After I almost just burned my Video Card while playing mass effect 2(looks awesome so far) I thought I should go back doing useful stuff^^....
Have I mentioned that I´m trying to hack the Media Receiver 300? Right. So for a start off I tested whether it´s possible to use multiple boxes with one shared connection;
And it does work...How?
1. Turn your first box on and configure it as a Video-recorder and blabla
2. Disconnect the network cable from the first box(NOT the power source)
3. Connect the second box, configure it
4. Connect Box 1 again(LAN)
That´s it. A very easy workaround so both boxes will function perfectly normal
NOTE: If there is a power loss redo steps 1 to 4. And this is actually no hack but a workaround(which I think will be useful anyways)
Montag, 15. Februar 2010
Sonntag, 14. Februar 2010
#2 - RAR Multiunpacker -> Awesome Tool
A mate of mine was looking for a tool that would search a folder and it´s subfolder for RAR archives and would auto-unpack them and then delete them; well, here it is:
"Multi Unpacker"
Creds to Tomas Varaneckas & jbs for this awesome Tool...
"Multi Unpacker"
Creds to Tomas Varaneckas & jbs for this awesome Tool...
#1 Salaam! - HowTo hack the Netgear WGR614 v7
This is my starting entry beginning with a little tutorial on howto hacking the Netgear WGR614 v7(also works for v3,5,6; possibly v4, too):
WHY: (Skip this part if you´re only interested in the tutorial)
The pre-history of this Tutorial is that I am working on a hack for the MediaReceiver 300(currently distributed with the "T-Home Package" in Germany); in order to do this I was going to analyze the HTTP-Requests beeing sent by the MR300; in addition to forwarding all Requests on port 80 to my IP-Address I thought that it would be an awesome function beeing able to forward any sort of outgoing connection to my IP; so as the web-interface-NAT-config of the Netgear WGR614 really sucks I figured I needed root access to the router;
How did I notice that there is a TELNET-Daemon running on the WGR614? It´s easy, a while ago I portscanned my router and I saw that the TELNET port(23) was open -> My first attempt was rejected, until I noticed(Thanks to seattlewireless.net) that there was a tool at the Korean NG-Support site to unlock said Telnet Daemon. Now the Tutorial:
HOW:
1. Get your routers ip & mac
->cmd-> "ipconfig"(look for standardgateway) and then "arp -a" ( will show you the arp table containing your router´s mac, e.g. 00-1a-2g-52-af-1c
2. Download the Telnet tool
!Warning! I do not take any kind of responsibility for this and/or other tools linked in this blog - use at your own risk!
CLICK ME!
3. Activate the Telnet-Daemon
Open a new commandline with Admin-rights->cd to the correct folder-> then replace the ip I wrote with your IP(from ipconfig/standardgateway) and replace my MAC with yours(from the arp table); substitute every lower case character(e.g. "a") with it´s upper case char("A") and finally delete all the "-" between the blocks.
then type:
"telnetenable.exe 140.140.140.140 001A2G52AF1C Gearguy Geardog"
Gearguy/dog is the Netgear standard root Login to the device(I saw this Username/PW the first time when I read a saved config file from the router - all unencrypted)
4. Go login via Telnet and enjoy your newly unlocked Router! ("help" shows you all commands available)
BTW: the "time" referrs to the time the Firmware was updated
Additional Stuff:
-Use your Router as a WiFi Card for sniffing new networks(router -> good antenna -> more range than your normal card):
It might be possible to get the chipset into monitoring wifi data in order to crack WEP-Keys and stuff, but therefore we would have to speak to the chip directly, which is quite hard because i don´t know about atheros drivers for riscOS(the router´s OS)
1. Open your SSH-session(I recommend PuTTy)
2. Type "wla" ; type "find all"
3. wait for the router to scan all channels and then wait for the log; grab the log and have some fun ; )
Abonnieren
Kommentare (Atom)