Jump to content

how to hack wireless router web interface


eternaltruth
 Share

Recommended Posts

1. Try the default password. Often people don't change the password.
2. Try other common passwords. Often people pick really terrible or obvious passwords.

3. Brute-force the login page. Most router web interfaces have very weak protections against brute-force login attacks.

Edit:
4. Bypass the router by replacing it with a new one, or just plugging a new one in to an unfiltered LAN port and using that to provide unfiltered WiFi.

Edited by Sitwon
Link to comment
Share on other sites

There is no need to start bruteforcing yet....have you checked for vulnerabilities for that model/version/firmware? I mean....accepting unauthenticated commands, password disclosure, etc...Before I go too far into this, why are you trying to get onto a network with mac address filtering? And why don't you want to reset it?

Link to comment
Share on other sites

Then he should have the password, or be able to compel the person managing it to make the change. Or just do the reset button as previously mentioned.

There is one other way, but it would include taking apart the router, mapping the Serial TTL taps, soldering up some wires, and getting the password from NVRAM.

Link to comment
Share on other sites

  • 4 weeks later...

If this Troll is repeatedly going in and configuring mac filtering following each reset. I assume they are the only ones that have the administration password for some reason. Or, are able to break in each time themselves. (Following resets the default administration password is being changed to a complex one right?)

Failing the above, you could leave airodump-ng running on a device close to the AP on the same channel and with the bssid options set and write it to troll.cap. Then as soon as the filtering is re-enabled you should have captured whatever the troll does, and any other passwords they have used.

They it's just a case of looking through the file in wires hark to find the http login info for the Web interface of the router.

Peace.

Link to comment
Share on other sites

  • 1 month later...

1. If you know the mac address that is being filtered just spoof your mac to that address.

2. If you do not know the address try using mdk3 f to brute force the mac(even author says it only works on some routers)

3. Monitor the AP with airodump-ng and see what mac has access then spoof your mac to that address

4. Try loging onto the router with the default password.

5 If the router is TP-Link there may be a rom-0 backdoor. Go to kali linux forums search TP-LINK routers the thread and how is there..

6. Brute force the user/password pair with hydra

If you get to many false positives then

5. Use Burpsuite. Try and find the pro version.

Link to comment
Share on other sites

  • 2 months later...

Please thanks for this post. may God bless you.

my problem is that if someone is able to login to the routers admin control panel remotely can that person who has no physical access nor no wireless link to the router use the internet from the router remotely?

Please if possible, by what means. Thanks for your respose.

Link to comment
Share on other sites

Please thanks for this post. may God bless you.

my problem is that if someone is able to login to the routers admin control panel remotely can that person who has no physical access nor no wireless link to the router use the internet from the router remotely?

Please if possible, by what means. Thanks for your respose.

way to bring a thread back from the dead...(looks at calender, Walking Dead new season was past Sunday? Needs to go find episode..)

If the router is setup properly, remote administration should be disabled. That said, many routers ship with administration enabled for both lan and wan, which if they didn't change the password, there are plenty of default router password sites that would allow someone to try and login remotely. If remote login is disabled, then a DNS rebinding attack or some other manner of attack would need to be done to get a user behind the router to click a malicious link, giving you access inside their network. In any case, without permission, logging into a router you don't own is more than likely breaking the law depending on where you live, but yes, it can be done, depending on how the router it setup or if design flaws exist which there are many that are still vulnerable to attack even if changing passwords and disabling wan administration. Google first, ask questions if you need something explained in detail and send links to what you're reading for reference. It helps us to explain what you are trying to understand.

Link to comment
Share on other sites

Whelp since it was bumped today anyways, I may as well ask my question here. I have an Arris router that doesn't use BASIC for authentication, how can I hack the password? I know it's a simple word, or words, I just can't recall it and would rather not go through setting up the router again. Are there any known Arris security flaws?

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...