From c76e0f9c162a8db994002462162acfa22754e330 Mon Sep 17 00:00:00 2001 From: Riccardo Giuntoli Date: Mon, 25 Nov 2019 07:54:56 +0100 Subject: [PATCH] Add files via upload --- .../3 - when Catalans and Italians merged.md | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/Part 2 - The Catalan German crew/3 - when Catalans and Italians merged.md b/Part 2 - The Catalan German crew/3 - when Catalans and Italians merged.md index f695c64f..fee01679 100644 --- a/Part 2 - The Catalan German crew/3 - when Catalans and Italians merged.md +++ b/Part 2 - The Catalan German crew/3 - when Catalans and Italians merged.md @@ -29,7 +29,7 @@ All the customers premise equipments of Telefonica in FTTH mount the CPE Wan Man https://github.com/noplacenoaddress/RouterOS/blob/master/movistar.rsc -PPPoE daemon in the FTTH movistar network serve dynamic public. CWMP daemon it's opened by default over virtual lan 2 and got an **access control list** [[41]](https://en.wikipedia.org/wiki/Access-control_list) with default permissions on deny and accept only a range of public ip from the same provider. Those people with **BGP Hijacking** [[42]](https://en.wikipedia.org/wiki/BGP_hijacking) have hoped from AS 49835 to various more. 1280 could significance a very dangerous **dns cache poisoning** [[43]](https://en.wikipedia.org/wiki/DNS_spoofing), 6752 the thief of bank accounts of big facilities, 3352 and 11902 construction of an enormous ddosnet and thief of social network profiles but also access to the passive scanning embedded on the mobile towers. +PPPoE daemon in the FTTH movistar network serve dynamic public. CWMP daemon it's opened by default over virtual lan 2 and got an **access control list** [[41]](https://en.wikipedia.org/wiki/Access-control_list) with default permissions on deny and accept only a range of public ip from the same provider. Those people with **BGP Hijacking** [[42]](https://en.wikipedia.org/wiki/BGP_hijacking) have hoped from AS 49835 to various more. 1280 could significance a very dangerous **dns cache poisoning** [[43]](https://en.wikipedia.org/wiki/DNS_spoofing), 6752 the thief of bank accounts of big facilities, 3352 and 11902 construction of an enormous ddosnet and thief of social network profiles but also access to the passive scanning embedded on the mobile towers. With 6939 they could have build a ddos net using **IPv6** [[44]](https://en.wikipedia.org/wiki/IPv6), a tool that could have been used, a tool that have created a person that I know from IRCNnet in the 1990s, is **ipv6fuck** [[45]](https://github.com/noplacenoaddress/Hacking/blob/master/ipv6fuck.c). ### External links @@ -75,4 +75,6 @@ PPPoE daemon in the FTTH movistar network serve dynamic public. CWMP daemon it's 40. https://en.wikipedia.org/wiki/Virtual_LAN 41. https://en.wikipedia.org/wiki/Access-control_list 42. https://en.wikipedia.org/wiki/BGP_hijacking -43. https://en.wikipedia.org/wiki/DNS_spoofing \ No newline at end of file +43. https://en.wikipedia.org/wiki/DNS_spoofing +44. https://en.wikipedia.org/wiki/IPv6 +45. https://github.com/noplacenoaddress/Hacking/blob/master/ipv6fuck.c \ No newline at end of file