Here is my advise on Windows users if you want to try Linux out for the first time.
This will be a series of videos to help you from Linux total beginner to Power user level.
So If you like my videos and find them interesting, please Like and Subscribe my channel.
Why not! its just one simple click and you will get all my tech notes tutorials for free!
Month: April 2021
Changing Huawei ONT HS8545M5 password with MD5 and SHA256 hashes
Its always good to change the default password of your Network Devices.
Below is the instruction on how to change the default password for your Huawei ONT.
It works for Huawei ONT model H545M5 but I am sure it works the same of other Huawei ONTs as well.
- First of all, from your browser, you need to go to router’s IP. The default should be 192.168.100.1
If that doesnt work, do the IP scan first. - Then you need to know the default username and password. Default for HS8545M5 is
Account : telecomadmin
Password : admintelecom - Once logged in, navigate to System Tools > Configuration File
Download the configuration file
You will download hw_ctree.xml file
** Before making any changes, its a good idea to save the back up of your configuration file. *** - Open with any text editor and search for Username and Password fields.
Copy the password hash just in case something goes wrong. - Huawei devices uses two step hashes. MD5 and SHA256.
If you are a Linux user, use below commands to create hashes 5 new password.
OR
You can also use online has converters from below link.
https://www.freeformatter.com/md5-generator.html
A. First convert your plain text password to MD5 and then convert your MD5 to SHA256 hash.
──╼ $echo -n newpasswd | md5sum
e08df5d370e3a10fb6a005763877b60d –
$# Now Convert e08df5d370e3a10fb6a005763877b60d to SHA256
└──╼ $echo -n e08df5d370e3a10fb6a005763877b60d | sha256sum
9be816fc0bf890f4700b60e8ecf1102deeb66fc9c54475d74570126d1e9586f3 –
With your new SHA256 hash, update your config text file and upload config text file to your ONT.
Reboot the ONT and login with the new password.
Mind you again , its always a good idea to keep the backup of your config file in case something goes wrong.
Cheers
Teza
wifi card with monitor mode and packet injections
When you do Wireless pen-testings, you want to use these tools.
airmon-ng
airodump-ng
aireplay-ng
Basically what that means is you want your wireless cards to be able to perform these tasks.
Change monitor mode
Packet capturing
Packet Injection.
If you want to go fancier, you might also want to have a look at TX gain, band etc but nevermind that for now.
Not all wireless cards support above functions.
And its hard to tell if you get the right wireless adapter, because there are many different wifi adapters brands out there, but you need to find one with the right chipset.
Here is a link for you to consult with. See if you wireless card has the right chipset.
https://www.kali.org/docs/nethunter/wireless-cards/
It will help you to find the right wireless cards, but sometimes you can get lucky even if your card is not on that list.
For me, I have a built in Relatek chipset, which is not listed in the link above, but does all the required tasks to perform the wifi testing.
I also happened to buy a TP-Link TL-WN722N which happens to be version 2/3 (only version 1 has the right chipset) but I heard there is a way to get it working with different driver.
So, the best way to get the right wireless card, you need to find the right chipset . Do a bit of research on the card that you have or you are buying.
You wont know what chipset it uses, so you have to dig a bit into that as well.
use lspci to find out what chipset installed for your wireless
use lsusb to find out which chipset your wifi adapter uses.
Start off by changing to monitor mode and see if monitor mode is supported. Then carry on with other tools.
iwconfig wlan0 mode monitor
man info for the tools I mentioned earlier –
airmon-ng This script can be used to enable monitor mode on wireless interfaces. It may also be used to go back from monitor mode to managed mode. Entering the airmon-ng command without parameters will show the interfaces status. It can also list/kill programs that can interfere with the wireless card operation.
airodump-ng is used for packet capturing of raw 802.11 frames for the intent of using them with aircrack-ng. If you have a GPS receiver connected to the computer, airodump-ng is capable of logging the coordinates of the found access points. Additionally, airodump-ng writes out a text file containing the details of all access points and clients seen.
aireplay-ng is used to inject/replay frames. The primary function is to generate traffic for the later use in aircrack-ng for cracking the WEP and WPA-PSK keys. There are different attacks which can cause deauthentications for the purpose of capturing WPA handshake data, fake authentications, Interactive packet replay, hand-crafted ARP request injection and ARP-request reinjection. With the packetforge-ng tool it’s possible to create arbitrary frames.
Cheers
Teza