joeypesci Posted September 18, 2011 Share Posted September 18, 2011 Got a 02 Wireless Box II that a friend no longer wanted, to mess about with. Stuck it on my network and am trying to get dumpinfo.py to work. But never used Python before and haven't a clue what I'm doing with it. http://www.ziva-vatra.com/index.php?aid=37&id=U29mdHdhcmU= The script it suppose to display the serial number of the router. I'm wondering if the script no longer works as O2 may have done a firmware fix. I've got python 2.7 installed and tried to run the script from it's commandline but nothing. Appears to do nothing. Any ideas? Quote Link to comment Share on other sites More sharing options...
digip Posted September 19, 2011 Share Posted September 19, 2011 Just load backtrack and try running the script, see what happens. If it doesn't work, chances are the device isn't vulnerable to the attack. looking at the python script, you might be able to mimic this in just a telnet client with a simple get request on the port of the router specified. The string "414e542d534541524348204d4441502f312e310d0a3436" converts to ANT-SEARCH MDAP/1.1 46 in plain text. It looks like it sends this query to port 3235. Opening a telnet session to this port and pasting in the decoded message, might yield the results. So that would be something like the following, similar to an http get request: telnet routersip 3235 ANT-SEARCH MDAP/1.1 46 \r\n \r\n Where routersip is obviously the routers IP address and \r\n is a carriage return, line feed, or hit enter twice on your keyboard and it should send the data. Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.