I would like to introduce how to retrieve the D_Link vro password. Many people may not know how to retrieve the D_Link vro password. It does not matter. After reading this article, you must have gained a lot, I hope this article will teach you more things.
This article is only for study. No one can use it for illegal purposes. Otherwise, all consequences will be borne by you.
I. Principle
ADSL users use the PAP protocol or CHAP protocol in the PPP protocol for identity authentication. Because the PAP protocol uses plaintext transmission of key information, the D_Link Router password-ADSL account and password, you can obtain it through the listener method. For more information about the PPP and PPPoE protocols, see other relevant documents.
II. General ideas
Establish a PPPoE server and use the PAP protocol for authentication. When the vro communicates with this server, it can listen and obtain the ADSL account and password stored in the vro.
Iii. Test process
Building a combination of a PPPoE server VMware Workstation (6.5.2) and a RouterOS (3.20) allows you to quickly build a PPPoE server that meets the test requirements. The following are some key steps:
(1): Guest operating system (Other), Version (Other)
(2): Network connection (Use bridged networking)
(3): Host Virtual Network Mapping is a global setting of VMware Workstation. Choose Edit> Virtual Network Editor from the main menu. VMnet0 is associated with the physical Nic because it is used to connect the WAN port of the router.
(4): VMnet0 status. VMnet1 and VMnet8 are installed by default on VMware Workstation.
(5): Virtual Machine Settings-> Hardware-> Network Adapter-> Network connection-> Custom: Specific virtual network (VMnet0) This setting sets the Virtual System (RouterOS) to VMnet0. In this way, the NIC in RouterOS will be associated with the physical Nic. In this interface, set the optical drive to directly specify the mikrotik-3.20.iso, By The Way to delete some useless hardware, such as: Sound Card, soft drive.
(6): run the Virtual Machine and install RouterOS. Only system and ppp are installed.
(7): Create a PPPoE server to enter RouterOS. The username is admin, And the D_Link vro password is blank. Then, execute the following commands in sequence:
/Interface print
/Interface pppoe-server add interface = ether1 service-name = Fake-PPPoE-Server authentication = pap
/Interface pppoe-server print
/Interface pppoe-server enable 0
/Interface pppoe-server print
(8): configure the router. The WAN port connection type is PPPoE. Enter the Internet account and password. The connection mode is automatic connection. Purpose: After the vro is powered on, it will automatically connect to the PPPoE server to facilitate monitoring. After the configuration is complete, turn off the vro power. Connect the physical network card to the WAN port of the router using a network cable, run Wireshark, listen to the local physical network card, and then power on the router.
(9): PPPoE Server-Fake-PPPoE-Server (10): ADSL account and password discovered
4. Related tips
1: If a remote router cannot physically connect to its WAN port, you can save the configuration information by using the "backup and load configuration" function provided by some routers, find a vro with the same model, load the configuration file, and then ......
2: Do not think that all the routers are like D-Link launched by the DI-504M, the ADSL account and the D_Link Router password in the form of plaintext saved in the configuration file.
- Application point of view: introduces Cisco Router Security Configuration
- Knowledge of nine Cisco Routers
- Inevitable Cisco wireless router configuration problems
- How to improve the security of Cisco router Remote Management
- Application of CBAC in Cisco Router Security