Answer the question
In order to leave comments, you need to log in
D-Link DIR-300 NRU-B6 web muzzle hack
There is a D-Link DIR-300 NRU-B6 router. He has a password-protected webmord.
You need to access the settings, but do not reset the settings that are already there.
Instructions for junior revisions did not fit.
This is done exclusively for peaceful purposes and the router is mine, not the neighbor's.
Answer the question
In order to leave comments, you need to log in
There is option 1 (unlikely) to build your own firmware for DIR-300 with reduced functionality and flash it through recovery (as with a dead firmware). NVRAM should not be erased, but order the display of NVRAM data in the firmware. But it is difficult.
There is option 2, which is more plausible, but needs to be clarified. The router has a “bootloader” that, upon startup, will open RedBoot (such as a “bootloader” with TELNET and a truncated console) on the WAN port for 1 second. With it, you can (read about redboot for a long time and deeply) be able to read the contents of nvram (the part of the flash drive where the settings are lying around). I didn’t do it myself, I don’t know in what form. Theoretically, there is only text data, so it may be possible to parse, for this you may need firmware sources (work with nvram)
lexfrei: Without a password, you can change it through the recovery (the same redboot). The only thing is that you cannot overwrite the flash part with nvram
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question