ZTE 中兴光猫全系列打开telnet工具
ENV
python3 -m venv .venv
source ./.venv/bin/activate
pip install -r requirements.txt
zte_factroymode.py
open telnet(use embed user/pass to 192.168.1.1 80):
python3 zte_factroymode.py telnet
or custom args
python3 zte_factroymode.py --user CUAdmin --pass CUAdmin --ip 192.168.1.1 --port 80 telnet open
$ python3 ./zte_factroymode.py -h
usage: zte_factroymode [-h] [–user USER [USER …]] [–pass PASS [PASS …]] [–ip IP] [–port PORT] {telnet,serial} …
options:
-h, –help show this help message and exit
–user USER [USER …], -u USER [USER …]
factorymode auth username (default: [‘factorymode’, ‘CMCCAdmin’, ‘CUAdmin’, ‘telecomadmin’, ‘cqadmin’, ‘user’, ‘admin’, ‘cuadmin’, ‘lnadmin’, ‘useradmin’])
–pass PASS [PASS …], -p PASS [PASS …]
factorymode auth password (default: [‘nE%jA@5b’, ‘aDm8H%MdA’, ‘CUAdmin’, ‘nE7jA%5m’, ‘cqunicom’, ‘1620@CTCC’, ‘1620@CUcc’, ‘admintelecom’, ‘cuadmin’, ‘lnadmin’])
–ip IP route ip (default: 192.168.1.1)
–port PORT router http port (default: 80)
subcommands:
valid subcommands
{telnet,serial} supported commands
telnet control telnet services on/off
serial control /proc/serial on/off
zte_hardcode_dump.py
decrypt /etc/hardcodefile
./zte_hardcode_dump.py test/hardcode test/hardcodefile/*
$ python3 ./zte_hardcode_dump.py -h
usage: zte_hardcode_dump [-h] hardcode hardcodefile [hardcodefile …]
positional arguments:
hardcode the /etc/hardcode file which contains root key
hardcodefile config files under /etc/hardcodefile
options:
-h, –help show this help message and exit
1.虚拟商品,一经购买,不接受任何形式的退款!如果不能接受以上协议请勿下单!
2.虚拟商品,不接受远程指导!如果不能接受以上协议请勿下单!
3.本站资源全部来自网络,如有侵犯你的权益请联系管理员,Email:admin@vwodis.com我们会第一时间进行审核删除。站内资源为网友个人学习或测试研究使用,未经原版权作者许可,禁止用于任何商业途径!请在下载24小时内删除!
希望管理员能上个工具图片看看!
?