This is a tutorial I found on the net.

This tutorial will explain to you how to hack someone’s internet account thru his router.
This hack is based on a secuirty exploit of the router’s default password and the stupidity of the user.
Explanation: when somebody buy’s a xDSL/Cabel router, the router is set to manufactory defaults like IP range, user accounts, router table, and most important the security level. The last one we will exploit.
Most routers will have a user friendly setup menu running on port 23 (telnet) and sometimes port 80 (http) or both.
This is what we are looking for.
Step 1.

Get a multie IP range scanner like superscanner (superscanner is fast and easy to use, get it here).
Get a xDSL/Cabel user IP range. This is a single user IP 212.129.169.196 so the ip range of this Internet provider is 212.129.xxx.xxx most likely it will be from 212.129.1.1 to 212.129.255.255 .
To keep your scanning range not to big it’s smart to scan from 212.129.1.1 to 212.129.1.255 it also depends of your bandwidth how fast the scan will be finished.
The IP adres above is just a example any IP range from a xDSL/Cabel provider can be used for this hack.
before you start scanning specify the TCP/IP ports. You know that we are looking for TCP port 23 (telnet) and TCP port 80 (http) so edit the list and select only port 23 and port 80.
Now start scanning and wait for the results.
When finished scanning look for a IP that has a open port 23 and 80. Write them down or remember them.

Step 2.

Way 1

This is important: Most routers have connection log capability so the last thing you want to do is making a connection with your own broadband connection so use a anonymouse proxy server or dailup connection with a fake name and address (56.9 modem for example) when connection to the victim’s router.
Now get a telnet program. Windows has a standard telnet program just go to start,
select run and type down “telnet” without the “, click or enter OK.
Select “connect” than “Remote system” enter IP adres of the victim in the “host name” field press OK.
wait for your computer to make a connection. This way only works when the router has a open telnet port service running

Way 2

This is important: Most routers have connection log capability so the last thing you want to do is making a connection with your own broadband connection so use a anonymouse proxy server or dailup connection with a fake name and adres (56.9 modem for example) when connection to the victim’s router.
Open a Internet explorer windows enter the IP address of the victim after the http:// in the address bar.
This way only works when the router has a open hyper text transfer protocol (http) service running.

Step 3

Entering the userfriendly setup menu. 9 out of 10 times the menu is protected by a loginname and password. When the user doesn’t change any security value’s the default password stay’s usable.
So the only thing you have to do is find out what type of router the victim uses. I use this tool: GFILanguard Network Security Scanner. (get it here) is good. When you find out the type of router that’s been used get the wright loginname and password from this list (get it here. not every router is on the list)

Default router password list

Step 4

When you have a connection in telnet or internet expolorer you need to look for user accounts.
PPP, PPtP, PPeP, PPoP, or such connection protocol. If this is not correct look for anything that maybe contains any info about the ISP account of the user.
go to this option and open it. Most likely you will see a overview of user setup options.
Now look for the username and password.
In most case the username will be freely displayed so just write it down or what ever….
The password is a different story. Allmost always the password is protected by ********* (stars) in the telnet way there is noway around it (goto another victim) but when you have a port 80 connection (http). Internet connection way open click right mouse key and select “View source” now look for the field where the star are at. most likely you can read it because in the source code the star are converted to normal ASCII text.
If not get a “******** to text” convertor like snadboy’s revelation V.2 (get it here) move the cursor over the ****** and….
It’s a miracle you can read the password.
Now you have the username and password. There a million fun thing to do with that but more about that next time.
check the tutorial page freqently.

Tips.

Beware on most routers only one person can be loget on simultaneous in the router setupmenu.
Don’t change anything in the router if you don’t know what you are doing.

Explore More

Directory Traversal

Directory Traversal Overview Directory Traversal vulnerabilities occur once again when the user supplied input is not validated. You think we would get tired of saying this, but it appears this

Critical xss vulnerabilities at classified listings site Ads.com.mm

PlanetCreator has reported another critical XSS Vulnerability on classified listings site Ads.com.mm Cross Site Scripting is a client-side attack where an attacker can craft a malicious link, containing script- code

What are the general classes of hackers?

Hackers are categorized into the following classes: * Black Hat Hackers (Crackers): These are persons who are computer specialists and use their hacking skills to carry out malicious attacks on