Tools for effortless reverse engineering of MikroTik routers. http ://kirils.org/

Size: px
Start display at page:

Download "Tools for effortless reverse engineering of MikroTik routers. https://github.com/0ki/mikrotik-tools http ://kirils.org/"

Transcription

1 Tools for effortless reverse engineering of MikroTik routers v3 http ://kirils.org/

2 Legal disclaimer Goal of this presentation is to allow the members of the research community to assess security and achieve the interoperability of computer programs 2 / 47

3 MikroTik? Anyone even uses it? 3 / 47

4 RouterOS is Linux! old Linux! Startup scripts Nova binaries Config 4 / 47

5 And it s also closed source & closed ecosystem 5 / 47

6 A jailbreak is needed... 6 / 47

7 A built-in backdoor. How nice. RouterOS delivered on 15 Nov 2005 a wild /nova/etc/devel-login appears in /nova/bin/login [ -f /nova/etc/devel-login && username == devel && password == admin.password ] && /bin/ash 7 / 47

8 All we gotta do is... 8 / 47

9 All we gotta do is... 1) Create /nova/etc/devel-login 2) telnet to as devel 9 / 47

10 [TAB] to the rescue No ls? No problem! cat, space, tab, tab Or, you know, do it properly, and upload busybox statically linked, for the right architecture uname -m this might be of interest: 10 / 47

11 But how? 11 / 47

12 The old way A VirtualBox appliance! DEMO 12 / 47

13 The old way A VirtualBox appliance! Works only if If your CPU is AR9344 and device has at least two ethernet ports RB951G-2HnD, RB951Ui-2HnD <== tested CRS109-8G-1S-2HnD-IN, CRS125-24G-1S-IN, CRS125-24G-1S-2HnD-IN RB2011L, RB2011LS, RB2011iLS-IN, RB2011iL-IN, RB2011UiAS-IN RB2011UiAS-RM, RB2011UiAS-2HnD-IN OmniTIK 5, OmniTIK 5 PoE 13 / 47

14 The new way A bash/python script Works regardless of architecture Very fast Can do remote jailbreaks Will not help you recover lost passwords Will probably get patched soon after this presentation DEMO 14 / 47

15 Now. The tools. 15 / 47

16 NPK file sourcing getnpk.sh deps: wget reversenpk.sh deps: unsquashfs, unnpk 16 / 47

17 Kernel patches 17 / 47

18 RouterOS boot process 18 / 47

19 Where do we put custom binaries? 19 / 47

20 Anywhere! path looks for specified path in prefixed directories Used throughout their scripts Makes using custom scripts easier 20 / 47

21 High level overview of RouterOS 21 / 47

22 NPK format 22 / 47

23 NPK format Numeric values are unsigned little endian File consists of header, file size, parts and footer. File size is 8b less Each part consist of: part type (short) payload size (long) payload 23 / 47

24 NPK format At least two types of current NPKs: package 0..3 header 1E F1 D0 BA footer footer since 3.22 restriction (invisible package) 0..3 header FB 0F 10 A1 footer / 47

25 Part types 25 / 47

26 supout.rif 26 / 47

27 What is supout.rif? Support output ridiculously intricate format or RouterOS information file, maybe, idk \_( ツ )_/ 27 / 47

28 supout.rif from outside 28 / 47

29 supout.rif section decoding swap bits around per three bytes base64 section decodes to: name + \0 + zlib_compressed_content 29 / 47

30 supout.rif section decoding 30 / 47

31 supout.rif from inside What does it contain? your whole configuration /proc/ folder memory addresses your log and more 31 / 47

32 DEMO Demo: mikrotik.com xss Demo: decode_supout.py 32 / 47

33 Config files 33 / 47

34 Configuration Config is stored in /rw/store as pairs of files IDX = index DAT = data 34 / 47

35 IDX format Record ID (long) if ID is 0xFFFFFFFF, field has no content used for offsetting length (long) separator (long) usually 0x / 47

36 DAT format LENGTH (short) M2 RECORD of length Config ID (3 bytes) type (1 byte) content depends on to type 36 / 47

37 Peculiarities / features Field IDs shared with web Winbox protocol derived from DAT format Working directly with files? Dangerous! 37 / 47

38 mt_dat_decoder.py module DEMO 38 / 47

39 Where s my password? Calm down! It s encrypted! 39 / 47

40 The password is hashed salted md5 Oh, wait, no. That s the key. 40 / 47

41 The password key = md5(username + "283i4jfkai3389") password = user["password"] xor key 41 / 47

42 The password tool DEMO 42 / 47

43 Backup files 43 / 47

44 Backup file layout Header (long) 0x88ACA1B1 backup 0xEFA89172 encrypted backup Length of backup file (long) Records of: Path name, idx contents, dat contents Each record consists of length (long) and binary data 44 / 47

45 The bug mkdir -p pathname( /flash/rw/store/ +filename) write idx to /flash/rw/store/ +filename+.idx write dat to /flash/rw/store/ +filename+.dat 45 / 47

46 decode_backup.py DEMO 46 / 47

47 The end. Tools & jailbreak available Latest appliance: 47 / 47

A deeper journey into MikroTik routers

A deeper journey into MikroTik routers A deeper journey into MikroTik routers v2 h t i w w n o e e N s n u % 53 ntent co 2 / 62 Tanoy Bose Us Kirils passionate about things and stuff Jānis maker who sometimes breaks things 5 / 62 Legal disclaimer

More information

Rooting the MikroTik routers

Rooting the MikroTik routers Rooting the MikroTik routers A journey into reverse engineering parts of MikroTik system to gain access to hardware features and the shell behind the RouterOS that has no ls Who? Me? Who am I? https://twitter.com/kirilssolovjovs

More information

By M.Sc. I.T Alaa A. Mahdi

By M.Sc. I.T Alaa A. Mahdi University of Babylon, IT College Information Network Dep., Third Class, Second Semester MTCNA Course MikroTik Certified Network Associate 2014-2015 By M.Sc. I.T Alaa A. Mahdi Objectives Upgrade RouterOS

More information

SAS3 INSTALLATION MANUAL

SAS3 INSTALLATION MANUAL SAS3 INSTALLATION MANUAL SNONO SYSTEMS 2015 FORWARD This document describes the installation procedure of SAS3 billing system on x86-64 bit host or virtual machine. The manual covers the installation and

More information

Configuring your MikroTik as a Standard LucidView Enforcer

Configuring your MikroTik as a Standard LucidView Enforcer MANUAL Configuring your MikroTik as a Standard LucidView Enforcer Version 6 Table of Contents STANDARD LUCIDVIEW ENFORCER 2 Guide version 2 About 2 Standard vs. Bolt-On Enforcer 2 GENERATING & DOWNLOADING

More information

MIKROTIK ROUTER SETUP SERVICE MANUAL

MIKROTIK ROUTER SETUP SERVICE MANUAL 02 December, 2017 MIKROTIK ROUTER SETUP SERVICE MANUAL Document Filetype: PDF 254.9 KB 0 MIKROTIK ROUTER SETUP SERVICE MANUAL Not a easy router to setup. This is a table of contents or index of all wireless

More information

FastPath Overview MUM USA, 2016

FastPath Overview MUM USA, 2016 FastPath Overview MUM USA, 2016 1 2 3 Yes, still - Packet Flow Diagram (page 3) 4 SlowPath Slow Path is the regular way packets are processed in RouterOS For each packet RouterOS has to check the whole

More information

FastPath Overview MUM Eu rope, 2016

FastPath Overview MUM Eu rope, 2016 FastPath Overview MUM Europe, 2016 1 2 3 Yes, still - Packet Flow Diagram (page 3) 4 SlowPath Slow Path is the regular way packets are processed in RouterOS For each packet RouterOS has to check the whole

More information

Dr. Tom Hicks. Computer Science Department Trinity University

Dr. Tom Hicks. Computer Science Department Trinity University Dr. Tom Hicks Computer Science Department Trinity University 1 1 Remote Desktop Into CS-X That Contains Your Switch? Open Putty To Your Switch 2 What is the Command To Go Into Privilege Mode DO IT! enable

More information

Configuring SSH Public Key Authentication

Configuring SSH Public Key Authentication 6AOSCG0060-29A January 2014 Configuration Guide Configuring SSH Public Key Authentication This guide describes how to configure and use Secure Shell (SSH) public key authentication on products running

More information

MIKROTIK ROUTER SETUP SERVICE MANUAL

MIKROTIK ROUTER SETUP SERVICE MANUAL 26 November, 2017 MIKROTIK ROUTER SETUP SERVICE MANUAL Document Filetype: PDF 90.56 KB 0 MIKROTIK ROUTER SETUP SERVICE MANUAL If you are trying to setup their vpn service on your router. Create PPTP Client

More information

mkdir Phys338 s2017 Draw the tree of the directories and files for this step and all the following cd Phys338 s2017

mkdir Phys338 s2017 Draw the tree of the directories and files for this step and all the following cd Phys338 s2017 Linux Exercise The following steps will guide you through the most common Linux commands. If you are using windows (Library and any Windows lab on campus), then start with step 1. If you are using a linux

More information

BUILDING YOUR OWN FREE HOME PHONE SYSTEM WITH MIKROTIK

BUILDING YOUR OWN FREE HOME PHONE SYSTEM WITH MIKROTIK Expanding Possibilities BUILDING YOUR OWN FREE HOME PHONE SYSTEM WITH MIKROTIK By Haytham Aboulabbas Mohamed Senior IT/Telecommunications Engineer Petroleum Pipelines Company (PPC) MUM Egypt, Cairo, 29

More information

Installing the Product Software

Installing the Product Software CHAPTER 1 The Cisco Configuration Engine is a network management software that acts as a configuration service for automating the deployment, management, and upgrading of network devices and services.

More information

Lab Working with Linux Command Line

Lab Working with Linux Command Line Introduction In this lab, you will use the Linux command line to manage files and folders and perform some basic administrative tasks. Recommended Equipment A computer with a Linux OS, either installed

More information

Linux Exercise. pwd answer: We call this directory (into which you get when you log in) your home directory.

Linux Exercise. pwd answer: We call this directory (into which you get when you log in) your home directory. Linux Exercise The following steps will guide you through the most common Linux commands. If you are using windows (Library and any Windows lab on campus), then start with step 1. If you are using a linux

More information

CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak

CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak CSN08101 Digital Forensics Lecture 1B: Essential Linux and Caine Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak Essential Linux and Caine You will learn in this lecture: Essential Command

More information

SOA Software API Gateway Appliance 6.3 Administration Guide

SOA Software API Gateway Appliance 6.3 Administration Guide SOA Software API Gateway Appliance 6.3 Administration Guide Trademarks SOA Software and the SOA Software logo are either trademarks or registered trademarks of SOA Software, Inc. Other product names, logos,

More information

Systems Programming and Computer Architecture ( ) Exercise Session 01 Data Lab

Systems Programming and Computer Architecture ( ) Exercise Session 01 Data Lab Systems Programming and Computer Architecture (252-0061-00) Exercise Session 01 Data Lab 1 Goal Get familiar with bit level representations, C and Linux Thursday, September 22, 2016 Systems Programming

More information

ViTelecom Fixed Line Business Phone & Broadband Services

ViTelecom Fixed Line Business Phone & Broadband Services V2.November 2018 ViTelecom Fixed Line Business Phone & Broadband Services ViTelecom Ltd provide fixed line business phone and broadband service across England, Wales & Scotland. Customers can choose from

More information

KEIL software. Index of contents UPDATE. 1. Important information 1.1. What has changed?

KEIL software. Index of contents UPDATE. 1. Important information 1.1. What has changed? Index of contents 1. Important information 1.1. What has changed? 2. Update 2.1. Settings and file backup 2.2. FTP Upload 2.3. Permissions 2.4. Do update 3. Possible problems 2003-2007,, all rights reserved

More information

Linux Systems Administration Getting Started with Linux

Linux Systems Administration Getting Started with Linux Linux Systems Administration Getting Started with Linux Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International

More information

Note: Oracle Consulting can provide technology assessments and architectural planning workshops to guide you through these processes.

Note: Oracle Consulting can provide technology assessments and architectural planning workshops to guide you through these processes. Upgrade Guide March 2014 Contents About this Upgrade Guide... 5 Preparing for the Upgrade... 5 Assessing the Technical Environment... 5 Stopping the Current SiteWand Server... 5 Stopping Scheduled Tasks...

More information

Available Commands CHAPTER

Available Commands CHAPTER CHAPTER 2 This chapter contains the Cisco IPS 6.2 commands listed in alphabetical order. It contains the following sections:. anomaly-detection load, page 2-4 anomaly-detection save, page 2-5 banner login,

More information

Provisioning of Algo SIP Endpoints Algo Communication Products Version 1.1 Sept 30, 2015

Provisioning of Algo SIP Endpoints Algo Communication Products Version 1.1 Sept 30, 2015 Provisioning of Algo SIP Endpoints Algo Communication Products Version 1.1 Sept 30, 2015 Contents 1. Introduction... 1 1.1 Supported Devices...2 2. Provisioning Basics... 2 2.1 Server Address & Protocol...2

More information

Configuring the JUNOS Software the First Time on a Router with a Single Routing Engine

Configuring the JUNOS Software the First Time on a Router with a Single Routing Engine Configuring the JUNOS Software the First Time on a Router with a Single Routing Engine When you turn on a router the first time, the JUNOS Software automatically boots and starts. You must enter basic

More information

Maintaining the System Software

Maintaining the System Software CHAPTER 2 This chapter covers the tasks required for maintaining a Content Engine. Upgrading the System Software, page 2-1 Recovering the System Software, page 2-2 Maintaining the Hard Disk Storage, page

More information

Install and Configure Ubuntu on a VirtualBox Virtual Machine

Install and Configure Ubuntu on a VirtualBox Virtual Machine Install and Configure Ubuntu on a VirtualBox Virtual Machine Ronald Mak Department of Computer Engineering Department of Computer Science January 11, 2019 Introduction Because the class will use Linux

More information

CS Fundamentals of Programming II Fall Very Basic UNIX

CS Fundamentals of Programming II Fall Very Basic UNIX CS 215 - Fundamentals of Programming II Fall 2012 - Very Basic UNIX This handout very briefly describes how to use Unix and how to use the Linux server and client machines in the CS (Project) Lab (KC-265)

More information

Controlling Switch Access with Passwords and Privilege Levels

Controlling Switch Access with Passwords and Privilege Levels Controlling Switch Access with Passwords and Privilege Levels Finding Feature Information, page 1 Restrictions for Controlling Switch Access with Passwords and Privileges, page 1 Information About Passwords

More information

This is Lab Worksheet 13 - not an Assignment. Boot Process and GRUB

This is Lab Worksheet 13 - not an Assignment. Boot Process and GRUB This is Lab Worksheet 13 - not an Assignment This Lab Worksheet contains some practical examples that will prepare you to complete your Assignments. You do not have to hand in this Lab Worksheet. Make

More information

Overview of the Cisco NCS Command-Line Interface

Overview of the Cisco NCS Command-Line Interface CHAPTER 1 Overview of the Cisco NCS -Line Interface This chapter provides an overview of how to access the Cisco Prime Network Control System (NCS) command-line interface (CLI), the different command modes,

More information

Please choose the best answer. More than one answer might be true, but choose the one that is best.

Please choose the best answer. More than one answer might be true, but choose the one that is best. Introduction to Linux and Unix - endterm Please choose the best answer. More than one answer might be true, but choose the one that is best. SYSTEM STARTUP 1. A hard disk master boot record is located:

More information

Hotspot with Active Directory

Hotspot with Active Directory Hotspot with Active Directory Eng. Ahmed AlBakri Wireless Communications Channels Mikrotik User Meeting Saudi Arabia Riyadh 22 October 2017 Eng. Ahmed AlBakri Bachelor in Computer Science and Engineering

More information

AT-WR4500 Series How To Upgrade RouterOS firmware

AT-WR4500 Series How To Upgrade RouterOS firmware AT-WR4500 Series How To Upgrade RouterOS firmware Introduction This How To guide explains how to upgrade RouterOS firmware on AT-WR4500 Series of Wireless outdoor routers. Before upgrading please carefully

More information

MikroWall Hotspot Router and Firewall System

MikroWall Hotspot Router and Firewall System MikroWall Hotspot Router and Firewall System Installation and configuration guide Contents: 1.0 The Device:...2 1.1 The MikroWall Wireless...2 1.2 MikroWall Standard...2 2.0 Installation...2 2.1 Before

More information

MikroTik User Meeting

MikroTik User Meeting MikroTik User Meeting More than 80 MUM events MikroTik MikroTik is located in Latvia (Europe) More than 150 employees Established 1996 RouterOS created in 1997 RouterBOARD created in 2002 First MUM in

More information

Configuring a Standalone VCL Environment using VMware Server 2.0

Configuring a Standalone VCL Environment using VMware Server 2.0 Configuring a Standalone VCL Environment using VMware Server 2.0 DISCLAIMER! This document provides instuctions for configuring a standalone VCL environment running on a single computer which is able to

More information

MikroTik SwOS Basic VLAN Configuration

MikroTik SwOS Basic VLAN Configuration MikroTik SwOS Basic VLAN Configuration By : Adhie Lesmana Manila, Philippines January 16, 2018 Speaker Profile Adhie Lesmana MTCNA, MTCWE, MTCTCE, MTCRE, MTCINE PowerNet Liberia, West Africa Technical

More information

Controlling Switch Access with Passwords and Privilege Levels

Controlling Switch Access with Passwords and Privilege Levels Controlling Switch Access with Passwords and Privilege Levels Finding Feature Information, page 1 Restrictions for Controlling Switch Access with Passwords and Privileges, page 1 Information About Passwords

More information

MikroTik SwOS Basic VLAN Configuration

MikroTik SwOS Basic VLAN Configuration MikroTik SwOS Basic VLAN Configuration By : Adhie Lesmana Nairobi, Kenya January 30, 2018 Speaker Profile Adhie Lesmana MTCNA, MTCWE, MTCTCE, MTCRE, MTCINE PowerNet Liberia, West Africa Technical & Operation

More information

Abstract. This is the MySQL OS X extract from the MySQL 5.6 Reference Manual. For legal information, see the Legal Notices.

Abstract. This is the MySQL OS X extract from the MySQL 5.6 Reference Manual. For legal information, see the Legal Notices. MySQL and OS X Abstract This is the MySQL OS X extract from the MySQL 5.6 Reference Manual. For legal information, see the Legal Notices. For help with using MySQL, please visit either the MySQL Forums

More information

CST8207: GNU/Linux Operating Systems I Lab Ten Boot Process and GRUB. Boot Process and GRUB

CST8207: GNU/Linux Operating Systems I Lab Ten Boot Process and GRUB. Boot Process and GRUB Student Name: Lab Section: Boot Process and GRUB 1 Due Date - Upload to Blackboard by 8:30am Monday April 16, 2012 Submit the completed lab to Blackboard following the Rules for submitting Online Labs

More information

COS 318: Operating Systems. File Systems. Topics. Evolved Data Center Storage Hierarchy. Traditional Data Center Storage Hierarchy

COS 318: Operating Systems. File Systems. Topics. Evolved Data Center Storage Hierarchy. Traditional Data Center Storage Hierarchy Topics COS 318: Operating Systems File Systems hierarchy File system abstraction File system operations File system protection 2 Traditional Data Center Hierarchy Evolved Data Center Hierarchy Clients

More information

Managing Software. Upgrading the Controller Software. Considerations for Upgrading Controller Software

Managing Software. Upgrading the Controller Software. Considerations for Upgrading Controller Software Upgrading the Controller Software, on page 1 Considerations for Upgrading Controller Software, on page 1 Upgrading Controller Software (GUI), on page 2 Upgrading Controller Software (CLI), on page 5 Predownloading

More information

1.1 Introduction. 12c (12.1.3)

1.1 Introduction. 12c (12.1.3) Oracle Data Integrator Getting Started 12c (12.1.3) E57393-01 March 2015 This document provides instructions on how to install the Oracle Data Integrator (ODI) 12c Getting Started Virtual Machine (VM).

More information

CS Operating Systems, Fall 2018 Project #0 Description

CS Operating Systems, Fall 2018 Project #0 Description CS314-002 Operating Systems, Fall 2018 Project #0 Description Due: 11:00 A.M., September 5, 2018 I. Project Narrative: The primary objectives in this project are: (1) confirm your account (user name and

More information

Commands are in black

Commands are in black Starting From the Shell Prompt (Terminal) Commands are in black / +--------+---------+-------+---------+---------+------ +------ +------ +------ +------ +------ +-- Bin boot dev etc home media sbin bin

More information

Accessing and Using GRUB Mode

Accessing and Using GRUB Mode About GRUB Mode and the Configuration Register, page 1 Accessing GRUB Mode, page 2 Using the GRUB Menu, page 3 Modifying the Configuration Register (confreg), page 4 Changing the Configuration Register

More information

Model 5100 Remote Administration Guide

Model 5100 Remote Administration Guide Model 5100 Remote Administration Guide The information in this document is current as of the following Hardware and Firmware revision levels. Some features may not be supported in earlier revisions. See

More information

SuperLumin Nemesis. Getting Started Guide. February 2011

SuperLumin Nemesis. Getting Started Guide. February 2011 SuperLumin Nemesis Getting Started Guide February 2011 SuperLumin Nemesis Legal Notices Information contained in this document is believed to be accurate and reliable. However, SuperLumin assumes no responsibility

More information

CipherMail Gateway Virtual Appliance Guide

CipherMail Gateway Virtual Appliance Guide CIPHERMAIL EMAIL ENCRYPTION CipherMail Gateway Virtual Appliance Guide April 4, 2016, Rev: 9537 Copyright 2008-2016, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 3 2 Virtual machine requirements

More information

Maintenance Tasks. About A/B Partition CHAPTER

Maintenance Tasks. About A/B Partition CHAPTER CHAPTER 4 These topics describe the Chassis Manager maintenance tasks: About A/B Partition, page 4-1 Configuring Basic System Information, page 4-2 Configuring System Global Settings, page 4-4 Configuring

More information

Pengwyn Documentation

Pengwyn Documentation Pengwyn Documentation Release 1.0 Silica October 03, 2016 Contents 1 Introduction 3 1.1 Platforms................................................. 3 1.2 Hardware requirements.........................................

More information

BIG-IP System: Migrating Devices and Configurations Between Different Platforms. Version

BIG-IP System: Migrating Devices and Configurations Between Different Platforms. Version BIG-IP System: Migrating Devices and Configurations Between Different Platforms Version 13.0.0 Table of Contents Table of Contents Migration of Configurations Between Different Platforms...5 About Migrating

More information

Maintaining the MGX RPM-PR

Maintaining the MGX RPM-PR APPENDIX A This appendix describes maintenance procedures you might need to perform as your internetworking needs change. It contains the following sections: Reading Front Panel LEDs Recovering a Lost

More information

Performing Maintenance Operations

Performing Maintenance Operations This chapter describes how to back up and restore Cisco Mobility Services Engine (MSE) data and how to update the MSE software. It also describes other maintenance operations. Guidelines and Limitations,

More information

CENG 334 Computer Networks. Laboratory I Linux Tutorial

CENG 334 Computer Networks. Laboratory I Linux Tutorial CENG 334 Computer Networks Laboratory I Linux Tutorial Contents 1. Logging In and Starting Session 2. Using Commands 1. Basic Commands 2. Working With Files and Directories 3. Permission Bits 3. Introduction

More information

Storage and File System

Storage and File System COS 318: Operating Systems Storage and File System Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall10/cos318/ Topics Storage hierarchy File

More information

Quickstart. with F&S Development Machine Fedora 23. Version 1.2 ( )

Quickstart. with F&S Development Machine Fedora 23. Version 1.2 ( ) Quickstart with F&S Development Machine Fedora 23 Version 1.2 (2017-05-05) F&S Elektronik Systeme GmbH Untere Waldplätze 23 D-70569 Stuttgart Germany Phone: +49(0)711-123722-0 Fax: +49(0)711-123722-99

More information

CS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX

CS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX CS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX This handout very briefly describes how to use Unix and how to use the Linux server and client machines in the EECS labs that dual boot

More information

Lab E2: bypassing authentication and resetting passwords

Lab E2: bypassing authentication and resetting passwords Lab E2: bypassing authentication and resetting passwords TTM4175 September 7, 2015 The purpose of this lab is to learn about techniques for bypassing the authentication and access control of Windows and

More information

AXIS T8705 Video Decoder. User Manual

AXIS T8705 Video Decoder. User Manual User Manual Table of Contents Solution overview........................................... 3 Product overview........................................... 4 How to access the product....................................

More information

Introduction to Linux. Fundamentals of Computer Science

Introduction to Linux. Fundamentals of Computer Science Introduction to Linux Fundamentals of Computer Science Outline Operating Systems Linux History Linux Architecture Logging in to Linux Command Format Linux Filesystem Directory and File Commands Wildcard

More information

3 Connection, Shell Serial Connection over Console Port SSH Connection Internet Connection... 5

3 Connection, Shell Serial Connection over Console Port SSH Connection Internet Connection... 5 Contents 1 Description 2 2 Supported Devices 3 3 Connection, Shell 4 3.1 Serial Connection over Console Port...................... 4 3.2 SSH Connection................................. 4 3.3 Internet Connection...............................

More information

Ftp Command Line Commands Linux Example Windows Put

Ftp Command Line Commands Linux Example Windows Put Ftp Command Line Commands Linux Example Windows Put Examples of typical uses of the command ftp. This lists the commands that you can use to show the directory contents, transfer files, and delete files.

More information

User Meeting. Portugal, Lisbon May 2016

User Meeting. Portugal, Lisbon May 2016 User Meeting Portugal, Lisbon May 2016 Established 1996 More than 160 employees RouterOS created in 1997 RouterBOARD created in 2002 First MUM event in Prague 2006 Biggest MUM in 2015, Indonesia 2600+

More information

Embedded lightweight unix

Embedded lightweight unix Embedded lightweight unix ELWIX its free now! Universal embedded system http://www.elwix.org/ Michael Pounov Since 2004 like propriatary OS Give best practices and features from *BSD

More information

GSS Administration and Troubleshooting

GSS Administration and Troubleshooting CHAPTER 9 GSS Administration and Troubleshooting This chapter covers the procedures necessary to properly manage and maintain your GSSM and GSS devices, including login security, software upgrades, GSSM

More information

Lab Using the Boot System Command. Objective. Background/Preparation

Lab Using the Boot System Command. Objective. Background/Preparation Lab 5.1.3 Using the Boot System Command Objective Display information about the Cisco IOS Image (software) that is currently running. Determine where the IOS is booting from. Check the amount of RAM, Flash

More information

Abstract. This is the MySQL OS X extract from the MySQL 5.5 Reference Manual. For legal information, see the Legal Notices.

Abstract. This is the MySQL OS X extract from the MySQL 5.5 Reference Manual. For legal information, see the Legal Notices. MySQL and OS X Abstract This is the MySQL OS X extract from the MySQL 5.5 Reference Manual. For legal information, see the Legal Notices. For help with using MySQL, please visit either the MySQL Forums

More information

Configuring TACACS+ Finding Feature Information. Prerequisites for TACACS+

Configuring TACACS+ Finding Feature Information. Prerequisites for TACACS+ Finding Feature Information, page 1 Prerequisites for TACACS+, page 1 Information About TACACS+, page 3 How to Configure TACACS+, page 7 Monitoring TACACS+, page 16 Finding Feature Information Your software

More information

Acronis Backup Version 11.5 Update 6 INSTALLATION GUIDE. For Linux Server APPLIES TO THE FOLLOWING PRODUCTS

Acronis Backup Version 11.5 Update 6 INSTALLATION GUIDE. For Linux Server APPLIES TO THE FOLLOWING PRODUCTS Acronis Backup Version 11.5 Update 6 APPLIES TO THE FOLLOWING PRODUCTS For Linux Server INSTALLATION GUIDE Copyright Statement Copyright Acronis International GmbH, 2002-2015. All rights reserved. Acronis

More information

CyberLynk FTP Service Functional Description

CyberLynk FTP Service Functional Description CyberLynk FTP Service Functional Description - November 3, 2005 - Version 2.7 Presented by CyberLynk Network 10125 S. 52 nd Street Franklin, WI 53132 P: 414.858.9335 - F: 414.858.9336 www.cyberlynk.net

More information

Session 1: Accessing MUGrid and Command Line Basics

Session 1: Accessing MUGrid and Command Line Basics Session 1: Accessing MUGrid and Command Line Basics Craig A. Struble, Ph.D. July 14, 2010 1 Introduction The Marquette University Grid (MUGrid) is a collection of dedicated and opportunistic resources

More information

Objectives. Classes of threats to networks. Network Security. Common types of network attack. Mitigation techniques to protect against threats

Objectives. Classes of threats to networks. Network Security. Common types of network attack. Mitigation techniques to protect against threats ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Enterprise Network Security Describe the general methods used to mitigate security threats to Enterprise networks

More information

Lab Student Lab Orientation

Lab Student Lab Orientation Lab 1.1.1 Student Lab Orientation Objective In this lab, the students will complete the following tasks: Review the lab bundle equipment Understand the security pod topology Understand the pod naming and

More information

Hackveda Training - Ethical Hacking, Networking & Security

Hackveda Training - Ethical Hacking, Networking & Security Hackveda Training - Ethical Hacking, Networking & Security Day1: Hacking windows 7 / 8 system and security Part1 a.) Windows Login Password Bypass manually without CD / DVD b.) Windows Login Password Bypass

More information

bdigdb for BDI2000 PowerPC4xx version

bdigdb for BDI2000 PowerPC4xx version V1.00 Date: October 3, 2000 New Telnet command (BREAK) added to display and change current breakpoint mode. GDB binary downloading support added (X,:bbbbbbbbb). User selectable Telnet prompt

More information

Linux Distribution: Kernel Configuration

Linux Distribution: Kernel Configuration Instituto Superior de Engenharia do Porto Mestrado em Engenharia Eletrotécnica e de Computadores Arquitetura de Computadores Linux Distribution: Kernel Configuration The central element of a GNU/Linux

More information

Kardia / Centrallix VM Appliance Quick Reference

Kardia / Centrallix VM Appliance Quick Reference Kardia / Centrallix VM Appliance Quick Reference Version 1.0 Beta 2 15-Mar-2011 (c) 2011 LightSys Technology Services, Inc. http://www.lightsys.org/ Redeeming Technology... For God's Kingdom. Overview...

More information

Operating Systems and Using Linux. Topics What is an Operating System? Linux Overview Frequently Used Linux Commands

Operating Systems and Using Linux. Topics What is an Operating System? Linux Overview Frequently Used Linux Commands Operating Systems and Using Linux Topics What is an Operating System? Linux Overview Frequently Used Linux Commands 1 What is an Operating System? A computer program that: Controls how the CPU, memory

More information

Configuring Security with Passwords, Privileges, and Logins

Configuring Security with Passwords, Privileges, and Logins Configuring Security with Passwords, Privileges, and Logins Cisco IOS based networking devices provide several features that can be used to implement basic security for CLI sessions using only the operating

More information

Building Block Installation - Admins

Building Block Installation - Admins Building Block Installation - Admins Overview To use your Blackboard Server with Panopto, you first need to install the Panopto Building Block on your Blackboard server. You then need to add Blackboard

More information

Introduction to UNIX/LINUX Security. Hu Weiwei

Introduction to UNIX/LINUX Security. Hu Weiwei Introduction to UNIX/LINUX Security Hu Weiwei Operation System Security The Security Problems in Operation Systems become more and more important The Security techniques improved rapidly The number of

More information

Unix Introduction to UNIX

Unix Introduction to UNIX Unix Introduction to UNIX Get Started Introduction The UNIX operating system Set of programs that act as a link between the computer and the user. Developed in 1969 by a group of AT&T employees Various

More information

Copyright 2013

Copyright 2013 This video will look at 9 of the biggest new features in Windows Server 2012. Understanding what is available will help decide if Windows Server 2012 is the right choice for you. New Features This video

More information

Configuring Cisco TelePresence Manager

Configuring Cisco TelePresence Manager CHAPTER 3 Revised: November 27, 2006, First Published: November 27, 2006 Contents Introduction, page 3-1 System Configuration Tasks, page 3-2 Security Settings, page 3-3 Database, page 3-4 Room Phone UI,

More information

DESIGN OF RADIUS SERVER ON SERVER NETWORK INTERNET FACULTY OF COMPUTER SCIENCE UNIVERSITY MUHAMMADIYAH METRO

DESIGN OF RADIUS SERVER ON SERVER NETWORK INTERNET FACULTY OF COMPUTER SCIENCE UNIVERSITY MUHAMMADIYAH METRO International Journal Information System and Computer Science (IJISCS) Full Paper eissn : 2598-246x pissn : 2598-0793 DESIGN OF RADIUS SERVER ON SERVER NETWORK INTERNET FACULTY OF COMPUTER SCIENCE UNIVERSITY

More information

Hello! My name is Karl Auer. I'm with Into6. But today is about MikroTik. - and about networking Into6 (

Hello! My name is Karl Auer. I'm with Into6. But today is about MikroTik. - and about networking Into6 ( Hello! My name is Karl Auer I'm with Into6 But today is about MikroTik - and about networking... 2013 Into6 (www.into6.com.au) Slide #1 Latvian company; www.mikrotik.com Started in 1995, manufacturer since

More information

VSB Backup and Recovery

VSB Backup and Recovery CHAPTER 6 This chapter describes how to backup and recover a VSB, and includes the following sections: Information About, page 6-1 Guidelines and Limitations, page 6-1 Configuring VSB Backup and Restoration,

More information

UFTP STANDALONE CLIENT

UFTP STANDALONE CLIENT UFTP Standalone Client UFTP STANDALONE CLIENT UNICORE Team Document Version: 1.0.0 Component Version: 0.5.0 Date: 14 06 2016 UFTP Standalone Client Contents 1 Prerequisites 1 2 Installation 1 3 Basic Usage

More information

WLM1200-RMTS User s Guide

WLM1200-RMTS User s Guide WLM1200-RMTS User s Guide Copyright 2011, Juniper Networks, Inc. 1 WLM1200-RMTS User Guide Contents WLM1200-RMTS Publication Suite........................................ 2 WLM1200-RMTS Hardware Description....................................

More information

CTEC1863/2018F Bonus Lab Page 1 of 5

CTEC1863/2018F Bonus Lab Page 1 of 5 CTEC1863/2018F Bonus Lab Page 1 of 5 Bonus Lab: OpenSUSE Linux Rescue In this lab, we will install an OpenSUSE virtual machine. However, both the non-root user and the root passwords are unknown. To fix

More information

Manual. bintec elmeg GmbH. Manual. bintec elmeg Dime Manager. Copyright Version 1.3.8, 2013 bintec elmeg GmbH

Manual. bintec elmeg GmbH. Manual. bintec elmeg Dime Manager. Copyright Version 1.3.8, 2013 bintec elmeg GmbH Manual Manual Copyright Version 1.3.8, 2013 1 Manual Legal Notice Warranty This publication is subject to change. offers no warranty whatsoever for information contained in this manual. is not liable for

More information

Exporting and Importing a Virtual Service Blade

Exporting and Importing a Virtual Service Blade This chapter contains the following sections: Information About, page 1 Guidelines and Limitations for, page 1 Exporting a Virtual Service Blade, page 2 Importing a Virtual Service Blade, page 5 Verifying

More information

Mikrotik Router Documentation

Mikrotik Router Documentation Mikrotik Router Documentation 1 / 6 2 / 6 3 / 6 Mikrotik Router Documentation Reference Manual (HTML) Specifications Sheet (HTML) V2.3: MikroTik v2.3 Router Software Manual as one big file (HTML) V2.2:

More information

Barracuda NextGen Report Creator

Barracuda NextGen Report Creator The creates customized reports using statistics and logs collected on Barracuda NextGen F-Series Firewalls. Each report can be configured to use multiple appliances, custom or predefined report data templates,

More information

Practical Session 0 Introduction to Linux

Practical Session 0 Introduction to Linux School of Computer Science and Software Engineering Clayton Campus, Monash University CSE2303 and CSE2304 Semester I, 2001 Practical Session 0 Introduction to Linux Novell accounts. Every Monash student

More information

Part I. Introduction to Linux

Part I. Introduction to Linux Part I Introduction to Linux 7 Chapter 1 Linux operating system Goal-of-the-Day Familiarisation with basic Linux commands and creation of data plots. 1.1 What is Linux? All astronomical data processing

More information