User Tools

Site Tools


eop:office_electronics:networking_hardware

Networking Hardware

Devices meant for managing and controlling a network. This does not include modems or routers; see Routers and Modems for this. These devices, unlike the aforementioned routers, will run a large variety of architectures. SuperH, ARM, x86, and MIPS are just some of the potential CPUs, while OSes will vary from Linux variants, BSD variants, DOS variants, and more.

Armish-based devices

Operating Systems (ARM)

OpenBSD

It is intended to support a variety of rather similar ARM-based machines

This port was discontinued in 2016 with 5.9/6.0, but it is capable of putting OpenBSD on various network-based hardware on the “ARMish” architecture, which may or may not be an official name.

https://www.openbsd.org/armish.html

Connected Data Transporter

Operating Systems

Linux

gain persistent root access after hooking up your UART adapter and hijacking kernel init

This little remote file access thing has a method for persistent root access, via exploiting the open U-Boot over UART.

https://www.exploitee.rs/index.php/Connected_Data_Transporter

CruiseLAN Access Points

Operating Systems (AMD 386SX-40)

DR-DOS

I plugged it back in and it boots! It's running DR-DOS

Very low power, due to the lack of RAM. Can barely run crummy edutainment games, Despite all of this, it is in fact a little DOS 386 computer. May be possible to do RAM upgrades, and thus, get a more serviceable PC out of it.

https://imgur.com/a/g5P9Z

Emulation Nest

This device runs an operating system which is known to emulate various devices with EOPs. See the DOS page.

Fluke EtherScope Analyzer

Operating Systems (Marvell ARM LUPXA255A0 C400/PXA255)

Linux?

Even the guy in the video isn’t entirely sure, but this appears to run Linux, considering there’s references to it all over the place. Whether it can be hacked and unlocked, however, is a different question entirely… also, it has a web browser

https://www.youtube.com/watch?v=EFopdjBgMKI

Google OnHub

Operating Systems

Root access

Remove the hidden screw under your OnHub to access the hidden “Developer Mode” switch

By enabling a developer mode and running various commands, it’s possible to open root ssh access onto these things. Asus has made one too, and those links are included in this entry.

https://www.exploitee.rs/index.php/Asus_OnHub

https://www.exploitee.rs/index.php/Rooting_The_Google_OnHub

I-ODATA NAS series

Operating Systems (Super-H 4)

NetBSD

UHDL-160U and UHDL-300U (May be found in USA)

A fair amount of NAS appliances are supported by this NetBSD port. While they are primarily found in Japan, a few models may be available in the United States. A few Plextor devices are also compatible with this port.

http://wiki.netbsd.org/ports/landisk/

OpenBSD

OpenBSD/landisk is the 1st OpenBSD port to a Hitachi/Renesas SH-4 based machine

Similar to the NetBSD port, this version of OpenBSD supports a variety of these SH-4 based devices.

https://www.openbsd.org/landisk.html

Lexmark N2050 Wi-Fi Card/Server

Operating Systems (???)

Linux + Busybox

You now are root user in the N2050.

This is a Wi-Fi Card found only in the Lexmark X6570, a relatively old printer. With some soldering, USB-UART, and some wires, it can be hacked and turned into a basic root-access linux computer. Many print servers may be like this, so keep that in mind.

https://en.wikipedia.org/wiki/Print_server

https://web.archive.org/web/20120616095609/http://wiki.freegeekarkansas.org/fgar/

https://web.archive.org/web/20120616095609/http://wiki.freegeekarkansas.org/fgar/Lexmark_N2050_Wifi_Card_Hack

Netgear WN3000RP

Operating Systems (MIPS?)

OpenWRT

a telnet daemon can be launched by executing '/usr/sbin/telnetd &'

Simple UART access and starting telnet allows remote root access to this device’s preexisting OpenWRT installation.

https://www.exploitee.rs/index.php/Netgear_WN3000RP

QNAP TS-131

Operating Systems

Linux

This service is vulnerable to a command injection vulnerability resulting in remote cmd execution

A QNAP TS-131 was the device used for this exploit, but it will work on many QNAP devices of this kind. In essence, it hijacks a certain service that transcodes files, with the purpose of attaining root cmd access.

https://www.exploitee.rs/index.php/QNAP_TS-131

Smoothwall ??? Switch

Operating Systems (something x86-64)

Various OSes (+Doom)

install HDD, spam F2 on boot, install any OS you like (Mac, Windows, Linux, BSD, etc)

All this needs is a display and keyboard hooked up to it. For some reason, despite just being a network switch, the hardware in there is powerful enough to run those listed OSes, plus Doom as a demonstration, of course.

https://www.reddit.com/r/pcmasterrace/comments/71a8pk/heard_you_guys_like_doom_running_on_things_so/dn9qhci/

Sonus SBC 1000 Gateway

Operating Systems (x86?)

Emulation Nest

This device runs an operating system which is known to emulate various devices with EOPs. See the DOS page.

WinNT, XP, Win10, DOS, etc.

The function of this is hard to classify, but in essence, it is a low-power device meant for accessing a host machine using VoIP sessions. Even though it’s normally meant to be used headless, there is a VGA output available on it’s front. Using this and a USB drive, one can install various OSes on this, while playing games such as DOOM and MS Flight Simulator.

https://www.youtube.com/watch?v=pCPseZTZtaI

https://www.youtube.com/watch?v=XyX5VURNXps

https://www.ucmadscientist.com/running-doom-on-a-teams-isdn-gateway/

https://www.ucmadscientist.com/ribbon-sbc-1000s-dirty-little-secret-vga-port/

Western Digital MyCloud

Operating Systems (???)

Linux

a series of network attached storage devices

An absolutely massive amount of exploits and methods exist for this thing. One can even write to it’s LCD. Pick the method that is best suited for one’s purposes.

https://www.exploitee.rs/index.php/Western_Digital_MyCloud

eop/office_electronics/networking_hardware.txt · Last modified: 2022/04/22 22:47 by io55admin