New BBS Features

Decided to sit down and add some long waited features I have been thinking about for the BBS. Almost all these changes revolve around security.

1. The Reddit Reader has returned. It has a few minor bugs that deal with the text placement on the screen but nothing major.

2. Secure Connection Lockdown has been implemented. If you want to be able to login using SSH/WSS/TOR only, it will no longer allow you to login use Unencrypted methods (Telnet/WS)

3. 2FA (Two Factor Authentication) has been implemented. Any apps/programs that are compatible with Google Authenticator or Authy will work. Standard TOTP style keys.

4. New “Profile Settings” can be found on the main menu, it contains the two security features listed above allowing you to toggle them on and off.

5. Password Recovery email address can now be specified in the Profile Settings menu. Although not required, it will allow me to reset passwords if you forget them.

As always if you have any issues, comments, complains, questions about the BBS you can contact me via Comments below, email, or the BBS itself.

By |April 5th, 2017|0 Comments

pfSense 2.0 Features and Beta Release

A work in progress list of 2.0 new features and changes is available. I think that has most of the changes, but it’s definitely missing some. If you notice anything that was missed, please leave a comment. We’ll be adding to it as we review the list more in the coming days.

A beta of 2.0 is available from the pfSense download page

By |July 2nd, 2010|0 Comments

Hacking Barracuda Spyware Firewall

This is not an article on how to hack into this unit remotely. This will probably void any warranty, or contracts that you hold with Barracuda. The unit I worked on was dead, not physically, but the software on the drive was shot, even the recovery partition loaded from Barracuda would not boot correctly.

Unit: Barracuda Spyware Firewall 210
Hack Type: BIOS Password

Results: Success
Password: 322232 (If that does not work try, 000100 or 32020000 or 3321)

Hope it helps others attempting this.

After Hack: I have successfully installed Archlinux on this 1U server. I do not like the fact of having two Ethernet ports on the front of the server, and one in the back. But I will only use the rear port anyway.

Ethernet Front: eth0 and eth1
Ethernet Rear: eth2

By |January 30th, 2008|3 Comments

Airsnort in Windows XP

I have seen lots of sites around the internet that tell people that it is possible to run Airsnort in a Windows enviroment. If you don’t know, Airsnort is a wireless network sniffer. It can sniff wireless traffic, and if the signal is using WEP, Airsnort can take a shot at cracking the WEP key and showing you the key.

This is not easy of course, and it will take a VERY long time. The time is more dependent on how much wireless traffic that network is creating, makeing more packets, and thus making cracking the WEP keys chances more possible.

First, you will need a supported wireless card, so before we begin, if your card is NOT on this list, give up now, or go out and find a card on the list. I cannot guarentee that any will work for you. The card that I use is an Orinoco Classic Gold PC Card from Agere Systems. It is an B ’11MBPS’ only card, so I use it mainly for snooping around.

[ List: http://www.wildpackets.com/support/product_support/airopeek/hardware ]

The product page displays AiroPeek from WildPackets. If your card IS on this list, go ahead and grab a copy of the driver listed in that table, and a demo of AiroPeek NX from WildPackets.

[ Download: http://www.wildpackets.com/products/demos/apwnx ]

Download that demo, because we need 3 files from the installation, you can remove the program once we are done.

You are going to need to force your wireless card to use the new driver you downloaded from the website.

You are now going to need to download some files from Archaic Binary here that I have gathered for you in a nice zip file. Included in this zip file are…

1. AirSnort (Sources and Binary)
2. atk
3. glib
4. gtk
5. pango

Nothing needs to be installed, just unzip the files in a location of your choice. I choose to unzip directly in C:\Program Files and it will create the folder Airsnort for you. Now you will need to browse to the folder where you installed AiroPeek NX and copy Peek.dll, Peek4, and Peek5 files into your Airsnort/bin directory.

You will now need to modify your Enviroment Variables to include the folders above in your path, so Airsnort can find them.

Right click on ‘My Computer’ and choose Properties OR
Hold the Windows Button and click Pause/Break OR
Click on the Start Button and right click ‘My Computer’ and choose Properties.

At the top choose the Advanced Tab, then click on the Enviroment Variables button at the bottom.

In the System Variables area, choose Path and click ‘Edit’. At the end of the Variable Value copy and paste this line in, or type it in. Make sure you change it to something different if you put the Airsnort files in a different area then C:\Program Files\Airsnort.

[ Path: C:\Program Files\Airsnort\atk\bin;C:\Program Files\Airsnort\glib\bin;C:\Program Files\Airsnort\gtk\bin;C:\Program Files\Airsnort\pango\bin;C:\Program Files\Airsnort\bin ]

Click OK, then OK again, and last OK again.

You should be completely out of the System Management Dialogs.

Go to the folder where airsnort resides and run the airsnort.exe file in the bin directory.

Good Luck!

By |January 24th, 2008|0 Comments