Thursday 2 January 2014

How to hack BSNL router using Andriod

Introduction

Recently I was at home, playing with my BSNL router. For those who don't know what BSNL is, its the AT & T of India, known for very bad customer support :)
 
 
In this article, I will walk you through step by step illustrations on how to hack into your local router and explore it inside out. Though I am using my BSNL router here but steps and method will be similar for your modem/router as well.
 
 
 
Router Configuration

BSNL router is manufactured by SemIndia and distributed by ITI. It follows the tracks of using firmware of different routers (Broadcom to be specific, BCM6338 stands for Broadcom router firmware version 96338, deployed in US robotics ones and some other popular routers). Mine is DNA-A211-1, one of most popular ones in India.
 
 
Hacking Router with Android
 
To start with, I telnet into my router with my credentials and I am greeted with welcome screen as shown in screen below,
 
 
Once you are in, first step will be to figure out what are the services it has to offer, so I typed the usual 'help' and found following commands. 
 
 
 
I started with basic command, "swversion" to get the version. Then with some hunting, I came to know that "sh" command runs over my router, ran it and voila, familiar interface of busybox snaps in.  
 
 
 
Great, now thats worth something. For those who don't know hat busybox is, its a multicall binary. My android has it too. Seeing the version made me tick, it was running an older version of busybox.


Then I tried ls command, but it didn't work, hence tried "echo *" and it showed up everything as seen below  
 
 
 
Next comes the magic command "cat /etc/passwd" and there we go again. 
 
 
 
After that, I went on exploring other directories. Got into CVS and found information regarding CVS and pserver, note worthy one is the credentials of pserver. 
 
pserver:xyzabc@192.168.128.19:/home/cvsroot 
 
Not much of an interest though as they are of a private LAN. On googling, I found out that account belonged to XYZ (name changed for privacy), employee at SIEMIndia.

Next, I moved on to /etc directory, 
 
 
 
lots of directories here, as a rule of thumb I opened default.cfg 
 
 
 
Generic stuff, but what caught my eye was this line,  
 
ppp_conId1 userName="multiplay" password="kIMa1bXVsdGlwbGF51AG" 
 
This might come in handy (use your creativity :)).


But then I thought that why not to access the router from web interface. Logged in to it and then went to "management" and downloaded the backupsettings.conf file,
 
 
 
On opening, it was like as shown below,  
 
 
 
I was not able to find the above credentials in it, hence I came to a conclusion that they must be somewhat for internal purposes.


Moving on, I thought why not to try to create an arbitrary file . Tried following command  
 
echo 'rishrockz' >> rdx 
 
 
 
But it failed. It was not easy to figure out the writable directory as I was not able to determine the file permissions since this version of busybox doesn't has ls or stat command.

Finally little bit of exploring found that /var is writable. Tried creating a file again, it succeeded ! 
 
 
 
Well, there is lot more to explore, this is just tip of iceberg! Next time I am be thinking of going to compile programs (http://people.debian.org/~debacle/cross/) and copying over them using echo (once I get a PC), I have got some nice ideas and will be hacking with them.


In the mean time, for those who are wondering what this machine has, here is the bootup log. 
 
 
 
 
 :) enjoy it

0 comments:

Post a Comment