A
A
Alexey Sviridkin2012-11-14 16:12:35
Passwords
Alexey Sviridkin, 2012-11-14 16:12:35

D-Link DIR-300 NRU-B6 web muzzle hack

There is a D-Link DIR-300 NRU-B6 router. He has a password-protected webmord.
You need to access the settings, but do not reset the settings that are already there.
Instructions for junior revisions did not fit.
This is done exclusively for peaceful purposes and the router is mine, not the neighbor's.

Answer the question

In order to leave comments, you need to log in

3 answer(s)
F
FilimoniC, 2012-11-15
@FilimoniC

There is option 1 (unlikely) to build your own firmware for DIR-300 with reduced functionality and flash it through recovery (as with a dead firmware). NVRAM should not be erased, but order the display of NVRAM data in the firmware. But it is difficult.
There is option 2, which is more plausible, but needs to be clarified. The router has a “bootloader” that, upon startup, will open RedBoot (such as a “bootloader” with TELNET and a truncated console) on the WAN port for 1 second. With it, you can (read about redboot for a long time and deeply) be able to read the contents of nvram (the part of the flash drive where the settings are lying around). I didn’t do it myself, I don’t know in what form. Theoretically, there is only text data, so it may be possible to parse, for this you may need firmware sources (work with nvram)

F
FilimoniC, 2012-11-15
@FilimoniC

lexfrei: Without a password, you can change it through the recovery (the same redboot). The only thing is that you cannot overwrite the flash part with nvram

W
wscms, 2012-11-14
@wscms

What have you tried? Google gives out a bunch of information on the request "cracking the D-Link DIR-300 password"
One and Two , for example

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question