I received an acknowledgement from BlackBerry for my finding from a few months back. Hooray!
Free Hakin9 Articles
Hakin9 was kind enough to share these articles with me for free, in order to share them with all of you for free! Enjoy!
Google Vulnerability Hall of Fame
Today is a pretty exciting day for me as I have made it onto the Google Vulnerability Hall of Fame! http://www.google.com/about/appsecurity/hall-of-fame/reward/
Microsoft HotSpot in Forbes Magazine Firmware Lifting “Hack”
You may have heard about the free Wi-Fi hotspot that Microsoft pushed out in random Forbes magazines… This device comes with a T-Mobile GSM SIM card with the data service that lasts for only 15 days . I was curious as to what was making this tick, so I decided that it would be a fun experiment to lift the contents of this Linux OS off of the device.
The device has the following chips:
Etron Tech EM63A165TS
These chips should be fairly obvious as to what purpose they serve, if not with a quick Google search.
The device has the following ports open with services started on by default: 80, 23, and 5820. That last one hosts a redirect site for a supposed login (or that’s what my phone seemed to think) in order to initiate the T-Mobile service? Maybe accessing that page triggers the “activation”. Please correct me either way.
Anyway, without further adieu, here are the steps I had to take in order to get the filesystem off of the device.
1. Plug device into computer via microusb and connect battery (this will keep the battery charged)
2. Wait for AP to startup, and connect to the SSID: Microsoft_Office365 with the password Office365
3. Visit 192.168.100.1:80 and login as admin/admin
4. Do whatever you want on this web interface regarding the router’s settings
4a. The FTP setting in here does not actually work, we need to do this via telnet (23)
5. telnet 192.168.100.1
6. Login as username: admin password: admin
7. cd /bin
8. vi new.conf
9. Paste this in vi:
10. We are changing the DefaultRoot to be the root directory, instead of /media/
11. In the same directory, type: proftpd -c new.conf
12. This will take our new conf and run it with our FTPD
Side note: I believe that you could simply copy off the device block and have it all neatly within a single file by performing the following, then copying it off via our FTP server:
cp /dev/mtdblock0 /tmp/rootfs
In case you don’t want to go through all of that, here are the files extracted: Ralink FileSystem
My site has graced the Internet with its presence for 6 years. Six whole years. That’s a lot of bandwidth consumption. I hope all of you have enjoyed it!