'll take longer time isn't it? Please do a simple google about other country's ISP(for consumer) default username/password for thier modem/router before you start bashing TM about this.I'm fully agree with you regarding the ssh, but without the ssh, I still be able to turn on/off/reset your modem/router with just the username/password right?
I didn't give ANYONE a step by step guide on how to break into the router remotely. Infact, a LYN user was the one who cracked the newer 7.05b firmware operator password before me because he had the software to decompress the config.bin files and full access to a physical 7.05b unit. A person with basic computing skills would be able to piece things together and realize that if :
1) You have a method to grab a config.bin without authentication
2) You have a method to decode said config.bin
.. there's obviously a major security exploit here. And can you imagine, they want companies to associate this piece of junk with their identity? That's batshit insane.
Please check you previous PM message box, is the "LYN user" refers to me? If its not me, I'm wondering how come on the same day I PMed you about 7.05B firmware's operator password, then suddenly you post it to the public about 7.05B's password?
Did you give any credit to anyone that've helped you on this?
I'm saying this because I felt a bit pissed off when I saw your post without crediting anybody like you're the one who "SUCCESSFULLY" cracked the password without crediting anybody. I've found Router Pass View software with a simple google before I PM you that I've successfully cracked 7.05B password.
Do you think that a good company won't have thier own hardware firewall? Please ask around which big company don't have thier own firewall. Only "junk" company don't have thier own firewall and fully rely on TM's hardware for thier P&C company's documents and informations.
What you quoted was written
as a joke by me and
isn't in any way a technical guide on how to pull off the attack. The people who have the knowledge and intention to do these things would have done it back in April when this exploit was out. I was actually contacted by some of them and told not to release the information because they wanted to use it to harvest information once the network was more mature. I made a difficult decision to notify everyone that TMs hardware implementation was flawed.
Joke? How about Streamyx? Don't you think you're actually encouraging people to become "people who have the knowledge and intention to do these" when you post about the exploit(download config file, crack using Router Pass view?) to the public? How about improving your guide, no need to download the config file and just go to the router's WAN setup page and click "View Source" on your IE/Firefox menu? Isn't that easier? Ah! Seems like you've found a better solution to crack other people's password and successfully posted it here!I could release a guide on how to uncap your line, watch IPTV channels you're not subscribed to, break into BTUs, etc. but I haven't. I've only hinted that this is possible and I'm expecting TM to fix this shit on their own. I cannot however, ignore such a stupid decision on TMs part to open up your router to the entire web while forcing you to use it.
If I'm not wrong its a common practice by most of ISP out there, don't talk about enterprise package(for sure the service is excellent, but how much did they need to pay?) by other ISP.So do you think its better I keep quiet about all the exploits I find, wait till the Unifi user base grows to 6 digits+ and let every individual and corporation be raped in single click.. or force TM to stop pulling these kind of stunts while we're at the 15,000 user mark? Your decision.
QUOTE(rizvanrp @ Oct 22 2010, 12:30 AM)
http://www.utorrent.com/testport?port=22If it says the port is open then your SSHd is still exposed to the WAN side

1) wget
http://175.136.2xx.x:8080/config.bin2) Unpack collected config.bin's using gzip decompression + extract PPPoE user/pass combo
3) Identify username -> company relationships and access LAN as necessary
4) Thanks Unifi remote management!

http://forum.lowyat.net/index.php?showtopic=1439287&hl=
Even linux noob know's about "wget" command right?
No, I'm not asking you to keep quiet about this, please read my previous post about "If you're trying to help others, please post on what to do, not what they shouldn't do.".
Don't you think that you're actually promoting more problem and complains to this thread and forum by posting the guide/tutorial/how-to/how hacker hack your unifi router to the public? Let's say I'm a layman/non-technical person, after reading your post, I'll be like "Wah! Can hack other people's router lah! There, just follow what he said/google a bit what's the step to do port scan or just tembak any unifi IP range on port 80.!" Then after he get the username/password, if he's on VIP5, don't you think he'll try to find a VIP20's username/password, disconnect other people's connection and try thier luck on the username/password that they get? After that, the poor subscriber(the one who've been hacked) will call and complain to TM, complain here, TM sux suddenly disconnect but cannot connect back(because only 1 session is allowed at a time for 1 username, unless TM reset the session).
This exploit, I mean default modem's or router's login/password has been like this since long time ago, since Streamyx era.Think wisely bro.
Cheers
Added on October 22, 2010, 9:54 pmQUOTE(rizvanrp @ Oct 22 2010, 08:38 PM)
EDIT:
Dear rexio,
You know what.. I posted a long ass reply but I decided to remove it. This is probably going to be the last post from me for a while. I've been here from v1 and like others who already have their network setup nicely (radius, moogle, etc.), there's no real need to post here anymore. There's nothing for me to gain or lose and that was always the case. I've spent countless hours working on this in my free time, never got anything except personal satisfaction out of it and I honestly do not care what people think about me. If you can read and utilize my unifi.athena.my guides to secure your network then turn on me when I talk about the reason those guides exist, there's nothing I can say that will convince you that I mean no harm.
So cya.
Why did you delete/fully edit the original post?
Cya.
This post has been edited by rexio: Oct 22 2010, 09:54 PM