anjan napo ang mga tutorial wag nalang ikalat pa
wait nalang sa update po sir
abang ka ng update baka sa isang linggo pa update nito pero ma vbs cripf naman na jan para makakuha kayo ng cert. ang prvte kêy sa mac na ma scan nyo
As ofJune 26, 2014 the PLDT/Smart Telco 4G wireless Internet Service Provider made its first clearing operation on its network and wireless system to eliminate the country's number one rampant in cloning the 4G wireless broadband CPEs. According to this forum the usual MAC address base authentication of the SMART myBRO 4G wireless modem is no long effective as of the said date, this is because the AAA is already been implemented such as the Device Certificate + Private kêy + MAC address, if this three is not much on your Green Packet device such as DV235T and OX230 then you will no longer be welcome to the network. In short you will be denied to access to the Smart 4G Base Station, there's no way for you to use even the proxy server to bypass their portal.
Here's simple step on how to retrieve your myBRO 4G wireless broadband modem device certificate, private kêy and the mac address either via telnet or ssh make sure to enable port 23 or 22 to be able to get this terminal open.
Once you are login to thecommand line interface (cli) e.g. telnet or ssh, just type this following command respectively.
cd /etc The ls /etc command is to view the list directory of the /etc now you will be able to see the filename wmx_client_ca.pem this is the device certificate and the wmx_priv_key.kêy filename is the private kêy.
cat wmx_client_ca.pem
cat wmx_priv_key.kêy
After you have viewed the device certificate and the private kêy in plain text, you can copy paste this to notepad and save it as wmx_client_ca.pem, wmx_priv_key.kêy filename respectively. Now you already successfully retrieved your myBRO device certificate likewise the private kêy.
Additionally, the next command is if you wanted to retrieve your myBRO 4G wireless broadband WAN MAC address just type this command and you will prompted your device WAN MAC.
sncfg get WAN_MAC
have included this extra screenshot because of some myBRO 4G Wireless broadband CPEs their device certificate and private kêy are hidden, just like on this screen. The Green Packet equipment which Chipset is MediaTek is embedded with Linux OS and therefore it is equip with tiny all in one Busybox you can use the tool to unhide the device certificate and the private kêy.
PARA NAMAN DI KA MAHIRAPAN dôwnlôad MO NALANG YUNG TUTORIAL NASA ATTACH MENT PO..
nagbebenta sya ng mac 500php daw 15macs... malay ko kung 22o or baka yung 15macs na yun gamit na ng iba sa ibat ibang area.. kung baga pokpok na kaya alanganin..
nagbebenta sya 500php 15mac daw.. alanganin nga din ako e...
guys meron ako scan sa angry ip den tru cmd ... ask ko lang kung pede po cia gamitin dko po pa na try..den kung me gusto mag try pm lan ako a send ko sau..pero sana mag feedback kung working ...SMARt You do not have permission to view the full content of this post.Log in or register now.
di mo yan ma gagamit.. hindi po yan yun dapat mong kunin.. yung wmx_client_ca.pem po talaga dapat pero yung mga .pem na mkikita mo lng sa #ls di mo yan magagamit
ginamitan ko pa cia ng " # cat wmx_client_ca.pem" inalis ko lang don sa notepad... pero bakit prang me key na nakasulat...e nung linagay ko # cat wmx_priv_key.key <--- ala cia makita na key nya..idol eto po ung lumalabas
# cat /etc/wmx_priv_key.key
cat: can't open '/etc/wmx_priv_key.key': No such file or directory....so ang tanung ko po ung key na ksali don nak circle lan...
medjo diko gets sinasabi mo boss.. pero explain ko po sainyo kung ano po yan,,,yung # cat meaning ipapakita nya yung loob ni file 2lad nyan...
# cat wmx_client_ca.pem
bubuksan nya laman nya in a text format..dahil file sya.. yung # cd yan yung directory napipiliin mo... yung #ls yan yung magpapakita ng list of directory sa loob ni # cd...
#cd
#cd /etc or #cd etc = pinili mo si etc na directory
#ls = pinakita nya laman ni etc
pag si wmx_priv_key.kêy at wmx_client_ca.pem ay hindi lumitaw sa #ls ganito lilitaw
# cat /etc/wmx_priv_key.kêy
cat: can't open '/etc/wmx_priv_key.kêy': No such file or directory
meaning nakatago sila.. or naka hide.. yan po yung ginagawan ko ng paraan kung nasaan sila papano sila iuunhide papasila ilalabas.. kasi nabubuksan ko lahat ng directory list ni #cd etc... pero yung mga directory na yon sa loob din nila wala sila wmx_priv_key.kêy at wmx_client_ca.pem... yun ang sinosolve ko papano iunhide.. pero still meron parin pong mga ibang modems na pag nag telnet ka e nakalitaw sila,, base sa observations ko po.. yung mga tulad po natin na nag ssnipe like mybro modem tayo tapos dv235t FW tayo tapos diba nag papalit tayo ng FW ng dv natin.. kadalasan ginagamit sa mga ganyan e si mybro.. talino dapat yung FW pero pag open mo si globo pala.. sila kadalasan yung nakikitaan mo ng wmx_priv_key.kêy at wmx_client_ca.pem sa telnet kasi sinasalpak natin sila.. base sa observation ko kasi ox230 FW ko ginamitan ko ng telnet nakalitaw yung wmx_priv_key.kêy at wmx_client_ca.pem ko.. pero pag sina legit ayun wala.. diko makitaan.. kahit naka open pa telnet at ssh nila kahit http pa.. parang lumilitaw na kapwa natin ang makukuhanan natin ng wmx_priv_key.kêy at wmx_client_ca.pem so sa 3days kong pag aangry ip e naka isa palang ako at nung binuksan ko sya admin/admin user at pass nya meaning baka tulad natin sya... correct me if im wrong sa mga veterans dito,, dagdag info ko po yan para sa mga may alam...
ask lang newbie po kac ako idol...salamat din sa pag clear... saka sanay po ay matuklasan mu po kung pnu i unhide..pra ma ishare samin na dpa nkaka alam...