Useful... Internet Safety

How to change the connection password on a zte wifi router. Setting up a zte f660 mgts router: step-by-step instructions Zte modem default password

A Wi-Fi router provides devices (smartphones, laptops, computers) connected to it with a local network and the Internet. If after installing the router you have not set a password for your Wi-Fi network, then the network is public and anyone within the network’s range can connect to it. Thus, your neighbors or employees of neighboring offices at work can connect to your network and use it, which will lead to losses in Internet speed.

If you already have a password, but someone found it out, then you have no choice but to change the password on your Wi-Fi router to stop the free distribution of your Internet. In this article you will learn how to change the password on all popular Wi-Fi routers.

Procedure for changing the password on the router

As a rule, the configuration of the router and its installation are carried out by people from the provider. However, after some time the user may experience the following problems:
1. The data transfer speed begins to drop significantly.
2. Even when no one in the house is using the wireless network, the WiFi network indicator lights are still blinking.
3. If the provider charges for the amount of information transferred in excess of the norm, there is a constant debt on the account, which some attribute to their inattention at first.

All these cases indicate only one thing - someone unknown was able to connect to WiFi by guessing or hacking the password. If the password is not set, then there is no need to even guess.

The way out of this situation is to change the password to a more complex combination. However, we note that hacking a WiFi network password is quite difficult. Therefore, often the cause of problems is the human factor - someone you know, when they were at your home, asked for a password to connect their device, and then told others about it (it’s worth remembering that all devices save passwords for WiFi networks). How to change the password on the router and how to make the network more secure?

When considering the issue of changing the WiFi password, for example, from the Rostelecom provider, you should understand that providers do not produce network routers, but only enter into agreements with various manufacturers for their supply to their customers. You can set a new password on all network routers, but the changing process depends on the characteristics of the router itself.

Provider Rostelecom provides its services with the installation of the following network routers:
1. D-Link.
2. TP-Link.
3. HUAWEI.
We will also look at the process of changing the password for routers from other manufacturers.

Changing Wi-Fi password on a D-Link router

Despite the fact that you can find a huge number of router models on the market from the manufacturer D-Link, you can set or change the WiFi password using the same recommendation. This is due to the fact that the software part of the system remains unchanged, and the models differ only in their characteristics.

The differences may be minor, often affecting only the design and location of menu items.

One of the most popular models from the world famous manufacturer D-Link is the DVG-5402SP. The Rostelecom provider also allows you to install this model. The password change process can be divided into the following stages:

1. Launch any browser, for example Mozzila Firefox or Google Chrome.

2. The model in question has a non-standard router address that you should go to to display the settings panel - https://192.168.8.254. You can most often change the password and set other settings in other models of this manufacturer by going to https://192.168.0.1 or https://192.168.1.1. Setting up a WiFi network occurs through a browser. After going to the browser address, the router panel should open.

2.After you have entered the control panel, go to the WLAN tab. You need to specify the SSID Name (the name of your Wi-Fi connection) and WPA PSK password. After making changes, you must click Apply.

Changing the Wi-Fi password on an ASUS router

1.Open any browser and go to https://192.168.1.1. Specify Admin as the login, and Admin as the password.

2. In the left menu, go to the “Wireless Network” setting.

3. Enter the name of your Wi-Fi network in the SSID field, and in the “authentication method” item - WPA2-Personal. This is the most secure method at the moment. In the WPA Pre-Shared Key field, enter the new password for the network and click Apply.

Changing the Wi-Fi password on the ZyXEL router

1. Go to https://192.168.1.1. This address is applicable in almost all cases. Only some models have a different home network address; you can find it on the back of the router itself.
2. Next you will see the login panel or the menu itself. If the login panel is the password and login “admin”. If this value is not suitable, we reset the settings to factory settings using a special key on the router case.
3. In the router control panel, go to the “Wi-Fi Network” menu, “Security”, select WPA2-PSK protection and enter a new value and click apply.

4. After this, you should reboot the router for the changes to take effect. It is also important not to forget to click on the save button before carrying out the reboot process. Otherwise, you will have to repeat the process again. In some cases, it is recommended to reboot the router itself, not through the virtual panel, but through the button on the device body.

If devices cannot connect to the network

After changing the password, a situation often occurs when it is no longer possible to connect to the created network. The problem is that the login information has changed, and all devices are trying to connect using the old parameters. At the same time, some devices begin to slow down, produce strange errors, and see the network under a different name even in a situation where this data was left.
The way out of the situation is quite simple - you should delete the network on all devices, and then search for access points again and connect using a new password. All problems will immediately disappear and the device will work stably again.

In the capital of our vast Motherland, an unprecedented in scale project is underway to introduce Gpon technology from the MGTS company under the auspices of the fight against copper wires and for affordable Internetization of the population. The number of MGTS subscribers in the city of Moscow exceeds 3.5 million people, it is assumed that everyone will be covered.
The idea is wonderful - optics to every apartment, high-speed Internet, free connection and a Wi-Fi router as a gift (though officially without the right to reconfigure it, but more on that later). The implementation of such a large-scale project (a similar device is installed in every apartment where there is at least a landline telephone from MGTS), as usual, was not without holes in the planning, which could be costly for the end user. Our company became interested in the information security issues of clients of such a large-scale project and conducted an express study, the results of which we offer to the public to inform the public about existing threats and measures to combat them at home.

2. Life in the palm of your hand

The threats turned out to be not at all illusory and insignificant, but systemic and the risk potential is difficult to overestimate. I want to warn happy MGTS subscribers against the threat to their privacy hidden not only in the ZTE ZXA10 F660 router, kindly forcibly donated by the provider (however, the less vulnerable Huawei HG8245, also installed for subscribers, is still in no way protected from “default settings”), but and in the organization of connecting subscribers to new communication lines.
This is what the operator-installed equipment options look like:

Less dangerous Huawei HG8245

Much more “holey” ZTE ZXA10 F660

There are several problems here of varying degrees of danger, some you can solve on your own, others you can only pay attention to. Let's list the main points that will help an attacker hack your home network (provided that you are an MGTS Internet subscriber):

  • The WiFi password is your phone number (during the study, we encountered lazy installers who left the router’s MAC address without the first 4 characters as the password).
    This means that hacking Wi-Fi using the brute force handshake technique using the mask 495?d?d?d?d?d?d?d will not take much time, we are talking about a matter of minutes and for this it is not at all necessary to be near the target of hacking all the time . It is enough to intercept the moment of connection between the subscriber’s wireless device (smartphone, tablet, laptop) and the router, and the rest can be easily done on your home computer. This operator's miscalculation at the connection level is a gaping hole that opens the home networks of millions of subscribers to attack by intruders. This problem can only be solved locally - by independently changing the access point password to a more secure one, but the next vulnerability is much more serious, since the subscriber simply cannot effectively influence it on his own.
  • We are talking about a vulnerability in the WPS wireless configuration technology, which is enabled by default on ZTE ZXA 10 F660 routers. And if in the case of an organizational miscalculation that compromised user networks at the password level, an attacker cannot hack subscribers en masse, dealing with each one separately, then by exploiting the WPS vulnerability of a router of this model, network hacking can be put on stream. The technology works as follows: for a WPS connection, a PIN code consisting of 8 digits is used. When the correct PIN code is received, the router gives the real Wi-Fi password. Not only can this PIN code be hacked using the well-known Reaver tool much more efficiently and faster than a complex WPA2 password, but the main problem is that it is the same for all ZTE ZXA10 F660 routers! Moreover, it can be easily found in 10 minutes on the Internet. I repeat - knowing this PIN code (which cannot be changed or turned off), within 3 seconds a real Wi-Fi password of any complexity and type of encryption is obtained, or a direct connection to the subscriber’s network is made. Thus, the “lucky” owners of this particular model of equipment (and the operator has only 2 of them, so the chance is 50/50), even if they set an impossible-to-crack password for the wireless network, will still be hacked in less than 5 seconds due to the imperfection of the technology.

3. What are the consequences for the owner of WiFi hacking?

Let’s leave aside platitudes like “free Internet”, this is not the 90s and people with gadgets usually have enough access to the Internet. So what are the threats? Let's list the most obvious ones:

  • Interception of subscriber traffic, theft of passwords from email services, social networks, messaging programs and other confidential data
  • An attack on the computer of the owner of the point of sale in order to gain access to the user’s files, view web cameras, install viruses and spyware (as a rule, home PCs are much more vulnerable to attacks from within than corporate machines, here are traditionally weak passwords and irregular updates and open resources )
  • Wiretapping of telephone conversations. (Yes, with the switch to unsecured sip this is easier than ever). Now not only intelligence agencies, but also a curious neighbor (or maybe not a neighbor) can record your conversations on a city number due to the fact that the new telephony technology works using the unprotected SIP protocol. For the rapid interception and recording of conversations, all the necessary tools have long been publicly available.
  • Theft of a telephone number - by slightly changing the router software, an attacker can find out the password for a SIP account and use it to make calls on behalf of the hacked subscriber. This is not only the potential for direct loss to the owner of the number, but also the possibility of causing much more serious damage by using the number of an unsuspecting citizen for blackmail, terrorist contacts, or in order to frame the owner - for example, using this number to report a bomb to the police
  • Creation of a large botnet (the number of MGTS subscribers in Moscow is 3,504,874) with the potential of each connection being 100 Mbit/s. Yes, this will require an army of lemmings, but as everyone knows, hordes of biological bots constantly live on various kinds of “vats”, which are regularly attracted by interested parties to various Internet actions, usually of a sabotage nature.
  • Using a random (or non-random) network to anonymously upload prohibited materials to the Internet (Can you guess whose door they'll knock on?).

4. Protective measures

What can you do to protect your privacy in such a situation? There is little you can do yourself, but these are mandatory steps for anyone who does not want to become a victim of a poorly thought out operator campaign.
We will need router passwords that are easy to Google on the Internet, write down:

  • Access to the web interface of the ZTE ZXA10 F660 router – login: mgts,Password: mtsoao
  • Access to the console via Telnet protocol – login: root, password: root
  • for Huawei HG8245:
    default address - 192.168.100.1
    login: telecomadmin, password: admintelecom
  • Through the web interface, be sure to change the password for the access point and its name (the MAC address will still indicate that it belongs to MGTS clients, but renaming the point will reduce the likelihood of matching a specific Wi-Fi signal to a specific apartment)
  • Owners of ZTE ZXA F660 should disable Wi-Fi functionality using the button on the device. At the moment, this is the only way to protect against WPS hacking.

Unfortunately, at best, only a few percent of the 3.5 million users will use these measures, the majority will never know about this article and will remain vulnerable to a real threat for a long time, until something or someone forces the operator to spend a lot money and take centralized measures to correct the technical and organizational shortcomings of the project.

5. Conclusion

What conclusions can be drawn from all of the above? The most disappointing ones are that the largest GPON implementation project (I repeat – we are talking about 3.5 million subscribers!) was carried out without consultation with information security specialists, or these consultations were completely ignored during the implementation itself. Phone passwords, non-disabled WPS with a single key, unprotected SIP telephony, passwords extracted from the WEB interface - are the result of a weak organizational component and complete disregard for basic information security standards. I am sure that MGTS is far from unique in such miscalculations; many smaller network service operators find themselves in the same situations in the field of protecting the data of their subscribers, but the scale of the problem this time exceeds all imaginable boundaries

6. Official reaction of OJSC MGTS

We, as ethical security researchers, are interested in quickly solving the problems raised above. Unfortunately, our concern did not find a response in the hearts of the press service of OJSC MGTS, whom we tried to reach using all available channels. We received only one review - through Facebook, a press service employee assured us that we can publish the existing material with a clear conscience, and then, when answering questions from the press, they will assure everyone that subscribers are safe and their data is confidential.

Wi-Fi is available in almost every home these days. However, do not forget that if the system is poorly protected, your personal information can be used by attackers. To prevent this from happening, take care of the security of your router and change your password regularly. In this article we will look at how you can change your Wi-Fi password yourself.

Password rules

First, let's take a little look at what the network password should be so that unscrupulous people cannot hack it. The network password, if we consider it from a security point of view:

  • should be like minimum of 8 characters;
  • It is best when the security key is made up of uppercase and lowercase letters, and also includes signs, symbols and numbers.
  • Never use your name or date of birth, or a simple sequence of numbers as a password to the network.

If you cannot come up with a password yourself, then you will resort to using a special generator. Finding it is not difficult on the Internet through a search engine. There are many generators to choose from. Choose any one. Having chosen a password, remember it, or better yet, write it down, for example in a notepad.

Now you know a little about how you need to make a password. Let's take a closer look at where you can check your current password and change it to your browser's new security key.

Changing the password

We need to get into the router settings. This can be done through a web browser. To do this, you need to enter the following numbers of the IP address in the address bar of your browser: 192.168.1.1 or 192.168.0.1. You can also find out the IP address on the back of the device at the bottom; the login and password are also indicated here. If the information you need is missing on the router, it can be found in the instructions included with the modem.
There are situations when the user has already changed the password, but has forgotten it. In this case, you will need to reset the settings of the modified router to the original ones. To do this, press the “RESET” button and hold it for 10 to 15 seconds. After holding, the settings will be reset. The modem will restore factory settings.
If for some reason you were unable to find one of the above IP addresses, then go to the Windows Start menu. Here, at the very bottom there is a line “find programs and files”. You must enter “cmd” in this line and press the “Enter” button on your keyboard. A command line will open. You must enter “ipconfig” into it. We find the line “Main gateway” - this will be the router address we need.

If you still have questions, watch the video tutorial below:

Changing passwords on popular routers

Changing the Wi-Fi password on D-Link routers

One of the most common Wi-Fi routers is Link. There are a huge number of D-Link models, among them such as D-Link DIR-300 NRU and D-Link DIR-615, D-Link DIR-320 and D-Link DIR-620 and many others.

And so, we needed to change our old password to a new one. To do this, type the IP address 192.168.0.1 in the browser address bar and press the “Enter” button on the keyboard. A window will open where you will need to enter your username and password. If you have not changed them before, then the standard password and login are “admin”. If you have changed it before, you need to enter your own version.

Appearance may vary depending on the firmware version. Once on a new page, go to me Wi-Fi - Wireless Setup. Next we go to Manual Wireless Connection Setup- Security Settings. Finding the line "Network Authentication" and here we are looking WPA2-PSK. Found, opposite there will be a line "PSK encryption key" and enter the Wi-Fi password there. Choose AES, which is located in the encryption settings, and then click “Change”. The password has been successfully changed.

You have a D-Link ADSL router at home, the following models: D-Link 2600U or D-Link 2650U, D-Link 2640U. To change the factory password here to your own, you will need to enter the following combination of numbers in the address bar of your browser: 192.168.1.1. Next, go to the Wi-Fi tab and go to Wireless - Security(Security Settings).

The next step is to find the line Network Authentication or Network Authentication and choose WPA2-PSK. Opposite the line WPA Pre-Shared Key(encryption key) enter the Wi-Fi password. On the list WPA encryption we find AES and select it. And finally, save the changes.

Changing the Wi-Fi password on TP-Link routers

Now let’s look at the TP-Link Wi-Fi system and how to change the router password in it, for example, in the TP-Link WR340GD or TP-Link WR-741ND, TP-Link WR-740ND or TP-Link WR-841ND models and a number of others. Similarly, as in the above option, enter the numbers in the browser line: 192.168.1.1 Press “ENTER”. A window will open in front of us where we need to enter a username and password to log into the system. The standard, factory login and password are the same - “admin”, if it was changed before, then enter your own.

Next, depending on our router model, go to the menu Wireless or Wireless Network. Then go to the section Wireless Security or wireless network security. Once on this page, check the section WPA/WPA2 - Personal (Recommended). Here we find the line PSK Password, where we enter the new Wi-Fi password. To save the changed settings, press the button "Save".

Changing your Wi-Fi password on ByFly

Let's look at another way to change the byfly password.

Press the button "Start", select the control panel and find the network and internet there. After that, look for the Network and Sharing Center tab and click on it. In the new window that opens, on the left side of the screen we find "Wireless Network Management" and click on it with the left mouse button. Then select the desired network, right-click on it and select “With troops". The settings window for this network will open in front of you. Go to the tab "Safety" and find the password for our byfly. After that, enter the network key here, it is indicated in the router settings. It is done.

Many wireless Internet users are wondering how to set their own password on a wifi router. Select the router model you need in the content and go to settings.

Several factors influence the occurrence of this problem:

  1. The installer did not provide the key;
  2. No security password;
  3. Hacking the secret combination.

All this is fraught with serious consequences. Protection should always be present on the router, since it provides:

  • Security of your personal computer and network-connected gadgets;
  • Improves router performance;
  • Strangers do not use your traffic without permission;
  • No one will get personal information stored on computer equipment.

Changing a key combination is a fairly easy process that includes five main steps:

  1. Open the main page of the device on your computer;
  2. In the settings, find the Wireless/WLAN tab;
  3. In this tab, find the lines SSID (name) and PSK (key);
  4. You need to change them to your data;
  5. Save.

To make it easier to change the password, we offer step-by-step instructions for the most popular router models.

In order for the data change to bring maximum benefit, you must:

  1. Come up with a key combination of at least eight characters;
  2. Use Latin alphabet;
  3. Use numbers, capital and small letters;
  4. First, write down the secret code on paper, and then enter it into the system.

Change the code at least once a month and be calm about the security of your wifi network.

D-Link

Devices from this company are considered one of the most popular. On all models, the access password changes the same way. To do this you need:

1. Launch any browser.
2. In the search, enter “192.168.0.1” or “192.168.1.1” and click on “Enter”.
3. In the window that appears, enter your username and password. By default this is the word “admin”.

4. After identification is completed, access to advanced device settings will be available.

6. Now you see a window where you can change the key to your wifi. Next to “authentication”, select “WP2A-PSK” - the most secure encoding method. In the “PSK” line, enter the secret combination, then in order to change the data, click “Change” and “Save”.

7. After this, reboot the router and then connect to the wifi network using a new password.

Changing the password for other D-Link firmware is almost identical, the same tabs, the same names, only the appearance changes, you can see more details.

ASUS

Asus produces a large range of routers that are very simple and easy to use. To change the cipher, do the following:

1. Launch your browser.
2. In the search field, enter the router address “192.168.1.1” and click “Enter”.
3. In the authorization field, enter “Admin” as login and password. If the wizard has already set a restriction on your wifi network, then enter this data.

4. Go to “Wireless Network”.
5. Now you need to fill in the “Authentication Method” lines. Here you need to set WPA2-Personal, and in the “WPA Encryption” line select “AES”. Now enter the new secret combination into the “WPA Pre-Shared Key”.

To change the access password for newer firmware from Asus, you must:

  • After a standard login to the router settings panel, on the left side menu you need to select “Wireless Network”.
  • In this tab you fill in the SSID - enter any word here in Latin letters, select WPA2-Personal in the “Authentication Methods”, and in the “WPA Pre-Shared Key” enter the new key and click on “Accept”.

Be sure to reboot the router and work under the new wifi password.

TP-Link

The devices of this company are distinguished by high reliability, long-term operation and simplicity. Every user can change the password on it very easily and quickly. To do this you need:

1. Launch any convenient browser.
2. Enter 192.168.0.1 or 192.168.1.1 into the browser address bar and press ENTER.
3. In the authorization field that appears, enter the standard word “admin”. If the wizard did not change the standard password when installing the router, then enter its data.

4. After entering the correct login and password, the main device settings window should appear.
5. Here find the “Wireless” tab.
6. Then go to “Wireless Security”.

7. Enter a new secret combination.
8. Click on “Save”.
9. A red inscription with an active link “click here” will appear.

10. After clicking on it, you will see the Reboot button. Clicking here will reboot the modem.

11. After turning it on, enter new access data on your gadgets and use a secure wifi network.

ZyXEL

A very popular router in our country. All users note it as a high-quality modem, pleasant appearance and easy operation. Today there are two types of devices from this manufacturer, and changing the key for them has slight differences.

1. Open your browser.
2. In the search field, enter 192.168.1.1 and click Enter.
3. To authorize, enter “admin” in the “login” field and “1234” in the “password” field, then “Login”.

4. To change the password, go to “Wi-Fi Network” and click on “Connection”. In the “SSID” field that appears, enter the name of your network and click “Accept.”

5. In the same window, select “Security”. In “Authentication” set “WPA-PSK/WPA2-PSK”.
6. The correct password format for the wifi network should be “ASCII”. In this field, carefully enter the new combination.
7. To save, click “Accept”.

For another firmware version, the input remains the same, but the further steps are slightly different:

1. To go to the router settings, click on the wifi icon on the bottom panel.
2. Open the “Access Point” section.
3. Type “Network name (SSID)”.
4. In “Network Security” select WPA2-PSK.
5. In the “Network Key” enter the new code.
6. Click Apply.

7. Now reboot your device.

ZTE

These instructions are suitable for all models of this manufacturer.

1. Check the connections between the router and the computer.
2. Open your browser.
3. Enter 192.168.1.1 in the address bar and press ENTER.
4. The system will require authorization. To do this, enter the word “admin” in the Usename and Password line.
5. After entering, click Login.

6. Go to the “WLAN” section, where you need to select “Multi-SSID Settings”.
7. Find the line “SSID Name” and enter any word there in Latin letters.
8. Save with the “Submit” button.

9. In this window, find “Security”.
10. Next to the “Authentication Typr” field, select the encryption type WPA2-Personal.
11. In the “WPA Passphrase” line, enter a new password.
12. Click “Submit” to save the changes.

Huawei

Changing the key on this router is just as easy as on the others:

1. Launch the browser.
2. In the address bar, enter 192.168.100.1.
3. The authorization window will ask you to enter data. Most often these are the following combinations:

  • telecomadmin\admintelecom (the most common).
  • root\admin.
  • Login - telecomadmin with different keys - NWTF5x%RaK8mVbD, nE7jA%5m, NWTF5x%.

5. In the “SSID Name” line, enter your own name for Wi-Fi.
6. In the “Authentication Mode” line, put WPA2Pre-SharedKey and immediately enter a new password.
7. Click “Apply”.

Sagecom

Changing the key on this device is a standard procedure:

1. In the address bar of an open browser, enter 192.168.1.1.
2. To identify, enter “admin” as Login and Password, click “Login”.

3. A new window will appear. In these settings, find “WLAN Settings”.
4. Select the “Main” item, and next to “SSID”, enter a new name for WiFi, if necessary. Save.

5. Immediately go to “Security”.
6. “Select SSID” should contain the name you entered a few seconds ago.
7. In “Authentication” select “Mixed WPA2/WPA-PSK”.
8. In “WPA/WPAI password”, enter new data and save.

Reboot your device, update the secret combination on your laptop and gadgets, and use a secure wifi network.

Altel 4G

Changing the key on this router is as easy as on other devices.

1. Enter 192.168.0.1 or http://m.home in the browser address bar.
2. The system will require a password. There will be a standard word here: password.
3. Click on “Log in”.

4. Go to “Settings”.
5. Here select “Wi-Fi Settings”.
6. In the line “Wi-Fi network name (SSID)” write any word in Latin letters.
7. Save your actions with the “Apply” button.

8. In this window, select “Security Settings”. Set the mode shown in the image below. In the empty “Password” line, enter the new security key.

9. Click “Apply”, reboot the device and then you can continue working.

https://youtu.be/SA4iE2EloUs

Found a typo? Select the text and press Ctrl + Enter

After a year, I can say that I have no complaints about the quality itself - for all the time I used the Internet and television, the TV did not work only one day, and the Internet worked all the time. The speed is excellent, the quality is decent, in general, I’m satisfied. Pah-pah so as not to squawk. But that's not what we're talking about. And about the fact that somewhere a couple of months later, in August 2013, an article appeared on Habré, which described the downright horror-horror consequences of switching to GPON, and this article concerned me directly, since I had exactly the described there is a “leaky” ZTE ZXA10 F660 router.

But I didn’t notice this article, and lived quietly, without particularly worrying about anything, for almost a year. Suddenly, in May 2014, a book appeared describing the same horrors. Which I, too, would have missed in the same way (since I knew nothing about him), if he, in turn, had not been quoted in his note by Alex Axler, whom I already read almost on a daily basis. One way or another, the issue raised was important, since it directly concerns security, and therefore such widespread coverage of the problem is completely justified. On the other hand, MGTS’s responses, and indeed their reaction to what was happening, gave reason to assume that someone was simply muddying the waters, and respected bloggers were simply quoting information without checking it. As well as the absence of other references on the Internet, which represent individual studies, and not copy-pasting of these articles, they were simply absent. Therefore, armed with all the knowledge available to me, I sat down to hack my own ZTE ZXA10 F660 GPON router, provided for free use by MGTS, via its WPS pin.

I won’t explain what WPS is here, because in my opinion it is a) generally a leaky and unnecessary technology, since it is much easier to just enter the default Wi-Fi password indicated on the bottom of the router and b ) this has been described perfectly for a long time, and more than once.

But we have a purely academic interest, we break our own router (well, in general, it’s MGTS’s, but in this case that’s not the point, since there is no interference in its settings). First I tried to find the PIN code on the router itself, there should have been a sticker like

There was everything on the router - from the WiFi password to the MAC address, but there was no pin. Then I climbed onto the mezzanine to get the box from the router. There was no pin on it either. Maybe in the instructions? I took out the manual and it’s not there either. It struck a chord with me, I went online and downloaded the instructions for the ZTE ZXA10 F660 - both the MGTS one and the factory one in general. I didn’t find it in them either.

Well, okay, in the article on Habré it was written that you can Google a pin code in 10 minutes. I sat down to google. First I googled zte zxa10 f660 wps pin, crap. Nothing on 10-15 pages. Then - zte zxa10 f660 pin-code - again nothing. I looked into images on Google - I think maybe there’s a sticker there? Also horseradish. I suffered for half an hour, but it turned out to be much simpler - I just had to enter f660 wps pin in Google, without starting about zte, so that the third and fourth link would come up with the pin code for the ZTE ZXA10 F660 - 13419622.

If we omit all the bla-bla-bla in Sergei’s article about speed, the default password and the 6th channel (which in my case is not such - and the channel is automatically selected for me, and the speed is quite normal, and the password was set for me - what I asked for, and not just a phone number), then there is something very useful in it. Namely, an indication that the WPS pin code for the ZTE ZXA10 F660 router starts with 1341. So now I was sure that I had found what was necessary, since I had to raise Linux, install Reaver and other crap in order to find a pin, and do in 10 hours what, as written on Habré, can be done in 5 seconds:

Thus, the “lucky” owners of this particular model of equipment (and the operator has only 2 of them, so the chance is 50/50), even if they set an impossible-to-crack password for the wireless network, will still be hacked in less than 5 seconds due to the imperfection of the technology.

Naturally, I had no desire.

It is clear that if we consider the subject from a general point of view, the question is not even whether the pin is known or not, but whether the WPS function is turned on at all or not, and whether the user can turn it off independently or not. In other words, the problem with WPS is divided into several subsections:

  1. If WPS is available, the pins are different for each device, and the user can disable it - this is not so scary, because In this case, it will not be possible to connect from Windows so easily; you will first have to brute force the PIN code from Linux, and this is only available to those who have nothing else to do. Although there are plenty of those too. So, even in this case, it is better to disable it rather than change it.
  2. There is WPS, the pins are the same for each device, but the user can disable it - in this case it is necessary to disable it without fail, since it will be possible to connect using software for Windows. The leaky, non-MGTS ZTE F660, or rather, not only it, all D-Link DSL 2640NRU have a completely similar problem, with pin 76229909 or 46264848 it connects with a bang, people just don’t know that it’s better to disable WPS. Yes, there are other examples.
  3. In the specific case under consideration, the pin does not change in the router settings, but what’s worse is what both Sergey and Habré tried to shout about - WPS cannot be disabled by the user independently. And the question arises: was it disabled during one of the remote firmware updates by MGTS. Because otherwise - as already written, the question comes down to whether it is possible, without any hassle at all with selecting a pin, to simply hack Wi-Fi from Windows 7 in 5 seconds and connect to wi-fi from MGTS.

This is what I wanted to check.

After the pin was found, the second known ambush was that in Windows 7 PIN code authorization is used only for setting up an access point :

If, when you try to connect, Windows determines that the device is using standard factory settings, it will offer to configure the router.

If the wireless network settings have already been configured ( and this is exactly the case with all MGTS routers), then it is necessary (without considering the above Linux installation):

  • or press a button on the router, which is impossible for attackers - since the router, to put it mildly, is not freely accessible

  • or enter the WPA2-PSK key set at the setup stage
  • or use third-party utilities to transfer the pin to the router

Naturally, if we enter our PIN code 13419622 from the ZTE ZXA10 F660 into the Windows “Security Key” window, then Windows considers that this is not a PIN code, but a password to Wi-Fi, and of course, it does not connect. Therefore, download and try to connect via

I used Jumpstart because it comes with a very handy Dumpper utility. Its two disadvantages are that a) it is in Portuguese (but everything is clear as it is), and b) that it also carries with it an unwanted update that forces Chrome and other browsers to open the google.ru page by default. , and search through the page trovi.com or trovigo.com, showing a bunch of advertising. In this case, you cannot simply change it back, and you will need to reset all browser settings. However, it is necessary to clearly understand that Trovi Search is not a virus, not a hijacker or malware, as they write in some places, but simply unwanted software installed as part of other free software that will show advertisements and sponsored links in search results , on the home page, and will also collect and send search queries to its servers to collect statistics. Therefore, antiviruses do not see it. However, keeping extra crap, even this kind, on a computer is also not ice, and therefore, details on how to remove trovi.com (a matter for one minute) are said and shown in this video instruction:

I don't know if QSS includes this same crap, because... I haven’t tried it - if anyone decides to try it with its help, please post.

To connect, it is better (although not necessary) to disconnect from all networks, because... If, for example, your phone still distributes the Internet, and your laptop connects to it, then until you disconnect, it may not be possible to connect to anything else using the pin.

So, the most important result - really disappointing - I was able, without any WPA2 passwords, by simply downloading and installing Jumpstart, and entering the pin code 13419622 to connect to my router via pin in 5 seconds:

after which I went to the network properties and looked at the WPA2-PSK password there.

Even easier than I once did.

A little later, I found a link on one of the hacker sites, which stated that PIN 13419622 is only suitable for routers with a BSSID (Mac Address) starting with 34:4B:50 and 2C:26:C5, and on DC:02: 8E (just my case) - updated ZTE, possibly with different firmware, in which WPS is blocked.

So, I can say with confidence (since I got my neighbors involved in this matter and checked it on their devices) that several DC:02:8E:B3 model number: 123456, model name: broadcom, including mine — all also full of holes; but DC:02:8E:D2 and DC:02:8E:D5 model number: EV-2012 model name: onu are fixed, and they are no longer connected to with this pin. So there is an opinion that someone was lucky, since MGTS either remotely disabled the enabled WPS on routers by downloading new firmware for them, or corrected this bug in some other way, or did not fix it, but only made the selection a little more difficult by simply changing the pin (as I already said, I have neither the desire nor the time to check for 10 hours while picking it up). And someone, like me, had the fate of being left with a completely leaky Wi-Fi that could be hacked in 5 seconds just from under Windows. By the way, the firmware on mine is 2.21, although I know for sure that there is already 2.3 - and maybe a later one.

Therefore, I have a big request - if you managed to connect to your router using the specified method, please write in the comments. And of course - let's contact MGTS with a link to this article - let them correct it (which I will do in the near future, I will inform you about the results). In the meantime, you can either live with a leaky Wi-Fi (in the days of ADSL there was a theme with FON, when users even provided free access via Wi-Fi), or, as a last resort, put filtering by Mac address for all their devices (also not a panacea). Well, or install an additional access point on the wire without/with switchable WPS.

And further. I didn’t come up with anything special, but simply collected and structured the information available on the Internet. Because the kul-hackers already know this, but ordinary people treat security issues with unforgivable carelessness. All files and descriptions are posted not to answer the question “how to hack Wi-Fi,” but for the sole purpose of allowing everyone to check how secure their own network is. Remember that if you are going to hack someone else's Wi-Fi using this method, then this, like any other unauthorized entry into someone else's network, entails criminal liability. Based on the router log, you will still be identified. If you want to help a neighbor, first ask his consent. Use this article as a weapon of self-defense - for defense, not attack.

And remember, if you do not have the goal of distributing the Internet to everyone, and your router allows this, be sure to disable WPS. Even if you are not on MGTS GPON.