Symbianize Forum

Most of our features and services are available only to members, so we encourage you to login or register a new account. Registration is free, fast and simple. You only need to provide a valid email. Being a member you'll gain access to all member forums and features, post a message to ask question or provide answer, and share or find resources related to mobile phones, tablets, computers, game consoles, and multimedia.

All that and more, so what are you waiting for, click the register button and join us now! Ito ang website na ginawa ng pinoy para sa pinoy!

Pass sa trams dv235t at ox..paghugot pem/key redboot style lam kona

lookknee

Amateur
Advanced Member
Messages
106
Reaction score
0
Points
26
Anyone of u knew how to backdoor telnet sa ox at dv235t sa bago nilang user at pass
ill already knew how to hugot the pem key redboot style kahit naka hide kuhang kuha
heres the pic...kulang ko lang ang pang open telnet port at hss
View attachment 220716
 

Attachments

  • untitled.JPG
    untitled.JPG
    192.2 KB · Views: 677
smart
#nc 169.254.71.8 9000
<PRESS ENTER>
RedBoot>rfcal -act 48 -arg1 0 -arg2 4096
RedBoot>rfcal -act 49 -arg1 0
4084
RedBoot>read cert_file 4084 0
-----BEGIN CERTIFICATE-----
-----END CERTIFICATE-----
RedBoot>rfcal -act 48 -arg1 1 -arg2 1712
RedBoot>rfcal -act 49 -arg1 1
1712
RedBoot>read cert_file 1712 0
-----BEGIN RSA PRIVATE-----
-----END RSA PRIVATE KEY-----

witribe
#nc 169.254.71.8 9000
<PRESS ENTER>
RedBoot>
rfcal -act 48 -arg1 0 -arg2 1184
RedBoot>
rfcal -act 49 -arg1 0
1183
RedBoot>
read cert_file 1183 0
-----BEGIN CERTIFICATE-----
-----END CERTIFICATE-----
RedBoot>
rfcal -act 48 -arg1 1 -arg2 896

RedBoot>
rfcal -act 49 -arg1 1
896
RedBoot>
read cert_file 896 0
-----BEGIN RSA PRIVATE KEY-----
-----END RSA PRIVATE KEY-----

witribe again
echo "rfcal -act 48 -arg1 0 -arg2 4086" | nc 169.254.71.8 9000
echo "rfcal -act 49 -arg1 0" | nc 169.254.71.8 9000
echo "read cert_file 4086 0" | nc 169.254.71.8 9000
echo "rfcal -act 50 -arg1 0" | nc 169.254.71.8 9000
echo "rfcal -act 48 -arg1 1 -arg2 1712" | nc 169.254.71.8 9000
echo "rfcal -act 49 -arg1 1" | nc 169.254.71.8 9000
echo "read cert_file 1712 0" | nc 169.254.71.8 9000
echo "rfcal -act 50 -arg1 1" | nc 169.254.71.8 9000

View attachment 220718



yan ba yun????
 

Attachments

  • Untitled2.png
    Untitled2.png
    248.7 KB · Views: 401
Last edited:
pa pm po boss g3mtek...' TIA :thumbsup:
 
pa pm po boss g3mtek...' TIA :thumbsup:

bawal mga boss di kasi sakin yung tricks mawawalan yun ng tiwala sakin...di bale memeber naman siya dito antayin nio n lang ilalabas nia yun
 
un pla eee hintayin ko yan pre :D

80,443,23,22,8080 yan po alam ng marami pero mayroon pong way para mabuksan yan lahat kahit ptach protect pa yan kuno o closed port
napipicture out po kasi namin ang mangyayari...ubusan lahi po sigurado lalo na pag napasakamay ng mga abusado
at sigurado po gagamiting nila ito

sncfg dset GUEST_NAME mangagamit
sncfg dset GUEST_PASSWD '$1$k2I9hJe4$iU/u/fNUOgiyfcjgRkmzt1'
sncfg dset ADMIN_NAME Bossing
sncfg dset ADMIN_PASSWD '$1$k2I9hJe4$amzLLRogb2HA1p9sbiy1C1'
sncfg dset POWERUSER_NAME kapangyarihan
sncfg dset POWERUSER_PASSWD '$1$k2I9hJe4$Fz8qBWbIBgJPuQX39xVoI1'
sncfg dset HTTPD_ENABLE 0
sncfg dset HTTPD_PORT 9990
sncfg dset HTTPSD_ENABLE 0
sncfg dset HTTPSD_PORT 9990
sncfg dset TELNETD_ENABLE 0
sncfg dset TELNETD_PORT 9990
sncfg dset SSHD_ENABLE 0
sncfg dset SSHD_PORT 9990
sncfg dset MGMT_TELNET_WAN 0
sncfg dset MGMT_WEB_WAN 0
sncfg dset MGMT_SSH_WAN 0
sncfg dset MGMT_TELNET_LAN 0
sncfg dset MGMT_SSH_LAN 0
sncfg commit
sncfg dset MGMT_AUTOREBOOT_TIME 5
sncfg dset MGMT_AUTOREBOOT_ENABLE 1
sncfg commit
sncfg reload
/factoryreset.sh
 
Last edited:
Abang mode n lng trams n lng talaga hope ko
 
Last edited:
pero paano ba user at pass ng trams
 
salamat dito sa info. :) kaso d ko pa rin ma pasok ang gui ni trams. :) iba na ata password. kahit user lang. sana my mag share sakin. hehehehe
 
ts kung ok lng sayo pa pm naman ng tut, salamat
 
hmm pa bm muna
sakit na ulo ko sa kababasa hehe
 
Back
Top Bottom