james.wilson Posted November 13, 2013 Posted November 13, 2013 id guess its like the apn settings for my phone, thats global for the networks. securitywarehouse Security Supplies from Security Warehouse Trade Members please contact us for your TSI vetted trade discount.
cybergibbons Posted November 13, 2013 Author Posted November 13, 2013 I got a response: Generally speaking, you will see this on the display if the 'B' button has been pressed on power-up or if the ICCID read from the SIM does not match the one stored in the NVM. This function sets the SIM card to 'auto' mode, enabling it to attach to any network. If you have any further queries, please do not hesitate to contact us. Must be a new thing. Guess I will check the NVRAM agains the SIM but I thought they were the same. I have a blog, some of which is about alarm security and reverse engineering:http://cybergibbons.com/
matthew.brough Posted November 13, 2013 Posted November 13, 2013 Webways are also global www.securitywarehouse.co.uk/catalog/
cybergibbons Posted November 13, 2013 Author Posted November 13, 2013 id guess its like the apn settings for my phone, thats global for the networks. They seem to have gone for a fairly strong password though, suggesting it should be at least a bit secret? I honestly don't know what it means if the APN password is known. I have a blog, some of which is about alarm security and reverse engineering:http://cybergibbons.com/
Joe Harris Posted November 13, 2013 Posted November 13, 2013 Good to see a full and frank response. We should applaud that approach.
datadiffusion Posted November 13, 2013 Posted November 13, 2013 I remember that 'locked down to the network' Ericsson 3G router I had used on the boat had the global password 'r0ger5' for root on the linux based firmware (its a Rogers unit!) FFS!! Hope its something a bit better than that. So, I've decided to take my work back underground.... to stop it falling into the wrong hands
cybergibbons Posted November 13, 2013 Author Posted November 13, 2013 Yeah it's like Q1827746 or something like that. So not trivial to guess, but stored in the plain in the EEPROM and the .prm files that are saved from the programmer. I have a blog, some of which is about alarm security and reverse engineering:http://cybergibbons.com/
datadiffusion Posted November 13, 2013 Posted November 13, 2013 Ah right, the password file on the Rogers unit was very heavily and properly encrypted, it was only because it was so stupid the unit got guessed and cracked for all to exploit. So, I've decided to take my work back underground.... to stop it falling into the wrong hands
Recommended Posts
Archived
This topic is now archived and is closed to further replies.