<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-US"><generator uri="https://jekyllrb.com/" version="4.1.1">Jekyll</generator><link href="/HH/feed.xml" rel="self" type="application/atom+xml" /><link href="/HH/" rel="alternate" type="text/html" hreflang="en-US" /><updated>2021-04-04T08:21:51+03:00</updated><id>/HH/feed.xml</id><title type="html">Happy Hacking</title><subtitle>My Happy Hacking stories</subtitle><author><name>Mikko Kenttälä</name><email>mikko.kenttala(ä)iki.fi</email></author><entry><title type="html">Zero click vulnerability in Apple’s macOS Mail</title><link href="/HH/Zero-Click-Zip/" rel="alternate" type="text/html" title="Zero click vulnerability in Apple’s macOS Mail" /><published>2021-03-30T13:37:00+03:00</published><updated>2021-03-30T13:37:00+03:00</updated><id>/HH/Zero-Click-Zip</id><content type="html" xml:base="/HH/Zero-Click-Zip/">&lt;p&gt;&lt;img src=&quot;zcz.png&quot; alt=&quot;ZcZ&quot; /&gt;&lt;/p&gt;

&lt;h1 id=&quot;zero-click-ziptldr&quot;&gt;Zero-Click Zip TL;DR&lt;/h1&gt;

&lt;p&gt;I found a zero click vulnerability in Apple Mail, which allowed me to add or
modify any arbitrary file inside Mail’s sandbox environment. This could lead to
many bad things including unauthorized disclosure of sensitive information to a
third party. An attacker can modify victim’s Mail configuration including mail
redirects which enables takeover of victim’s other accounts via password
resets. This vulnerability can be used to change the victim’s configuration so
that victims will be propagating the attack to their correspondents in a
worm-like fashion. Apple has patched this vulnerability in 2020–07.&lt;/p&gt;

&lt;h2 id=&quot;story&quot;&gt;Story&lt;/h2&gt;

&lt;p&gt;I was researching another vulnerability case (I’ll write about it a bit later)
when I found this. I was reading Apple’s Bug Bounty categories and started to
think what attack vectors there might be to trigger without user action. First
idea obviously was Safari. I played a bit with Safari but couldn’t find any
interesting leads. Next thing on my mind was Mail or iMessage. I focused on the
Mail because of the hunch about the legacy features hiding in older codebase. I
started to play around with Mail, sending test messages and attachments with
the idea of trying to find an anomaly compared to normal email sending and
receiving. I sent these test messages and followed Mail process syscalls to
learn what is happening under the hood when email is received and here is what
I found.&lt;/p&gt;

&lt;h1 id=&quot;technical-details&quot;&gt;Technical details&lt;/h1&gt;

&lt;h2 id=&quot;description&quot;&gt;Description&lt;/h2&gt;

&lt;p&gt;Mail has a feature which enables it to automatically uncompress attachments
which have been automatically compressed by another Mail user.&lt;/p&gt;

&lt;p&gt;In the valid use case, if the user creates email and adds the folder as an
attachment it will be automatically compressed with zip and
x-mac-auto-archive=yes; is added to the MIME headers. When another Mail user
receives this email, compressed attachment data is automatically uncompressed.&lt;/p&gt;

&lt;p&gt;During my research I found that parts of the uncompressed data is not cleaned
from temporary directory and that directory is not unique in context of Mail,
this can be leveraged to get unauthorized write access to ~/Library/Mail and to
$TMPDIR using symlinks inside of those zipped files.&lt;/p&gt;

&lt;h2 id=&quot;here-is-what-happens&quot;&gt;Here is what happens&lt;/h2&gt;

&lt;p&gt;Attacker sends an email exploit which includes two zip files as attachments to
the victim. Immediately when the user receives the email, Mail will parse it to
find out any attachments with x-mac-auto-archive=yes header in place. Mail will
uncompress those files automatically.&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;process.png&quot; alt=&quot;Exploit process&quot; /&gt;&lt;/p&gt;

&lt;h3 id=&quot;1st-stage&quot;&gt;1st stage&lt;/h3&gt;

&lt;p&gt;First zip includes a symlink named Mail which points to victims
“$HOME/Library/Mail” and file 1.txt . Zip gets uncompressed to
“$TMPDIR/com.apple.mail/bom/”. Based on “filename=1.txt.zip” header, 1.txt gets
copied to mail dir and everything works as expected. However cleanup is not
done right way and the symlink is left in place.&lt;/p&gt;

&lt;h3 id=&quot;2nd-stage&quot;&gt;2nd stage&lt;/h3&gt;

&lt;p&gt;Second attached zip includes the changes that you want to do to
“$HOME/Library/Mail”. This will provide arbitrary file write permission to
Library/Mail. &lt;/p&gt;

&lt;p&gt;In my example case I wrote new Mail rules for the Mail application. With that
you can add an auto forward rule to the victim’s Mail application.&lt;/p&gt;

&lt;pre&gt;&lt;code class=&quot;language-#text&quot;&gt; Mail/ZCZPoC
 Mail/V7/MailData/RulesActiveState.plist
 Mail/V7/MailData/SyncedRules.plist
&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;Mail/ZCZPoC includes just a plaintext file which will be written to ~/Library/Mail.&lt;/p&gt;

&lt;h3 id=&quot;ovrewrite-maillapp-rule-list&quot;&gt;Ovrewrite Maill.app rule list&lt;/h3&gt;

&lt;p&gt;Files can be overwritten and that is what happens with the
RulesActiveState.plist and the SyncedRules.plist files.&lt;/p&gt;

&lt;p&gt;Main thing in the RulesActiveState.plist is to activate our rule in the
SyncedRules.plist.&lt;/p&gt;

&lt;div class=&quot;language-xml highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;...
&lt;span class=&quot;nt&quot;&gt;&amp;lt;dict&amp;gt;&lt;/span&gt;
    &lt;span class=&quot;nt&quot;&gt;&amp;lt;key&amp;gt;&lt;/span&gt;0C8B9B35-2F89-418F-913F-A6F5E0C8F445&lt;span class=&quot;nt&quot;&gt;&amp;lt;/key&amp;gt;&lt;/span&gt;
    &lt;span class=&quot;nt&quot;&gt;&amp;lt;true/&amp;gt;&lt;/span&gt;
&lt;span class=&quot;nt&quot;&gt;&amp;lt;/dict&amp;gt;&lt;/span&gt;
...
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;/div&gt;

&lt;p&gt;SyncedRules.plist contains a rule to match “AnyMessage” and rule in this PoC
sets Mail application to play morse sound when any message is received.&lt;/p&gt;

&lt;div class=&quot;language-xml highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;...

&lt;span class=&quot;nt&quot;&gt;&amp;lt;key&amp;gt;&lt;/span&gt;Criteria&lt;span class=&quot;nt&quot;&gt;&amp;lt;/key&amp;gt;&lt;/span&gt;
&lt;span class=&quot;nt&quot;&gt;&amp;lt;array&amp;gt;&lt;/span&gt;
    &lt;span class=&quot;nt&quot;&gt;&amp;lt;dict&amp;gt;&lt;/span&gt;
        &lt;span class=&quot;nt&quot;&gt;&amp;lt;key&amp;gt;&lt;/span&gt;CriterionUniqueId&lt;span class=&quot;nt&quot;&gt;&amp;lt;/key&amp;gt;&lt;/span&gt;
        &lt;span class=&quot;nt&quot;&gt;&amp;lt;string&amp;gt;&lt;/span&gt;0C8B9B35-2F89-418F-913F-A6F5E0C8F445&lt;span class=&quot;nt&quot;&gt;&amp;lt;/string&amp;gt;&lt;/span&gt;
        &lt;span class=&quot;nt&quot;&gt;&amp;lt;key&amp;gt;&lt;/span&gt;Header&lt;span class=&quot;nt&quot;&gt;&amp;lt;/key&amp;gt;&lt;/span&gt;
        &lt;span class=&quot;nt&quot;&gt;&amp;lt;string&amp;gt;&lt;/span&gt;AnyMessage&lt;span class=&quot;nt&quot;&gt;&amp;lt;/string&amp;gt;&lt;/span&gt;
    &lt;span class=&quot;nt&quot;&gt;&amp;lt;/dict&amp;gt;&lt;/span&gt;
&lt;span class=&quot;nt&quot;&gt;&amp;lt;/array&amp;gt;&lt;/span&gt;
...

&lt;span class=&quot;nt&quot;&gt;&amp;lt;key&amp;gt;&lt;/span&gt;SoundName&lt;span class=&quot;nt&quot;&gt;&amp;lt;/key&amp;gt;&lt;/span&gt;
&lt;span class=&quot;nt&quot;&gt;&amp;lt;string&amp;gt;&lt;/span&gt;Morse&lt;span class=&quot;nt&quot;&gt;&amp;lt;/string&amp;gt;&lt;/span&gt;

&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;/div&gt;

&lt;p&gt;Instead of playing morse sound, this could be e.g forwarding rule to leak
sensitive email data.&lt;/p&gt;

&lt;h2 id=&quot;impact&quot;&gt;Impact&lt;/h2&gt;

&lt;p&gt;This arbitrary write access allows the attacker to manipulate all of the files
in $HOME/Library/Mail. As shown this will lead to exposure of the sensitive
data to a third party through manipulating the Mail application’s
configuration. One of the available configuration options is the user’s
signature which could be used to make this vulnerability wormable.&lt;/p&gt;

&lt;p&gt;There is also a chance that this could lead to a remote code execution (RCE)
vulnerability, but I didn’t go that far.&lt;/p&gt;

&lt;h2 id=&quot;timeline&quot;&gt;Timeline&lt;/h2&gt;
&lt;ul&gt;
  &lt;li&gt;2020-05-16: Issue found&lt;/li&gt;
  &lt;li&gt;2020-05-24: PoC done and reported to Apple&lt;/li&gt;
  &lt;li&gt;2020-06-04: Catalina 10.15.6 Beta 4 with Hotfix relased&lt;/li&gt;
  &lt;li&gt;2020-07-15: macOS Mojave 10.14.6, macOS High Sierra 10.13.6, macOS Catalina 10.15.5 Update with hotfix released&lt;/li&gt;
  &lt;li&gt;2020-11-12: Credits released (&lt;a href=&quot;https://support.apple.com/en-us/HT211289&quot;&gt;CVE-2020-9922&lt;/a&gt;)&lt;/li&gt;
  &lt;li&gt;2021-03-12: Bug Bounty is still being evaluated&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Thanks for the fellow researches who have shared their findings and knowledge and thanks Apple for the quick fixes.&lt;/p&gt;</content><author><name>Mikko Kenttälä</name><email>mikko.kenttala(ä)iki.fi</email></author><category term="hacking" /><summary type="html"></summary></entry><entry><title type="html">How my application ran away and called home from Redmond</title><link href="/HH/How-my-application-ran-away-and-called-home-from-Redmond/" rel="alternate" type="text/html" title="How my application ran away and called home from Redmond" /><published>2019-10-07T13:37:00+03:00</published><updated>2019-10-07T13:37:00+03:00</updated><id>/HH/How-my-application-ran-away-and-called-home-from-Redmond</id><content type="html" xml:base="/HH/How-my-application-ran-away-and-called-home-from-Redmond/">&lt;p&gt;I recently found a surprising leak vector in Windows 10 installations. We were porting our Beacon Application to Windows and for easy deployment. The plan was to create just one .exe including everything. However we found out that End Point Protection (EPP) solutions didn’t like that at all and we had to go with the MSI installer option. This is a story what happened during the .exe testing.&lt;/p&gt;

&lt;p&gt;I used my personal malware analysis lab for testing the application. My lab is an isolated network environment which has a whitelist based firewall rules. Whitelist firewall is needed to carefully allow specific updates and downloads. The lab already has Beacon Virtual Machine running and it has found issues in the past. All of them are fixed. So this leak was something new!&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;topo.png&quot; alt=&quot;&quot; /&gt;
…&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://medium.com/sensorfu/how-my-application-ran-away-and-called-home-from-redmond-de7af081100d&quot;&gt;Read full post from here&lt;/a&gt;&lt;/p&gt;</content><author><name>Mikko Kenttälä</name><email>mikko.kenttala(ä)iki.fi</email></author><category term="hacking" /><summary type="html">I recently found a surprising leak vector in Windows 10 installations. We were porting our Beacon Application to Windows and for easy deployment. The plan was to create just one .exe including everything. However we found out that End Point Protection (EPP) solutions didn’t like that at all and we had to go with the MSI installer option. This is a story what happened during the .exe testing.</summary></entry><entry><title type="html">How to user F-secure freedome VPN in OpenBSD/Linux</title><link href="/HH/how-to-use-f-secure-freedome-vpn-in-openbsd/" rel="alternate" type="text/html" title="How to user F-secure freedome VPN in OpenBSD/Linux" /><published>2016-09-09T13:37:00+03:00</published><updated>2016-09-09T13:37:00+03:00</updated><id>/HH/how-to-use-f-secure-freedome-vpn-in-openbsd</id><content type="html" xml:base="/HH/how-to-use-f-secure-freedome-vpn-in-openbsd/">&lt;h2 id=&quot;this-wont-work-anymore-&quot;&gt;(This won’t work anymore )&lt;/h2&gt;

&lt;p&gt;I have been testing and using F-Secure Freedome VPN for a while and I was wondering that can I get it running on my OpenBSD virtual machine. I have done some research before about the security of the Freedome (as I normally do when I start to use new software), and I was aware that it is based OpenVPN.&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;Following instructions are done with OS X and OpenBSD&lt;/li&gt;
  &lt;li&gt;You need to have Freedome installed to some of your machine&lt;/li&gt;
  &lt;li&gt;Yes. You need to have valid license&lt;/li&gt;
  &lt;li&gt;Do not ask support from F-secure to this&lt;/li&gt;
  &lt;li&gt;This might be against their Term and Conditions&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;…&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://www.happyhacking.org/HappyHacking/hacking/2016/09/09/How-to-Use-F-secure-Freedome-in-OpenBSD.html&quot;&gt;Read full post from here&lt;/a&gt;&lt;/p&gt;</content><author><name>Mikko Kenttälä</name><email>mikko.kenttala(ä)iki.fi</email></author><category term="hacking" /><summary type="html">(This won’t work anymore )</summary></entry><entry><title type="html">Disable F-secure freedome VPN remotely (OS X)</title><link href="/HH/disable-f-secure-freedome-vpn-remotely/" rel="alternate" type="text/html" title="Disable F-secure freedome VPN remotely (OS X)" /><published>2016-09-08T13:37:00+03:00</published><updated>2016-09-08T13:37:00+03:00</updated><id>/HH/disable-f-secure-freedome-vpn-remotely</id><content type="html" xml:base="/HH/disable-f-secure-freedome-vpn-remotely/">&lt;p&gt;&lt;img src=&quot;freedome-disabled.png&quot; alt=&quot;freedome&quot; /&gt;&lt;/p&gt;

&lt;h2 id=&quot;short-description&quot;&gt;Short description&lt;/h2&gt;
&lt;p&gt;It is possible to disable Freedome remotly (old versions) by attacker who want to reveal the real IP-address of the Freedome user. The bug is reported to F-secure and they have fixed the issue already couple of months ago. Thanks for quick reactions.&lt;/p&gt;

&lt;h2 id=&quot;technical-description&quot;&gt;Technical description&lt;/h2&gt;
&lt;p&gt;Freedome is based on OpenVPN and it uses “–management-client” in openvpn which means that the management of the openvpn is done from other process and in this case from Freedome GUI. Client is listening at TCP-socket and socket was binded to localhost and to random port. Attacker can make web-page which will rather fast go thourgh the port range. When the connection is made to against Freedome GUI TCP-socket it will disconnect the real connection between OpenVPN and Freedome GUI. This will disconnect VPN connection and laptop will fall back to “normal” Internet connection and it will expose the user real IP-address.&lt;/p&gt;

&lt;p&gt;PoC was sent to F-secure and they fixed the issue with changing the TCP-socket to Unix Domain Socket. Thanks for F-secure for quick reaction.&lt;/p&gt;</content><author><name>Mikko Kenttälä</name><email>mikko.kenttala(ä)iki.fi</email></author><category term="hacking" /><summary type="html"></summary></entry><entry><title type="html">Hacking prepaid data</title><link href="/HH/hacking-prepaid-data/" rel="alternate" type="text/html" title="Hacking prepaid data" /><published>2015-10-19T13:37:00+03:00</published><updated>2015-10-19T13:37:00+03:00</updated><id>/HH/hacking-prepaid-data</id><content type="html" xml:base="/HH/hacking-prepaid-data/">&lt;p&gt;&lt;img src=&quot;http://www.happyhacking.org/HappyHacking/img/prepaid.png&quot; alt=&quot;prepaid&quot; /&gt;&lt;/p&gt;

&lt;h1 id=&quot;more-prepaid-data-with-nice-discount&quot;&gt;More prepaid data with nice discount&lt;/h1&gt;
&lt;p&gt;One operator in Finland had vulnerability in their prepaid charing web-site. Client who was buying more time to the prepaid were controlling the variable “ammount” via web-broswer. Report is encrypted in finnish but you can get the Idea from the screenshots.&lt;/p&gt;

&lt;p&gt;Vulnerability was reported to the operator and they fixed it rather quickly.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.jkry.org/ouluhack/HackingPrepaidData&quot;&gt;Full report in finnish&lt;/a&gt;&lt;/p&gt;</content><author><name>Mikko Kenttälä</name><email>mikko.kenttala(ä)iki.fi</email></author><category term="hacking" /><summary type="html"></summary></entry><entry><title type="html">Hacking Inteno DG201A</title><link href="/HH/hacking-inteno-DG201A/" rel="alternate" type="text/html" title="Hacking Inteno DG201A" /><published>2013-11-07T12:37:00+02:00</published><updated>2013-11-07T12:37:00+02:00</updated><id>/HH/hacking-inteno-DG201A</id><content type="html" xml:base="/HH/hacking-inteno-DG201A/">&lt;p&gt;I have ran my VDSL2 box happily in bridge mode and thinking that there is not that much of risk because the box should be just forwarding the packets to my firewall. After doing some changes to my VDSL -box I realized that for some strange reason it will take IP from the Internet even when it should be in bridged mode.&lt;/p&gt;

&lt;p&gt;And it means I need to check how secure it is.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://www.happyhacking.org/HappyHacking/hacking/2013/11/07/Hacking-Inetno-DG201A.html&quot;&gt;Read full post here…&lt;/a&gt;&lt;/p&gt;</content><author><name>Mikko Kenttälä</name><email>mikko.kenttala(ä)iki.fi</email></author><category term="hacking" /><summary type="html">I have ran my VDSL2 box happily in bridge mode and thinking that there is not that much of risk because the box should be just forwarding the packets to my firewall. After doing some changes to my VDSL -box I realized that for some strange reason it will take IP from the Internet even when it should be in bridged mode.</summary></entry><entry><title type="html">Hacking Toyota Touch and Go</title><link href="/HH/hacking-toyota-touch-and-go/" rel="alternate" type="text/html" title="Hacking Toyota Touch and Go" /><published>2012-03-05T12:37:00+02:00</published><updated>2012-03-05T12:37:00+02:00</updated><id>/HH/hacking-toyota-touch-and-go</id><content type="html" xml:base="/HH/hacking-toyota-touch-and-go/">&lt;p&gt;&lt;img src=&quot;http://www.happyhacking.org/HappyHacking/data/Toyota-Avensis-touch_go_monitor_big.jpg&quot; alt=&quot;Touch and Go&quot; /&gt;&lt;/p&gt;

&lt;h1 id=&quot;intro&quot;&gt;INTRO&lt;/h1&gt;
&lt;p&gt;New Toyotas has head unit called touch and go. System is based on QNX and made by Harman and most likely same kind of devices are used also by other car manufacturers. You can connect car to the Internet via Bluetooth. We joined to same Bluetooth network to see what was going on.&lt;/p&gt;

&lt;p&gt;There was multiple services running on QNX, including Telnet, anonymous login enabled D-Bus and some log interfaces for debugging.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://www.happyhacking.org/HappyHacking/hacking/2012/03/05/Hacking-Toyota-Touh-and-go.html&quot;&gt;Read full post here…&lt;/a&gt;&lt;/p&gt;</content><author><name>Mikko Kenttälä</name><email>mikko.kenttala(ä)iki.fi</email></author><category term="hacking" /><summary type="html"></summary></entry><entry><title type="html">Getting shell from Onkyos AVR</title><link href="/HH/shell-from-onkyoss-avr/" rel="alternate" type="text/html" title="Getting shell from Onkyos AVR" /><published>2011-09-06T09:29:20+03:00</published><updated>2011-09-06T09:29:20+03:00</updated><id>/HH/shell-from-onkyoss-avr</id><content type="html" xml:base="/HH/shell-from-onkyoss-avr/">&lt;p&gt;&lt;img src=&quot;http://www.happyhacking.org/HappyHacking/img/onkyo.png&quot; alt=&quot;Onkyo AVR&quot; /&gt;&lt;/p&gt;

&lt;h1 id=&quot;onkyo-tx-nr509&quot;&gt;ONKYO TX-NR509&lt;/h1&gt;
&lt;p&gt;I bought new AVR to my home and of course I needed to check out what is under the hood. While reading the manual I noticed that the software licenses included Busybox. It was invite to the challenge to get shell.&lt;/p&gt;

&lt;p&gt;Some basic information:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;Model: Onkyo TX-NR509&lt;/li&gt;
  &lt;li&gt;Network Capability Delivers Internet Radio and Network Audio Streaming via Ethernet&lt;/li&gt;
  &lt;li&gt;Linux inside&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href=&quot;http://www.happyhacking.org/HappyHacking/hacking/2011/09/06/Getting-shell-from-Onkyos-AVR.html&quot;&gt;Read full post here…&lt;/a&gt;&lt;/p&gt;</content><author><name>Mikko Kenttälä</name><email>mikko.kenttala(ä)iki.fi</email></author><category term="hacking" /><summary type="html"></summary></entry><entry><title type="html">Second trip to embedded system</title><link href="/HH/second-trip-to-embedded-system/" rel="alternate" type="text/html" title="Second trip to embedded system" /><published>2010-03-19T08:29:20+02:00</published><updated>2010-03-19T08:29:20+02:00</updated><id>/HH/second-trip-to-embedded-system</id><content type="html" xml:base="/HH/second-trip-to-embedded-system/">&lt;p&gt;&lt;img src=&quot;http://www.happyhacking.org/HappyHacking/img/embedded.png&quot; alt=&quot;HP Procurve 1810G&quot; /&gt;&lt;/p&gt;

&lt;p&gt;After my last blog I have figured out a couple of new things. One thing is that you can access to boot loader by pressing ctrl + c while the switch is booting. More about it later in a section dedicated to this subject.&lt;/p&gt;

&lt;p&gt;Another happy hacking experience was SNMP as I already guessed it in my last post. Anyhow this has been a great learning experience to get closer with hardware and embedded device, since I have not had this kind of knowledge before.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://www.happyhacking.org/HappyHacking/hacking/2010/03/19/Second-trip-to-embedded-system.html&quot;&gt;Read full post here…&lt;/a&gt;&lt;/p&gt;</content><author><name>Mikko Kenttälä</name><email>mikko.kenttala(ä)iki.fi</email></author><category term="hacking" /><summary type="html"></summary></entry><entry><title type="html">Best fail so far</title><link href="/HH/best-fail-so-far/" rel="alternate" type="text/html" title="Best fail so far" /><published>2010-01-28T08:29:20+02:00</published><updated>2010-01-28T08:29:20+02:00</updated><id>/HH/best-fail-so-far</id><content type="html" xml:base="/HH/best-fail-so-far/">&lt;p&gt;&lt;img src=&quot;http://www.happyhacking.org/HappyHacking/img/shapeimage_2.png&quot; alt=&quot;Inteno&quot; /&gt;&lt;/p&gt;

&lt;h1 id=&quot;inteno-x5671-vdsl2-box&quot;&gt;INTENO X5671 VDSL2 BOX&lt;/h1&gt;
&lt;h2 id=&quot;basic-info&quot;&gt;BASIC INFO&lt;/h2&gt;
&lt;p&gt;As I’m still moving to a new apartment I have to buy a new VDSL2 box from my operator (DNA). They sell these Inteno boxes by default. First impression was positive, because they use WPA in WLAN by default and password to WLAN is different with each box. Next thing I noticed that there was also SSH available (even tough there is no mention about it in manual), which is extremely great thing!&lt;/p&gt;

&lt;p&gt;Software Version: X5671_2.00DNT06&lt;/p&gt;

&lt;p&gt;OS: OpenWRT-related system Services:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://www.happyhacking.org/HappyHacking/img/shapeimage_2.png&quot;&gt;Read full post here…&lt;/a&gt;&lt;/p&gt;</content><author><name>Mikko Kenttälä</name><email>mikko.kenttala(ä)iki.fi</email></author><category term="hacking" /><summary type="html"></summary></entry></feed>