Heh this "hack" is nothing hunny. I was able to figure out Cyberia ADSL and HDSL usernames and passwords thanks to Cyberia's stupidity. Most cyberia DSL users turned out to have password for their account 12345678. I figured out the username L number pattern, and voila, access to their ADSL account :)

I was able to open at least 27 accounts and heck there is more to come. I wonder if I put the L number and password on my ADSL router, would I use internet off of their account? Hmmmmmm :)
I wonder if I put the L number and password on my ADSL router, would I use internet off of their account? Hmmmmmm :)
This is easily traceable by the ISP. I wouldn't advise using someone else's DSL account on your own phone line.
I know I'm just questioning. Anyway I don't think it will work especially if you're connected to another ISP. I think Ogero sets each account to 1 specific phone line.
worked fine for me =D thanks! but my neighboor's internet was 128 >.<
nuclearcat wroteTKIP is not secure (it uses some ciphers as WEP, but just different way). Use AES.
I actually found out I was using AES when I went to the settings page to change it :P I don't know why I thought I was using TKIP.
One thing I never noticed before is the "Both" option when choosing the cipher type. Any idea on how this works ?
Probably during negotiation it will use cipher/type that client will prefer.
6 days later
I finally got to login to my router's configuration! It was configured to use WEP. I changed it to WPA-PSK with AES as the encryption method.
Kassem wroteI finally got to login to my router's configuration!
How?
Samer99 wroteYou don't need the Administrator username or password to be able to change the SSID and the WEP/WPA keys, just login as a User (Username: user / Password: user)...
I did that. Previously, it never worked, but today it did. Lucky maybe?
GreenM wrotewhy not WPA2-PSK?
No idea. I just know that WPA is good so I chose it. Also read that WPA2 is no different from WPA except that it enforces the usage of AES as the encryption algorithm. Although that doesn't make much sense, that's what I read. If someone who is more knowledgeable on the subject would explain the difference, I'll be thankful.
Hey Guys, Blink is not secure as you think, me (my self) I'm using a Hacked Blink :P 1 Mbps lol
and I've opened multiple Blinks for Family & Friends in Multiple Areas, it's not secure at all.

The reason it's not secure is that Ogero is just using the Default WEP key provided by The Manufacturer of the Modem which happens to be THOMSON lol
This is exactly why I turn my thomson's wifi off, and just attach it to my laptop via cable. Yes you can turn it off by pressing the middle button for 15 seconds. I even heard there were some programs that gather up the bandwidths in the area and uses them, not sure how true is that, but I know someone who is doing it. I dont approve of it, nor of the cheap lowlife doing it.
can any one post what tools you used the crack the hash and re-hash it ??
5 months later
im currently @ 3ash2ut and am using a 256K Ogero Blink Wireless connection and i hacked it via feeding bottle :P
I think (and hope) that this topic is meant to show us the dangers of the pre-configured, insecure routers Ogero is giving to its customers, and not to promote theft. So please, guys, we're not thieves around here, I think the purpose of this topic is to enlighten regular users to beef up security and not rely on the unreliable default settings that come with their routers, protecting them from the "occasional snooper".
BLink routers can be easily hacked by the hash written after the word Blink....i got applications that does the calculations and in about 7 seconds you can get any blink password you want
Where can i find some of these applications ? I found some of these but they need a dictionary file
6 days later
First thing you do when you install and ogero dsl modem:
1-change you ESSID
2-change your passowrd

bingo your secured....almost.
Correct are:
1. Change from WEP to WPA2
2. Change SSID
3. Change key/password