This was not my intention I was just trying to look at it from a ground 0 perspective. I have A controlled environment were I have the answers all ready but a realistically attacker would not I just was curious how the "Magic" works.archangel.amael "Might be a good idea to re-read the rules because this post makes you look suspect"
LOL ya I am a noob but even I know that muchJohnMa69 "You should KNOW YOUR Router's name and company cause it says so on your setup page"
So say for example I have a netgear router and I changed the name to notnetgear then when i use cowpatty with a net gear rainbow table its not going to work because its no longer default name netgear ?JohnMa69 "If I remember corretly, those tables are precomputed tables for default router names"
Thats really interesting i will most defo look into that thxwif1bust3r "How about bypassing the router web interface login completely? I tried it with one brand, and was successful. Most routers do not have much security on their web interface login by default. Some only use basic redirection for login authentication, while others use ntlm. Some even have the routers web admin interface accessible from the WAN interface by default, and so eventually people came up with stealthy worms that target home dsl routers. It would be nice if manufacturers would create random administrator username and password for each device coming out of their factory. They just have to write it in a sticker attached to the device. This way, hackers won't find much use of the phenoelite-us.org default password list."