07-29-2002 07:09 AM - edited 03-02-2019 12:14 AM
Anyone know of ways to prevent hacking cable modems that run DOCSIS config files?
Thnx. Blm
07-29-2002 08:15 AM
A few different ways to help ensure. My first way is to *not* use Motorola Surfboards as your primary CPE modems. There is a lot of stuff out there designed to work specifically with Surfboard modems. Do a google search for "uncapping surfboard" - it's scary. I personally have not been able to uncap an RCA cable modem after many hours of trying to do so.
The second is to enable the shared secret in your config file, and on the UBR. Pick a non-dictionary word, and from the cable interface, type "shared secret password" where password is your specific password. Then, type the same password in your config file generator.
There are other little things you can do, but these two do the most for you.
HTH,
Justin
07-29-2002 11:00 AM
Justin, Thanks for the reply. Actually, even with strong pwds in the config, the cable modems are still compromised. Any other suggestions you can share would be appeciated ... Thanks!
Blm
07-29-2002 11:27 AM
Maybe they're being compromised because the UBR isn't verifying the secret?
Does this apply to you?
http://www.cisco.com/warp/public/707/cmts-MD5-bypass-pub.shtml
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: