07-06-2015, 12:17 AM
(This post was last modified: 07-06-2015, 12:42 AM by docsis_bozo.)
(06-06-2015, 12:24 PM)Canis-Major Wrote: What easier way to enable cpe snmp control than setting tlv_55 to true? This is NOT the factory mode that can also allow CERTAIN snmp access..
It's rather funny the idiot's here that cant read what is in the modem's help, as in cpe CONTROL of snmp.
I found that I can snmp anywhere through my 480, in router mode, and use sniffer's etc with tlv_55 enabled, when off, i get what appear's to be no snmp, and I knw it will be the same everywhere else, troll on that loser's.. get a grip and try to be fuckin constructive, instead of negative receptive pussies. Think you can help? Dont even try to, start fuckin doing!
It's amazing how clean the forum get's when ye scrape the shit of yer screen with them new ignore wipe's..
What are you going on about dude?? Relax.
First of all this isn't your carrier, what makes you think these simple tricks will work elsewhere? Like someone else said earlier, most likely someone is sleeping on the wheel at your ISP if you can in fact still have access to other customers modems on your local or remote nodes.
If bypassing ACL for SNMP access was as simple as enabling TLV_55, don't you think Rajko or another skilled coder would have implemented that by now? Wait, One or more of those functions is already present there, IPFILTERS is it not?
(06-06-2015, 12:24 PM)Canis-Major Wrote: To enable snmp on docsis 3, it's best to edit the dump in hex, then flash.
Actually that command I posted was copied and pasted from a BCM DOCSIS 3.0 DIAG FIRMWARE not Haxorware, why would I go through the trouble of hex editing and flashing when the shell is already there?
I did a simple test last night, I enabled factory mode on a D3 BCM modem on my node, for the hell of it and because I personally test everything I say and DO set TLV_55 = 1 just like you said. I still couldn't reach said modem from my subbed device, heck I went as far as spoofing my originating IP from a nmaccess on open r/w list and I made zero difference on while sniffing traffic on Wireshark.
You're calling people idiots, yet it sounds like I already know more than you know about SNMP security on my carrier. What else am I missing here?