Prevent hacking cable modems with DOCSIS config files
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-29-2002 07:09 AM - edited 03-02-2019 12:14 AM
Anyone know of ways to prevent hacking cable modems that run DOCSIS config files?
Thnx. Blm
- Labels:
-
Other Networking
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-29-2002 08:15 AM
A few different ways to help ensure. My first way is to *not* use Motorola Surfboards as your primary CPE modems. There is a lot of stuff out there designed to work specifically with Surfboard modems. Do a google search for "uncapping surfboard" - it's scary. I personally have not been able to uncap an RCA cable modem after many hours of trying to do so.
The second is to enable the shared secret in your config file, and on the UBR. Pick a non-dictionary word, and from the cable interface, type "shared secret password" where password is your specific password. Then, type the same password in your config file generator.
There are other little things you can do, but these two do the most for you.
HTH,
Justin
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-29-2002 11:00 AM
Justin, Thanks for the reply. Actually, even with strong pwds in the config, the cable modems are still compromised. Any other suggestions you can share would be appeciated ... Thanks!
Blm
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-29-2002 11:27 AM
Maybe they're being compromised because the UBR isn't verifying the secret?
Does this apply to you?
http://www.cisco.com/warp/public/707/cmts-MD5-bypass-pub.shtml
