Uncapping
Encyclopedia
Uncapping, in the context of cable modem
Cable modem
A cable modem is a type of network bridge and modem that provides bi-directional data communication via radio frequency channels on a HFC and RFoG infrastructure. Cable modems are primarily used to deliver broadband Internet access in the form of cable Internet, taking advantage of the high...

s, refers to a number of activities performed to alter one's internet service provider
Internet service provider
An Internet service provider is a company that provides access to the Internet. Access ISPs directly connect customers to the Internet using copper wires, wireless or fiber-optic connections. Hosting ISPs lease server space for smaller businesses and host other people servers...

 modem
Modem
A modem is a device that modulates an analog carrier signal to encode digital information, and also demodulates such a carrier signal to decode the transmitted information. The goal is to produce a signal that can be transmitted easily and decoded to reproduce the original digital data...

 settings. It is sometimes done for the sake of bandwidth (i.e. by buying a 512kbit/s access modem and then altering it to 10Mbit/s), pluggable interfaces (as by using more than one public ID), or any configurable options a DOCSIS
DOCSIS
Data Over Cable Service Interface Specification is an international telecommunications standard that permits the addition of high-speed data transfer to an existing cable TV system...

 modem can offer.

Uncapping may be considered an illegal activity and many internet service providers check modem configuration files nightly to detect uncapped modems. If caught, uncappers risk possible account termination and/or prosecution for theft of service. Note that regardless of legality, uncapping may be a violation of the Terms of Service
Terms of Service
Terms of service are rules which one must agree to abide by in order to use a service. Unless in violation of consumer protection laws, such terms are usually legally binding...

 agreement that the customer has with the ISP.

Methods

There are several methods used to uncap a cable modem, by hardware,software,tricks,alterations, and modifications.

The first technique (there were others before this) to enjoy any success employed Motorola
Motorola
Motorola, Inc. was an American multinational telecommunications company based in Schaumburg, Illinois, which was eventually divided into two independent public companies, Motorola Mobility and Motorola Solutions on January 4, 2011, after losing $4.3 billion from 2007 to 2009...

 modems (such as SB3100, SB4100, and SB4200 models). By spoofing
Spoofing attack
In the context of network security, a spoofing attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage.- Spoofing and TCP/IP :...

 the TFTP server, one could force the modem to accept a different configuration file than would be expected. The configuration file is a file stored on the TFTP server that tells your modem the download and upload caps for it. An example of spoofing would be to edit the configuration file (Requires a DOCSIS
DOCSIS
Data Over Cable Service Interface Specification is an international telecommunications standard that permits the addition of high-speed data transfer to an existing cable TV system...

 editor) or replacing your configuration file with one from a faster modem (Through Gnutella Networks).

An alternate method employs dhcpforce. By flooding a modem with faked DHCP packets (which contain configuration filename, TFTP IP, etc), one can convince the modem to accept any desired config file, even on one's own server (provided the server is routed, of course).

Another more advanced method is to attach a TTL to RS232 adapter, and get access to the console directly thus making the modem download new firmware, which can then be configured via a simple web interface. Examples include SIGMA (SIGMA is a Firmware Add-On that expands the current features of an underlying firmware.) and others.
Refer to the sites below for more information and tutorials on various methods used.

External links

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK