Asterisk VoIP PBX allows you to setup your dialplan to route calls to different places depending on the time of day.
I setup a system in the UK which has British summer time / daylight savings time. (BST). The documentation on Asterisk.org is always missing examples. The examples on the incredibly helpful voip-info.org didn’t contain any information about timezones. Googling also didn’t reveal much.
Eventually I managed to find the right Google words to dig up a blog.
The correct use of timezones for the UK is:
same = n,GotoIfTime(8:30-17:00,mon-thu,*,*,/usr/share/zoneinfo/Europe/London?helpdeskopen,1)
same = n,GotoIfTime(8:30-16:00,fri,*,*,/usr/share/zoneinfo/Europe/London?helpdeskopen,1)
same = n,Verbose(1, "Helpdesk is in night mode")
same = n,Playback(duty-manager-details)
exten = helpdeskopen,1,Verbose(1, "Helpdesk is in day mode")
same = n,Playback(pls-wait-connect-call)
Obviously modify to fit your needs.
Until I found the helpful blog I had assumed that the timezone would be something like “BST” or “GMT” or “UK”.. I wouldn’t have even though of trying a timezone (zoneinfo) file!
Examples in documentation go a long way to reducing the difficulty of learning new things. I get frustrated that voip-info has been left to do a lot of the heavy lifting in terms of Asterisk examples and documentation.
It has been a while, I’ve previously written about similar scams in 2021 and earlier. I stopped being able to find active sites towards the end of 2021 and, sadly, lost interest in checking after a while. A recent comment on that page has highlighted that they’ve finally returned.
Here are sites which I believe are scams where they will take your money (often by Stripe card payments) and never deliver anything. If you paid via this method you should be able to do a chargeback via your card company for goods not delivered. A few of the sites don’t even offer card payment and ask for direct bank transfers. If you made a direct bank payment it becomes a lot more complicated to claim the funds back.
In any case, if you’ve been a victim it is important you raise a case with ActionFraud. This won’t do anything specific but the more people who complain about a type of fraud or a specific website the more likely it is that the police will be able to do something about it. If you don’t report it then you leave it wide open for others to become victims; help others and yourself by reporting loss and fraud to ActionFraud!
Likely fraud and scam sites:
akielectronics.co.uk – Registered 16th November 2021.
bscgadgets.com – Registered 16th November 2021.
gadgetspad.co.uk – Registered 23rd November 2021.
gadgetsaids.co.uk – Registered 5th December 2021.
chappliances.co.uk – Registered 2nd January 2022. (Related keyword “daniel”)
dynamicappliances.co.uk – Registered 8th January 2022. (Related keyword “odessy”)
digitalstoreups.com – Registered 11th February 2022.
appliancesaheadltd.co.uk – Registered 20th February 2022.
gadgetslondon.co.uk – Registered 1st March 2022. (different scam group? Related keyword “vibesvilla”)
electsales.co.uk – Registered 4th April 2022. (different scam group? Related keyword “vibesvilla”)
generalgadgets.co.uk – Registered 3rd March 2022. (different scam group? Related keyword “vibesvilla”)
appliancesplace.co.uk – Registered 30th April 2022. (different scam group? Related keyword “riaj35277”)
atomgadgets.co.uk – Registered 27th May 2022.
extremegadgets.co.uk – Registered 28th May 2022. (different scam group? Related keyword “vibesvilla”)
If you’ve come across these or any others please let me know how you found them. What were you searching for and on what website did you see the link to the scam site.
This is again mainly for my own reference. If you are stuck in “I don’t like CLI” land – like I am sometimes – this is how you get Webmin configured iptables rules to apply if the GUI isn’t applying them.
ip6tables-restore /etc/iptables/rules.v6 and iptables-restore /etc/iptables/rules.v4
(Rebooting also seems to apply any unapplied changes but rebooting is also very inconvenient!)
Here I will go through the rough and very technical steps to gain root access to this router.
Beware – it is very technical, needs a working GenieACS server and a DHCP server which allows you to set an Option 43 response.
Attack Vector: The takeover of this router hinges around the default configuration of the router picking up an ACS / TR-069 server from DHCP on the WAN. ACS / TR-069 is a remote management protocol for routers, SIP phones and other network items. This means we can plug the H298A WAN port into a network we control and respond with our own ACS Server. Once the router is communicating with our ACS server we can then reset the root password and log into the web admin interface with this root password.
Features Gained: You gain the ability to edit the WAN settings of the router. Possibly use a 3g dongle as backup and you can configure it to use your own VoIP service.
How: Install and make sure you have a working GenieACS server. I’m afraid this is a bit of a mission. I installed VMWare Player; debian as a guest with bridged networking to my LAN.
Make sure you can bring up your GenieACS UI in a browser using port 3000.. e.g. http://10.100.1.81:3000 (replacing the IP with the IP you are running GenieACS on, on your LAN). I had to reboot my debian guest after doing all the install before this web page would work. I’d also check the port that the router will communicate with.. e.g. http://10.100.1.81:7547 (This page will give you method not allowed error, but that is expected).
Go into the Admin tab on GenieACS. Go to Provisions on the left. Click Show on the default line. Add the following at the bottom of the existing script:
And then save it. What this does is, along with the other default stuff GenieACS does when a router first communicates, will set the password on the routers ACS “connection request url” to be something we know. This allows easy access to change settings via Genie ACS. If we didn’t do this step then GenieACS would fail to push settings to the router with an authentication error.
We now need to set DHCP Option 43 on your LAN DHCP Server.
On OPNSense you add an option 43, select String from the drop down box and then the value in this format:
Which is 01 (start) 18 (length, in hex, of the url string to follow, windows calculator in programmer mode is your friend here) 68:74:74:70:3a:2f:2f:31:30:2e:31:30:30:2e:31:2e:38:31:3a:37:35:34:37:2f (http://10.100.1.81:7547/ in hex; cyberchef is your friend here to convert to and from Hex).
Save and apply your DHCP config.
Plug in your Hyperoptic router WAN port into your LAN.
Wait for it to boot up – then refresh your GenieACS interface and you _should_ see the Hyperoptic router in there!
Go to the device by clicking on the serial number. In the grey box below “All parameters” type in AdminAccount.
Click the little pencil icon to the right of “blank” on the password line. Type in a secure password. If you try and set something like “rob” it will error with task faulted and invalid parameter value. If this happens you need to click on the fault at the top and delete it from the queue.
So after setting a secure password like Underground123! click Queue then Commit.
You should see green status lines saying the change has been sent ok. You can now log into the Hyperoptic router interface using the username root and the password you just set in the last step.
Good luck and I hope this information helps someone :)
Thanks for showing your trust upon us once again. your order has been renewed and is active now, the payment will reflect into your account within few moments to next 48 hours. Order description is given below:
Product Name: N0RT0N_36o
Product Key: 33NT-LB78-NNSA-J219
Total Amount: $443.43
Mode: Direct online debit
For any help or cancellation: +1 (347) 380 6987
The above is a scam. Using phone number 13473806987 aka 347-380-6987