Technicolor TG582n admin login - linux

So I have been looking for hours to find the login to this router using upper and lower case and have got absolutely no where at all and have tried factory reset as well.
The reason I have come here for a possible solution is that I have a dump of the flash chip from the board. I bought it cheap off ebay as we have the same router at work and I am deploying some IP cams there in the near future, for the router at work we have the same problem but a call to our ISP may sort this. The seller said it was from Woav but they don't want to know as the previous owner has no account with them now neither do I.
I tried programming an OpenWrt firmware to the chip but it never booted so went back to the original image. Here is the original image for the chip (cFeon EN25Q64). From some reading it seems the systum is linux based.
https://www.dropbox.com/s/mmfbf4bu1px3tsd/Technicolor%20TG582n.rar?dl=0
If someone can help me out here it will be greatly appreciated.
Steve

I found this article flashing-generic-firmware-on-a-technicolor-tg582n which says the username is ‘Administrator’ and the password is the serial number printed on the bottom. I can confirm this for my router.

Related

USRP not visible in RedhawkSDR

I have an Ettus E312.
I want to talk with it using the RedhawkSDR IDE.
There seems to be little documentation on this. The Redhawk manual doesn't include any tutorials. It's all just guess work to the uninitiated.
I found this setup guide on the GEON website: https://geontech.com/redhawk-sdr-and-an-ettus-e310/
However, I'm having trouble getting the device to appear under the active domain in the IDE. I have flashed the SD card, and updated the domain IP address on both omniORB files (host and USRP) as per the setup guide.
Once this is working, it is still not clear how to proceed...
Could someone please point me in the right direction??
Many thanks
The Virtual Machine NAT was confusing things!

Fear of mac Spoofing. Two Mac addresses appearing on Router page with only 1 digit variation

As stated in the header, but to expand, i have been having connectivity issues and as paranoid as I can get i wanted to see if there was any foulplay as I was finding alot of strange, sporadic appearances of Wifi networks in my vicinity.
Prior to these networks appearing I had no connectivity issues. Regardless, to simplify and get to the point, I went to take a look at the attached devices on my router administration page to sus out any potential intruders.
I've just come up to see two mac address appearing on the list, however I am the only connected device. To Clarify I am connecting to a Wireless Extender:
This is where the issue is: The two Mac Addresses are ALMOST ALIKE save for a 1 digit variation. However what is interesting is that the Mac address that is not my NIC's original physical address is assigned to my IP and Vendor {MSI} while my original Mac address is listed as an unknown.
(I have attached the image of my devices page below to show this.)
Is there a possibility that I may be Mac Spoofed or am i being too worried. I am not familiar with protocols or measures used by routers as I am a home user. Perhaps the router needs to duplicate my mac address and amend it for internet connectivity?
I may have not explained my setup properly and will do so if requested.
I appreciate your help Stackoverflow and apologies for my newbie inquisitions.
Regards
Attached devices list
This question should be better to Security Stackexchange.
EDITED
It seems maybe is not a spoofed mac. Sometimes some devices have two mac addresses. Usually because of the dual 2GHz and 5GHz bands.

Auto-launch a program on USB key insertion

I am looking for a way to store a script on a USB flash drive that will be executed she the device is inserted in a computer.
It should be a script that keep the files on my USB key up to date with their source on the web.
I have identified two main issues :
Security issue
Platform agnostic issue: may be easily solved by a test of the platform
Can anyone give me a hint for my research?
Thanks
That is impossible on the newer versions on windows. But you could try something like a bad usb, it's a usb that you can program to act like a keyboard, try looking it up and see if it is something you can use. If you think it can be used you can create it your self or buy one, if you choose to buy i would recommend either a rubber ducky or a malduino.
Hope it helps ;)

can the license information stored in Dongle be taken out of it and stored on a file or something?

We have a registered PC based application that needs a Dongle (hardware that gets plugged on the printer port) to start and execute. The vendor who provided us this application and Dongle, does not make or work with these dongles any more, since they are very old technology, and would not help us in this aspect.
So my question is --> is it possible to read the security code from this Dongle and store it in a file or something on the PC. We also do not have the source code of the application. Can we change the call in the application to read the security key from this file instead of trying to read it from the Dongle attached to the printer/parallel port.
Sorry for the vague question but we are very desperate to get help on this problem as out application has 16-bit code and it would not be supported by Windows 7 which is 64 bit. Thanks!!
The LPT security devices don't just contain information but usually include a processor and perform certain operations. Dongle emulators were developed when dongles where more widespread, but as they were based on reverse-engineering, they didn't work exactly right.
To answer your question, no, what you need is not possible. You need to start thinking about migration to another application. A temporary solution would be to have a copy of older OS running in virtual machine and to have your application run in this virtual machine. Such solution will work for another 5-10 years for sure, and I think it's enough for migration.

Network Security for MAC-OS X

I have a new set up for software development for iOS devices. I am using MACs for the development and the company may grow from three employees right now to 20 in near future. I want to make the MACs secure so that the client code is safe and does not leave office.
Few ways I can think of a notorious employee trying to do that is
Get it on USB-key/External-Disk
Burn it on CD/DVD
Transfer it to a bluetooth device
Transfer it to Infra-Red Device
Email it as an attachment
Upload it to Dropbox or any such service
FTP to a remote server
To handle this one by one I need to do following
Disable USB access to user accounts (only admin allowed to insert a new device). But often times we need to stick in iphone/ipod touch to do on-device testing. How can I restrict the devices or get notified when someone tried to put a foreign device in any of the USB slots?
Disable CD/DVD write functions except for admin. Can I do this?
Disable bluetooth access. And if someone tries to pair a device, can I get notified or maitain a log?
Wireless keyboard and mouse use Infra-Red (IR) technology. How can I limit these devices?
Need to block all outgoing emails except company emails. Can I keep a tab on all outgoing traffic (may be by file size) so that I know some one is trying to up-load a file?
Again disable access to such website. But then every 15 days a new service springs up. How do I tackle this?
Disable ftp outgoing services. Can I do this?
Importantly is there a monitoring software that will allow me to do this? I don't mind paying. But since this is a start-up I cannot spend a fortune on this. And of-course I prefer open source solutions for the control it gives me to extend and scratch my specialized itch :)
Finally I hope I wont be judged as a bad boss or something. I am all for developer freedom but we are into consulting business and protecting client code takes priority.
Thanks for your time and looking forward to your help.
Dev.
If you don't trust your developer not to run off with your source code, don't hire them. They can find a way around your "solution"
If you can't trust any developers to not steal your source code, work alone. Anything known by two people is no longer a secret.

Resources