Tag Archives: Hack

Hacking Barracuda Spyware Firewall

This is not an article on how to hack into this unit remotely. This will probably void any warranty, or contracts that you hold with Barracuda. The unit I worked on was dead, not physically, but the software on the drive was shot, even the recovery partition loaded from Barracuda would not boot correctly.

Unit: Barracuda Spyware Firewall 210
Hack Type: BIOS Password

Results: Success
Password: 322232 (If that does not work try, 000100 or 32020000 or 3321)

Hope it helps others attempting this.

After Hack: I have successfully installed Archlinux on this 1U server. I do not like the fact of having two Ethernet ports on the front of the server, and one in the back. But I will only use the rear port anyway.

Ethernet Front: eth0 and eth1
Ethernet Rear: eth2

m0n0wall on an Watchguard Firebox III 700

Most of the setup is similar to the Watchguard Firebox II except some hardware differences. The PCI slot is on its side, you will have to raise the board out of the case to perform this, if your video card is too large. I used the same video card as the Firebox II, an S3.

Also the keyboard header has changed, after some playing around, here is the pinout!

WG Keyboard Pin 1: PS/2 Header Data
WG Keyboard Pin 2: PS/2 Ground
WG Keyboard Pin 3: PS/2 Header +5v (VCC)
WG Keyboard Pin 4: PS/2 Clock Pin

The rest worked like the previous Watchguard, enjoy.

m0nowall on Watchguard Firebox II

At work today, I got my hands on a old Watchguard Firebox II firewall device. I have always hated the Windows program needed to configure the boxes, and even how they run. I found this site a while back, and decided to do the obvious. Make the device better then it was intended to be…

Here is the walkthrough he created: http://www.ls-net.com/m0n0wall-watchguard/ most of his writings worked great for me. Except a few, which I will list here incase you have the same problems.

I did not use a flash, or a special cable to setup this system. The only cable I had was an 40 pin IDE cable, and a 40 to 44 pin converter. This converter is ment to run laptop drives in a desktop system, I just reversed it in this case.

The graphics card was a slight problem for me, I tried 3 different PCI video cards with no luck. I happened to find a S3 Virge/DX 2MB Video card, and this seemed to work, as seen in the walkthroughs photos, he also had an S3 video card.

I never touched an Flash Eraser Jumper. The only jumper on mine was near the battery, and it seemed to cause the onboard flash disk of 8MB in size to switch from Master to Slave. I set it opposite from the default, and put my drive as master.

On my hard drive that I used in the beginning, I did the physdiskwrite program to put m0n0wall on the drive, then near the end did the command to tell the next upgrade to install to the flash.

After the booting process, first time setup of m0n0wall, the Auto-Detection, DOES NOT WORK for me. I had to manually assign the interface names to the interface types. Lucky me, I got them correct the first time, they just go in order: dc0 = WAN, dc1 = LAN, dc2 = OPT1 and there you go.

The command used was the same: echo ad1 > /var/etc/cfdevice then perform an Firmware Update from the web interface.

These were the problems I had, but in the end, it’s a great hack, and I love the red box now running a much better software package.