AdamO:Quote/Re
A vision and arts of Extended Plagiarism
before the history of hacking; There was "MODIFICATION"
for a person to be called a true hacker, one must do it intentionally by means of *finding the flaw and exploit it*, and NOT by merely "found it by accident".[snapback]4169[/snapback]I always considerd the people to have a born ability or aquired talent for hacking up anything they please to be the true ones.
Regardless of OS or situation they can access, configure, modify... as they please. Be it for fun, profit or personal gain.. These ones are rarely caught due to there ability to pull complex tricks with acuracy and calculated escape or perfectly covering the tracks.
A deep love of code may be the reason for excessive calculation?... But back to real version of "hacker" the local drunk school boy that does stupid things with paper towl does fit the description of "hacker". It's sad that someone who stumbles across flaws due to a level of technical skill can't be one :unsure: "true hacker" almost falls under oxymoron listing at this rate... almost :rolleyes
A Salute to: [pinoywifi.com ]
WARNING! Due to this Blog site High relevant content. The Blogger Conceal/Hide the real niche by using low dense keyword and meta tag "SMARTBRO" Million hackers had been called, but only few ethical to be chosen...*f.

Thursday, June 5, 2008

How to hack SmartBro

STEPS IN HACKING SMARTBRO CANOPY

I.) Go to Control Panel –> Network Connections. Hanapin mo yung connection ng SmartBRO Canopy, normally Local Area Connection.

II.) Once na nahanap mo na, right click the connection and select Properties.

III.) Under sa This connection uses the following items:, double-click yung Internet Protocol TCP/IP.

IV.) Set your IP address to 169.254.3.3, and subnet mask to 255.255.0.0.

V.) Click OK, and close all windows.

VI.) Open your internet browser, we prefer FireFox, and type in 169.254.1.1 sa address bar, this will take you to the Canopy MS.
Note: If this doesn’t work, probably your Canopy MS is blocked, or has been set to use a nonstandard IP address. This is where method two comes in.



STEPS IN SMARTBRO CANOPY HACKING

A1.) Follow steps 1-3 from the first method.

A2.) This time, set your IP address to 10.20.30.40, and subnet mask to 255.0.0.0
The following steps will help you identify your Canopy address, if ever nagbago na ung IP niya (hindi na 169.254.1.1).


A3.) Open the ms-dos command prompt. (on your start menu, select run, and type ‘cmd’)

A4.) Enter the following command: arp -a. It will display IP addresses connected to your network, look for the IP address beginning with 10 (10.xxx.xx.xx), this is your Canopy address. Note that i-disregard niyo lang ung ibang IP addresses, as wala naman tayong pag-gagamitan, and your Canopy address is not the one with 10.0.0.1.

A5.) Close command prompt and open your web browser (use FireFox) and enter your Canopy address sa address bar (10.xxx.xx.xx).

CONGRATS!!!. Napasok mo na yung Canopy page mo without any hassle. May nakausap akong technician once, sabi nila para makuha mo yung exact canopy address mo, akyatin mo lang ang bubong mo tapos tanggalin mo yung antenna, then hanapin mo yung sticker ng canopy , then convert the numbers into hexadecimals to get the IP Address of your canopy.

Now, to maximize your internet capability speed and accuracy , go to the Canopy page –> Configuration –> Quality of Service QoS. Siguruhin lang na walang values set to 256, if ever meron, then set that to 500.

Also, select Enabled dun sa Hi-Priority Channel.
Kung maganda connection mo, this should take you way beyond your bandwidth capacity, like 500-750kbps. Make sure na jitters is below 5, and di aabot ng 1.5 miles of air distance mo sa base station.
Full credits to master Duhwho, and special thanks to elijahpaul of testmy.net.

Smartbroadband Vulnerability 01


Step 1 Copy this codes
step 2 Open MS FrontPage
Step 3.Paste the html Codeon FrontPage HTML TAB
step 4 . View Encrypted Data
Step 5. Good Luck



SmartBroadband Theory Of Encryption

Suppose Alice and Bob are communicating but don't want theircommunication to be overheard by others; specifically, they arebothered by an opponent we shall call Oscar. Alice and Bob may hidetheir message using a CRYPTOSYSTEM S = (P,C,K,E,D): P = Plaintext alphabet C = Ciphertext alphabet K = set of keys E = a collection {Ek} (k in K) of functions P --> C D = a collection {Dk} (k in K) of functions C --> P satisfying D_k(E_k(x)) = x.

SmartBroadband Vulnerability

RF Message Board > Rose Cross
... debuffs in addition to Torment, Entangle, Weakness and Vulnerability. .... ko sa smartbro thread pero pag check ko dun di nmn nagalaw ung post ko. ...rfboards.levelupgames.ph/lofiversion/index.php/t14376-450.html -

Linksys WRT54GL Firmware
Resolves UPnP vulnerability reported by SANE. Firmware 4.30.2 ... Josh on Setting Up SmartBro / SmartWi-Fi with Linksys Router; Indra on D-Link DIR-451 3G ...seoroot.com/blog/networking/linksys-wrt54gl-firmware.html -



SQL Injection
SQL Injection is a security vulnerability that occurs in the database layer of an ... Josh on Setting Up SmartBro / SmartWi-Fi with Linksys Router ...seoroot.com/blog/technology/security/sql-injection.html -

TipidPC.com makukulong ba ang isang hacker? may batas na ba pra ...
Security testing and vulnerability test is also called hacking (white hatters) ..... PHP 2500.00, 1 Posts; N>smartbro cannopy config tech. ...www.tipidpc.com/viewtopic.php?tid=148444 -

Vol 41, No 8 • AUGUST 2007 Vol 41, No 8 • AUGUST 2007 Php 70. Php 70.
File Format: PDF/Adobe Acrobat - Tingnan bilang HTMLIMPACT. • August 2007. 2. “ “ Quote in the Act. “If I have to pray thanking God with the armalite. on my hand and the prisoner on my side, I would be ...www.impactmagazine.net

ideasnpink
... there’s this weird feeling of vulnerability yet at the same time putting out ... I'm glad meron na SmartBro prepaid wifi.... Unjeh: ate Carey! wohooo! i ...

all links are all information only and not a guarantee of accuracy

Smartbro Hackers 01 Tutorial




AdamO:Quote/Re
A vision and arts of Extended Plagiarism
before the history of hacking; There was "MODIFICATION"



for a person to be called a true hacker, one must do it intentionally by means of *finding the flaw and exploit it*, and NOT by merely "found it by accident".[snapback]4169[/snapback]I always considerd the people to have a born ability or aquired talent for hacking up anything they please to be the true ones.


Regardless of OS or situation they can access, configure, modify... as they please. Be it for fun, profit or personal gain.. These ones are rarely caught due to there ability to pull complex tricks with acuracy and calculated escape or perfectly covering the tracks.


A deep love of code may be the reason for excessive calculation?... But back to real version of "hacker" the local drunk school boy that does stupid things with paper towl does fit the description of "hacker". It's sad that someone who stumbles across flaws due to a level of technical skill can't be one :unsure: "true hacker" almost falls under oxymoron listing at this rate... almost :rolleyes
Sponsored Link [pinoywifi.com ]