Ok gang let’s roll!
Pew pew! Let’s get this bad boy unboxed!
It’s alive.!!! No wan interfaces yet!
ok so default IP is 192.168.1.1 on a /24... no suprise there the admin interface on the LAN side is running on 80 and i assume 443... to the nmap we go! admin:admin should get us in!
yeah ok that's on TCP 443 using HTTPs we can see the firmware likely isn't up to date due to the copyright date
admin:admin and we get prompted but not forced to change the password! time to pew pew with nmap!
ok we have TCP 21, 22, 23,80,443 and 1194 open by default (full 65535 ports scanned timing mode 4)
whilst we get a UDP scan running let's go explore the admin console!
ok that's still port scanning.. time to check out the WAN interface!
ther quick start wizard has a max password of 23 chars. we'll abort that and go see if we can find the WAN IP
n0000000000000000000000000000000000000000000 interface exposed on TCP 443 but... bad request.. also TCP 1194 (openvpn?) (the WAN IP is 192.168.1.x on purpose for those confused - i flicked the LAN ip to .200.1/24
this is what we see! i got a work meeting shortly but if anyone knows more about this web service shout tweeps!
just kicking off a quick burp content discovery and audit etc.
do some manual pokey pokey....
You can follow @UK_Daniel_Card.
Tip: mention @twtextapp on a Twitter thread with the keyword “unroll” to get a link to it.

Latest Threads Unrolled:

By continuing to use the site, you are consenting to the use of cookies as explained in our Cookie Policy to improve your experience.