Prestashop 1.7 – Classic theme SCSS to CSS

For the past 3 days, I was looking for a way to make changes to the classic’s theme CSS. As an amateur, I thought that if I make the changes I want to the files that are located on the _dev directory inside my theme, changes will be converted to CSS……. WRONG !!!

So I started looking harder. There are many solutions on the internet. Some almost worked, some not, some were to complicated to understand. After spending hours and hours o this, I final made it. So here it goes.

Continue reading

Telnet zero-day on cisco devices

Cisco announced a remote code execution vulnerability that affects telnet on catalyst series devices. Once again this has to do with the documents leaked by Wikileaks, known as Vault 7.

Cisco recommends to enable only SSH access on the devices affected, if possible. For devices that do not support SSH, VTY access lists may be applied to reduce the risk.

More information about the vulnerability and the devices affected, can be found here.

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading...

Mikrotik HTTP server vulnerability

This is for those who are having the HTTP service of mikrotik activated on the internet.

On March 2017 Wikileaks published some documents that supposed to belong to CIA under the name of Vault 7, describing that CIA has an exploit called “ChimayRed”  by which can inject malicious code on RouterOS if the HTTP service is not protected.

You can find info and information on solving this, here.

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading...

Mikrotik pure IPsec VPN and android device as client

Due to issues reported, I had to re-write this guide. This time all certificates are generated by mikrotik routerboard. I use openssl just to create the .p12 personal information exchange file for the android client.

Mikrotik routerOS used : 6.41.1
Android version used : 7

First we have to create some SSL certificates. A CA, a server certificate and a client certificate. Let’s start with the CA. Replace XX and xxxxxx with your information :

/certificate
add name=ca-template common-name=myCa key-usage=key-cert-sign,crl-sign days-valid=3650 key-size=2048 country=XX state=xxxxxx locality=xxxxxx organization=xxxxxx unit="Certificate Authority"
sign ca-template name=myCa
set myCa trusted=yes

Continue reading

Dump1090 on CentOS 7

Dump1090 is an ADS-B decoder and it is used with the RTL-SDR dongle. Automatic Dependent Surveillance Broadcast or ADS-B is the system that is used by aircrafts to transmit their GPS position. Dump1090 receives this information from the  RTL-SDR dongle and prints out the location of the aircraft on google maps.

This guide will cover the installation of dump1090. To work, you neet to have the RTL-SDR dongle and of course an antenna tuned to 1090MHz . Continue reading

Custom images on cisco 79XX telephone sets

To be able to add images on devices, you must already have a TFTP-Server and of course the necessary .xml configuration files.

Every cisco telephone set has it’s own demands. The image format must be on .PNG with specific dimensions

Telephone set Image dimensions (pixels) Thumbnail dimensions(pixels) TFTP Folder
7906/7911 95 X 34 23 X 8 /Desktops/95x34x1
7941/7961/7942/7962 320 X 196 80 X 49 /Desktops/320x196x4
7945/7965/7975 320 X 212 80 X 53 /Desktops/320x212x16
7970/7971 320 X 212 80 X 53 /Desktops/320x212x12

Continue reading

Asterisk alarm receiver

WARNING : This solution is not the best way to protect your property.

First of all, I am not a programmer so many of you will notice my elementary skills on coding. If you have anny issues or suggestions please contact me at info[at]wizzycom[dot]net

Some information about Ademco Contact ID.

Ademco Contact ID is a protocol that establishes communication between a a security system and a monitoring station . The security system sends a 16-digit code to the monitoring center and the monitoring station converts this to readable information.

Let’s see the sections of this 16-digit code :

1111223444556667

The monitoring station receives the code above ( not a real example, but it is easier to understand the sections ) : Continue reading