Skip to main content

PLDTHOMEDSL DEFAULT EXPLOIT


Good day to all
doing good?

 This is my first blog in cyber-security and i hope this post will help you to secure your own home router and your ISP provider that you use in your home. and this blog post is for EDUCATIONAL PURPOSES only.  Now a days many blog posts sharing how you secure your WIFI Network and how other hackers can exploit it and how can steal our private data etc.. that's the consequences of neglecting and not securing our home network not only our INTERNET CONNECTION can be compromise but also your identity and other personal and private data will expose when it exploit online.

Now this is what i discover one of the internet provider here in the philippines the PLDTHOMEDSL i run some test and i tested and it works, I discover that many PLDT clients didn't change their WIFI BSSID or what we called WIFI NAME in Broadcast Mode and sadly also their WIFI PASSWORD they leave it Default Password. Here is the sample of the PLDTWIFI i discover.


As you can see i see all the connected devices on the wifi network. how i exploit it?  i saw the BSSID of this WIFI Network like e.g. PLDTHOMEDSL42GAD <-- sample BSSID not on the picture . Me seeing like this i said to my self no this is not in default password
because when you see this wifi name PLDTHOMEDSL that is "commonly" not all is on default password. but when i saw and count the last number and letters it total on 5 numeric and alphabet letters then now i try to use it.



How i Exploit this  wifi network  PLDTHOMEDSL42GAD by using default password

1. I Click the wifi network name PLDTHOMEDSL42GAD//Sample Network Name
2. Then type this as your password PLDTWIFI42GAD //the default password of PLDTHOME starts commonly in PLDTWIFI and the last numeric and alphabet letters is the gold key to get access on the wifi network the last letters and number is the mac. address of the device or the modem router of the ISP Provider inside your home or business.
3. Then wait if no errors on authenticating then you are lucky you can access their  WIFI INTERNET now.



#KnowLearnAndApply
#FilipinoKnowMustKnow.
#ShareToBeAware

 BY:S3CUR1TY101











Comments




  1. This professional hacker is absolutely reliable and I strongly recommend him for any type of hack you require. I know this because I have hired him severally for various hacks and he has never disappointed me nor any of my friends who have hired him too, he can help you with any of the following hacks:

    -Phone hacks (remotely)
    -Credit repair
    -Bitcoin recovery (any cryptocurrency)
    -Make money from home (USA only)
    -Social media hacks
    -Website hacks
    -Erase criminal records (USA & Canada only)
    -Grade change

    Email: cybergoldenhacker at gmail dot com

    ReplyDelete

Post a Comment

Popular posts from this blog

How to Properly Hack PLDT Wifi: 100% Working in 2019

Pldt Wifi are easy to hack if you know how to properly used the tools available, these tools and apps are need to be download on your smartphones or tablets. PLDT wifi hacker allows you to connect to a PLDT router if you know some tricks, dony worry, it is very simple and easy to follow. How to download this file  New Update for new PLDT WIFI Device: June 29, 2018 Note: 50% change to working on same new device just try if working Example #1  PLDTWIFI52374 x 3 nyo bali 52374 x 3 = 157122 New password is:  PLDTWIFI157122  Example #2  network name: PLDTHOMEDSL57341 57341*3=172023 add mo yun PLDTWIFI password: PLDTWIFI172023  Supported Devices: Note: It's not hacking but it will only view password that has not been change the default password Android Phone ( Exclude Galaxy Young ) NOTE : MANUAL HACKING  If the name of the wifi is PldtMyDSL_XXX or the name of the wifi was included costumer name you may proceed manual hacking (VIA BSS
Crack WPA/WPA2 Wi-Fi Routers with Aircrack-ng and Hashcat Brannon Dorsey Credits: https://medium.com/@brannondorsey/crack-wpa-wpa2-wi-fi-routers-with-aircrack-ng-and-hashcat-a5a5d3ffea46 Crack WPA/WPA2 Wi-Fi Routers with Airodump-ng and  Aircrack-ng / Hashcat . This is a brief walk-through tutorial that illustrates how to crack Wi-Fi networks that are secured using weak passwords. It is not exhaustive, but it should be enough information for you to test your own network’s security or break into one nearby. The attack outlined below is entirely passive (listening only, nothing is broadcast from your computer) and it is impossible to detect provided that you don’t actually use the password that you crack. An optional active deauthentication attack can be used to speed up the reconnaissance process and is described at the end of this document. If you are familiar with this process, you can skip the descriptions and jump to a list of the commands used

WIBR+ WIFI HACK ANDROID

DOWNLOAD THE APP HERE WIBR+ is an advanced application for testing of security of the WPA/WPA2 PSK WiFi networks. This application is NOT FAKE, it really works and it will discover weak password. WIBR+ supports queueing, custom dictionaries, bruteforce generator and advanced monitoring! WIBR+ supports two types of attack Dictionary attack – WIBR+ tries passwords from predefined list one by one. Please don’t be disappointed if the password will not be found, it simply means that it was not in the dictionary. However, if the key is set to “12345678” or “password” it will be detected. WIBR+ supports importing of your own password lists, so you are not limited by pre-installed dictionaries! You can download dictionaries here . Bruteforce attack – you can select alphabet, length of password and the app will try all combinations of characters in the alphabet. Of course this is complete madness because the number of combinations is growing exponentially with password