Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
haxorware on sbg6580 !
#1
May be i am way behind to catch up with all you guys. But just curious how can I start to install haxorware or forceware on sbg6580 which has firmware SBG6580-6.5.2.0-GA-06-NOSH

Hope someone may help me out. Thanks ya !
Reply
#2
Why exactly do you want to do on the modem?

If its download/upload certs, change serial, mac, etc. there is no need for diag firmware as you can change these already using SNMP and the original firmware.
Reply
#3
fyi haxorware will not run on a non docsis 2 bcm3349 chipset
Reply
#4
(16-12-2017, 09:39 PM)occalifornia Wrote: fyi haxorware will not run on a non docsis 2 bcm3349 chipset
6580 is docsis 3 modem. Haxor will not run on that modem.
Either u mod that soft or try to buy anonymously static IP
There is option in the soft, of dynds, u could use it without any mods, but about 2 years ago dynds change it, u could only buy dynds now using your own credentials. So bye bye anonymous, unless u could mod soft to use another static addy.
There is or was on this site moded soft by linuks user, but I could not load it by jtag NT.
Reply
#5
(16-12-2017, 07:03 PM)ricktendo Wrote: Why exactly do you want to do on the modem?

If its download/upload certs, change serial, mac, etc. there is no need for diag firmware as you can change these already using SNMP and the original firmware.

I could get SNMPGET to work but could never get SNMPSET to work correctly onto the SBG. Are the OIDs different?
Reply
#6
Thanks for all of your inputs !!!

Some of you are absolutely right about no need to mod on this modem.

Just change dns,serial, mac like one of my neighbors did on his modem.
He did not change nothing on his factory firmware.
I do beleive it 100% cloning someone sub !!!
and wish I could learn how to change dns, serial and mac like someone mentioned above.

If anyone could enlightening me a little bit- i would greatly appreciate it.
Thanks ya!
Reply
#7
You need snmp on linux or download net-snmp for windows

Open command prompt and run the following for backing up your current modem

Code:
# Enables Factory Mode
snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.1.2.1.2.1 s password
# Checks if Factory Mode is enabled
snmpget -v2c -c public 192.168.100.1 1.3.6.1.2.1.1.1.0
# Gets the BPI oid
snmpwalk -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.4.1.1.1.3
# Get full bpi.bin, change X on the end of this command with the oid line number with "bpi" from the previous command (example: 5)
snmpget -Ov -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.4.1.1.1.8.X > bpikey.txt
# These are the different certs (Private may be a problem but you can get this from bpikey.txt)
snmpget -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.2.2.1.0 > cmBpiPublicKey.txt
snmpget -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.2.2.2.0 > CmBpiPrivateKey.txt
snmpget -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.2.2.3.0 > cmBpiPlusRootPublicKey.txt
snmpget -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.2.2.4.0 > cmBpiPlusCmCertificate.txt
snmpget -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.2.2.5.0 > cmBpiPlusCaCertificate.txt
# Does a full snmp walk of modem to yield serial, macs, etc.
snmpwalk -v2c -c public -P d -O n 192.168.100.1 1.3.6.1.4.1.4413.2.99.1 1 > cableDataPrivateMIBGroup.txt
# Disables Factory Mode
snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.1.1.0 i 1
snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.1.1.0 i 0
# Verifies Factory Mode is disabled
snmpget -v2c -c public 192.168.100.1 1.3.6.1.2.1.1.1.0
# Reboot (optional, not needed)
snmpset -v2c -c public 192.168.100.1 1.3.6.1.2.1.69.1.1.3.0 i 1

Code:
# Whatever values you get from the previous command, replace the values in the ones bellow (without spaces with factory mode enabled)
snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.1.4.1.2.1 x 001122334455
snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.1.4.1.2.2 x 001122334455
snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.1.4.1.2.3 x 001122334455
snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.1.4.1.2.4 x 001122334455
snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.1.4.1.2.5 x 001122334455
snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.1.3.1.2.5 s SERIAL
snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.2.2.1.0 x 308100000000000000
snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.2.2.2.0 x 00000000000000000000
snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.2.2.3.0 x 308200000000000000000
snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.2.2.4.0 x 308200000000000000000
snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.2.2.5.0 x 308200000000000000000
Reply
#8
if I do run linux then just apply the same commands above ?
Thanks!

(20-12-2017, 05:51 PM)ricktendo Wrote: You need snmp on linux or download net-snmp for windows

Open command prompt and run the following for backing up your current modem

Code:
# Enables Factory Mode
snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.1.2.1.2.1 s password
# Checks if Factory Mode is enabled
snmpget -v2c -c public 192.168.100.1 1.3.6.1.2.1.1.1.0
# Gets the BPI oid
snmpwalk -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.4.1.1.1.3
# Get full bpi.bin, change X on the end of this command with the oid line number with "bpi" from the previous command (example: 5)
snmpget -Ov -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.4.1.1.1.8.X > bpikey.txt
# These are the different certs (Private may be a problem but you can get this from bpikey.txt)
snmpget -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.2.2.1.0 > cmBpiPublicKey.txt
snmpget -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.2.2.2.0 > CmBpiPrivateKey.txt
snmpget -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.2.2.3.0 > cmBpiPlusRootPublicKey.txt
snmpget -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.2.2.4.0 > cmBpiPlusCmCertificate.txt
snmpget -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.2.2.5.0 > cmBpiPlusCaCertificate.txt
# Does a full snmp walk of modem to yield serial, macs, etc.
snmpwalk -v2c -c public -P d -O n 192.168.100.1 1.3.6.1.4.1.4413.2.99.1 1 > cableDataPrivateMIBGroup.txt
# Disables Factory Mode
snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.1.1.0 i 1
snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.1.1.0 i 0
# Verifies Factory Mode is disabled
snmpget -v2c -c public 192.168.100.1 1.3.6.1.2.1.1.1.0
# Reboot (optional, not needed)
snmpset -v2c -c public 192.168.100.1 1.3.6.1.2.1.69.1.1.3.0 i 1

Code:
# Whatever values you get from the previous command, replace the values in the ones bellow (without spaces with factory mode enabled)
snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.1.4.1.2.1 x 001122334455
snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.1.4.1.2.2 x 001122334455
snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.1.4.1.2.3 x 001122334455
snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.1.4.1.2.4 x 001122334455
snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.1.4.1.2.5 x 001122334455
snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.1.3.1.2.5 s SERIAL
snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.2.2.1.0 x 308100000000000000
snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.2.2.2.0 x 00000000000000000000
snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.2.2.3.0 x 308200000000000000000
snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.2.2.4.0 x 308200000000000000000
snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.2.2.5.0 x 308200000000000000000
Reply
#9
(20-12-2017, 05:51 PM)ricktendo Wrote: You need snmp on linux or download net-snmp for windows

Open command prompt and run the following for backing up your current modem

Code:
# Enables Factory Mode
snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.1.2.1.2.1 s password
# Checks if Factory Mode is enabled
snmpget -v2c -c public 192.168.100.1 1.3.6.1.2.1.1.1.0
# Gets the BPI oid
snmpwalk -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.4.1.1.1.3
# Get full bpi.bin, change X on the end of this command with the oid line number with "bpi" from the previous command (example: 5)
snmpget -Ov -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.4.1.1.1.8.X > bpikey.txt
# These are the different certs (Private may be a problem but you can get this from bpikey.txt)
snmpget -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.2.2.1.0 > cmBpiPublicKey.txt
snmpget -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.2.2.2.0 > CmBpiPrivateKey.txt
snmpget -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.2.2.3.0 > cmBpiPlusRootPublicKey.txt
snmpget -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.2.2.4.0 > cmBpiPlusCmCertificate.txt
snmpget -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.2.2.5.0 > cmBpiPlusCaCertificate.txt
# Does a full snmp walk of modem to yield serial, macs, etc.
snmpwalk -v2c -c public -P d -O n 192.168.100.1 1.3.6.1.4.1.4413.2.99.1 1 > cableDataPrivateMIBGroup.txt
# Disables Factory Mode
snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.1.1.0 i 1
snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.1.1.0 i 0
# Verifies Factory Mode is disabled
snmpget -v2c -c public 192.168.100.1 1.3.6.1.2.1.1.1.0
# Reboot (optional, not needed)
snmpset -v2c -c public 192.168.100.1 1.3.6.1.2.1.69.1.1.3.0 i 1

Code:
# Whatever values you get from the previous command, replace the values in the ones bellow (without spaces with factory mode enabled)
snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.1.4.1.2.1 x 001122334455
snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.1.4.1.2.2 x 001122334455
snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.1.4.1.2.3 x 001122334455
snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.1.4.1.2.4 x 001122334455
snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.1.4.1.2.5 x 001122334455
snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.1.3.1.2.5 s SERIAL
snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.2.2.1.0 x 308100000000000000
snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.2.2.2.0 x 00000000000000000000
snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.2.2.3.0 x 308200000000000000000
snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.2.2.4.0 x 308200000000000000000
snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.2.2.5.0 x 308200000000000000000

Thanks, Rick!
Reply
#10
(21-12-2017, 03:41 AM)turtleq Wrote: if I do run linux then just apply the same commands above ?
Thanks!

Linux and Windows commands are the same.

Note: lines with "> filename.txt" on the end create a text file with the output instead of displaying it in the terminal, make sure you cd to a folder where you want these saved.
Reply


Forum Jump:


Users browsing this thread: 2 Guest(s)