The second-hand N810 was defeated for a few days, and the system had to be packed up and put into practice. It was just today that Daisy was taken off work. Please Install 13 a bit... (I have covered all the sensitive points. Forgive me for my low art skills ..)
Pull the exquisite N810 from your trouser pocket and enable wifi scanning,
Fortunately, there are some unencrypted ones. Just take the test of the mercury route. After the connection, let's see how the connection quality works.
About 20%, it is acceptable. There are a lot of cars on the road, and the big BUS will be disconnected once the signal passes .. sorry, continue. Let's see what his gateway is ..
Very pure 192.168.1.1. You can ping it. Let's log on...
Now, let's see the default password of merceon...
Bad luck... but there is a vulnerability in this route. A file can be bypassed. Now let's proceed...
Look, come in. The router menu is very similar to that of TP-link. Let's first look at his internet password...
As always, it doesn't matter...
This is the username and password. (This password is also Fake, but it's okay. I am not interested in it, hey.) let's take a look at the Intranet situation...
Well, I have two servers... Let's scan the other one ....
Work in a firewall on a PC... give up, change your mind...
We all know about this. As for the next ARP attack, we will not disclose it.
I suddenly remembered that I was coming to pick up Daisy's work. I 'd like to take a break and take a look at cnbeta... Sorry, so that I would not be able to be damaged again later.
Come... xiuxiu's crime tool...
Finally, start Kismet and load N810 built-in GPS to record the coordinates of the hotspot.
OVER
Fr0m: http://anonymous.blogbus.com/logs/50590784.html