Backup the user configuration, and decompress them to be used in further attacks.Explore the backup files to obtain all the accounts and some very sensitive information.Crack the shadow file using John the Ripper.Exploring the file system, searching for something interesting (web-shell). Discuss some commands on the router interface.In part one, I left you with access to the shell as root, but I deliberately didn’t explain what to do next, but now I think it is time to dig deeper into this poor router. In part one, we hacked and gained access to shell of the ZXHN H108N as root through Telnet, part two will talk about ZXHN H108N router web-shell and secrets, and I will show you how to access all that in few simple steps.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |