-
Notifications
You must be signed in to change notification settings - Fork 25
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
KAON CG3000 Telnet SU #68
Comments
I managed to decompress the firmware and found the hass password.
Any recommended tools for brute force? |
Hashcat or John the Ripper should work, try wordlist mode and then incremental mode. You can also check if they have a Samba hash (ie if they ever used Samba to transfer things), those are way easier to crack |
I managed to crack the password with hashcat 'Broadcom.' However, when I try to access via telnet and use the SU command, it tells me it's incorrect. Any idea where to go from here? I have physical access to the modem. |
Which console are you logging into? CM or RG? |
The modem has the default Factory Key "password" so I can enable Telnet through SNMP. |
That hash is the default for the RG side, the SU password you refer to is for the CM "eCoS" side, anyway you can find the SU password via the RG side by connecting via uart or if you are in a CM-litte shell you can move to RG's |
I logged into the RG console with the credentials, but I don’t know where to look for the CM console SU password. The only password I find in |
If you are already on the RG side, you might be able to read the /dev/ ram, look for this string |
I have a kaonmedia CG3000 modem with Telnet access, but I need the SU password.
I was able to upload a firmware image here.
Could someone please help me?
The text was updated successfully, but these errors were encountered: