Today, for troubleshooting purposes, I needed to capture traffic from a Mikrotik wireless access point that I have. Mikrotik devices have a build-in tool called Packet sniffer, which does exactly what I need but what if I had these captures on a remote PC ?
Well we can accomplish this and have the captures on wireshark. All we need is network connectivity, of course, between the Mikrotik device and the PC running wireshark. I am using wireshark 2.2.7 by the way.
For the past 3 days, I was looking for a way to make changes to the classic’s theme CSS. As an amateur, I thought that if I make the changes I want to the files that are located on the _dev directory inside my theme, changes will be converted to CSS……. WRONG !!!
So I started looking harder. There are many solutions on the internet. Some almost worked, some not, some were to complicated to understand. After spending hours and hours o this, I final made it. So here it goes.
Cisco announced a remote code execution vulnerability that affects telnet on catalyst series devices. Once again this has to do with the documents leaked by Wikileaks, known as Vault 7.
Cisco recommends to enable only SSH access on the devices affected, if possible. For devices that do not support SSH, VTY access lists may be applied to reduce the risk.
More information about the vulnerability and the devices affected, can be found here.
This is for those who are having the HTTP service of mikrotik activated on the internet.
On March 2017 Wikileaks published some documents that supposed to belong to CIA under the name of Vault 7, describing that CIA has an exploit called “ChimayRed” by which can inject malicious code on RouterOS if the HTTP service is not protected.
You can find info and information on solving this, here.
Due to issues reported, I had to re-write this guide. This time all certificates are generated by mikrotik routerboard. I use openssl just to create the .p12 personal information exchange file for the android client.
Mikrotik routerOS used : 6.41.1
Android version used : 7
First we have to create some SSL certificates. A CA, a server certificate and a client certificate. Let’s start with the CA. Replace XX and xxxxxx with your information :
add name=ca-template common-name=myCa key-usage=key-cert-sign,crl-sign days-valid=3650 key-size=2048 country=XX state=xxxxxx locality=xxxxxx organization=xxxxxx unit="Certificate Authority"
sign ca-template name=myCa
set myCa trusted=yes
Dump1090 is an ADS-B decoder and it is used with the RTL-SDR dongle. Automatic Dependent Surveillance Broadcast or ADS-B is the system that is used by aircrafts to transmit their GPS position. Dump1090 receives this information from the RTL-SDR dongle and prints out the location of the aircraft on google maps.
This guide will cover the installation of dump1090. To work, you neet to have the RTL-SDR dongle and of course an antenna tuned to 1090MHz . Continue reading
If you suddenly loose Internet access, you can play an endless running game. This only works if your computer isn’t connected to the Internet.
Meet T. Rex. He shows up when Chrome can’t connect to the Internet. It looks like this: Continue reading
To be able to add images on devices, you must already have a TFTP-Server and of course the necessary .xml configuration files.
Every cisco telephone set has it’s own demands. The image format must be on .PNG with specific dimensions
||Image dimensions (pixels)
||95 X 34
||23 X 8
||320 X 196
||80 X 49
||320 X 212
||80 X 53
||320 X 212
||80 X 53
WARNING : This solution is not the best way to protect your property.
First of all, I am not a programmer so many of you will notice my elementary skills on coding. If you have anny issues or suggestions please contact me at info[at]wizzycom[dot]net
Some information about Ademco Contact ID.
Ademco Contact ID is a protocol that establishes communication between a a security system and a monitoring station . The security system sends a 16-digit code to the monitoring center and the monitoring station converts this to readable information.
Let’s see the sections of this 16-digit code :
The monitoring station receives the code above ( not a real example, but it is easier to understand the sections ) : Continue reading
I had the task to get a wordpress website working on the internet. The website was only used locally under the domain intranet.local. So the customer wanted to publish it to the internet under the domain example.com but also under the domain intranet.local. Continue reading