User Tools

Site Tools


eop:office_electronics:networking_hardware

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Next revision
Previous revision
eop:office_electronics:networking_hardware [2021/12/30 19:14] – created io55admineop:office_electronics:networking_hardware [2022/04/22 22:47] (current) io55admin
Line 1: Line 1:
-networkers+====== Networking Hardware ====== 
 + 
 +Devices meant for managing and controlling a network. This does not include modems or routers; see [[eop:office_electronics:routers_and_modems|Routers and Modems]] for this. These devices, unlike the aforementioned routers, will run a large variety of architectures. SuperH, ARM, x86, and MIPS are just some of the potential CPUs, while OSes will vary from Linux variants, BSD variants, DOS variants, and more. 
 + 
 +===== Armish-based devices ===== 
 + 
 +==== Operating Systems (ARM) ==== 
 +=== OpenBSD === 
 +>It is intended to support a variety of rather similar ARM-based machines 
 + 
 +This port was discontinued in 2016 with 5.9/6.0, but it is capable of putting OpenBSD on various network-based hardware on the “ARMish” architecture, which may or may not be an official name. 
 + 
 +https://www.openbsd.org/armish.html 
 + 
 + 
 + 
 +===== Connected Data Transporter ===== 
 + 
 +==== Operating Systems ==== 
 +=== Linux === 
 +>gain persistent root access after hooking up your UART adapter and hijacking kernel init 
 + 
 +This little remote file access thing has a method for persistent root access, via exploiting the open U-Boot over UART. 
 + 
 +[[https://www.exploitee.rs/index.php/Connected_Data_Transporter%E2%80%8B|https://www.exploitee.rs/index.php/Connected_Data_Transporter]] 
 + 
 + 
 + 
 +===== CruiseLAN Access Points ===== 
 + 
 +==== Operating Systems (AMD 386SX-40) ==== 
 +=== DR-DOS === 
 +>I plugged it back in and it boots! It's running DR-DOS 
 + 
 +Very low power, due to the lack of RAM. Can barely run crummy edutainment games, Despite all of this, it is in fact a little DOS 386 computer. May be possible to do RAM upgrades, and thus, get a more serviceable PC out of it. 
 + 
 +https://imgur.com/a/g5P9Z 
 + 
 + 
 +=== Emulation Nest === 
 +This device runs an operating system which is known to emulate various devices with EOPs. See the [[eop:operating_systems:conventional:dos|DOS]] page. 
 + 
 + 
 + 
 +===== Fluke EtherScope Analyzer ===== 
 + 
 +==== Operating Systems (Marvell ARM LUPXA255A0 C400/PXA255) ==== 
 +=== Linux? === 
 +Even the guy in the video isn’t entirely sure, but this appears to run Linux, considering there’s references to it all over the place. Whether it can be hacked and unlocked, however, is a different question entirely… also, it has a web browser 
 + 
 +https://www.youtube.com/watch?v=EFopdjBgMKI 
 + 
 + 
 + 
 +===== Google OnHub ===== 
 + 
 +==== Operating Systems ==== 
 +=== Root access === 
 +>Remove the hidden screw under your OnHub to access the hidden "Developer Mode" switch 
 + 
 +By enabling a developer mode and running various commands, it’s possible to open root ssh access onto these things. Asus has made one too, and those links are included in this entry. 
 + 
 +https://www.exploitee.rs/index.php/Asus_OnHub 
 + 
 +https://www.exploitee.rs/index.php/Rooting_The_Google_OnHub 
 + 
 + 
 + 
 +===== I-ODATA NAS series ===== 
 + 
 +==== Operating Systems (Super-H 4) ==== 
 +=== NetBSD === 
 +>UHDL-160U and UHDL-300U (May be found in USA) 
 + 
 +A fair amount of NAS appliances are supported by this NetBSD port. While they are primarily found in Japan, a few models may be available in the United States. A few Plextor devices are also compatible with this port. 
 + 
 +http://wiki.netbsd.org/ports/landisk/ 
 + 
 + 
 + 
 +=== OpenBSD === 
 +>OpenBSD/landisk is the 1st OpenBSD port to a Hitachi/Renesas SH-4 based machine 
 + 
 +Similar to the NetBSD port, this version of OpenBSD supports a variety of these SH-4 based devices. 
 + 
 +https://www.openbsd.org/landisk.html 
 + 
 + 
 + 
 +===== Lexmark N2050 Wi-Fi Card/Server ===== 
 + 
 +==== Operating Systems (???) ==== 
 +=== Linux + Busybox === 
 +>You now are root user in the N2050. 
 + 
 +This is a Wi-Fi Card found only in the Lexmark X6570, a relatively old printer. With some soldering, USB-UART, and some wires, it can be hacked and turned into a basic root-access linux computer. Many print servers may be like this, so keep that in mind. 
 + 
 +https://en.wikipedia.org/wiki/Print_server 
 + 
 +https://web.archive.org/web/20120616095609/http://wiki.freegeekarkansas.org/fgar/ 
 + 
 +https://web.archive.org/web/20120616095609/http://wiki.freegeekarkansas.org/fgar/Lexmark_N2050_Wifi_Card_Hack 
 + 
 + 
 + 
 +===== Netgear WN3000RP ===== 
 + 
 +==== Operating Systems (MIPS?) ==== 
 +=== OpenWRT === 
 +>a telnet daemon can be launched by executing '/usr/sbin/telnetd &' 
 + 
 +Simple UART access and starting telnet allows remote root access to this device’s preexisting OpenWRT installation. 
 + 
 +https://www.exploitee.rs/index.php/Netgear_WN3000RP 
 + 
 + 
 + 
 +===== QNAP TS-131 ===== 
 + 
 +==== Operating Systems ==== 
 +=== Linux === 
 +>This service is vulnerable to a command injection vulnerability resulting in remote cmd execution 
 + 
 +A QNAP TS-131 was the device used for this exploit, but it will work on many QNAP devices of this kind. In essence, it hijacks a certain service that transcodes files, with the purpose of attaining root cmd access. 
 + 
 +https://www.exploitee.rs/index.php/QNAP_TS-131 
 + 
 + 
 + 
 +===== Smoothwall ??? Switch ===== 
 + 
 +==== Operating Systems (something x86-64) ==== 
 +=== Various OSes (+Doom) === 
 +>install HDD, spam F2 on boot, install any OS you like (Mac, Windows, Linux, BSD, etc) 
 + 
 +All this needs is a display and keyboard hooked up to it. For some reason, despite just being a network switch, the hardware in there is powerful enough to run those listed OSes, plus Doom as a demonstration, of course. 
 + 
 +https://www.reddit.com/r/pcmasterrace/comments/71a8pk/heard_you_guys_like_doom_running_on_things_so/dn9qhci/ 
 + 
 + 
 + 
 +===== Sonus SBC 1000 Gateway ===== 
 + 
 +==== Operating Systems (x86?) ==== 
 +=== Emulation Nest === 
 +This device runs an operating system which is known to emulate various devices with EOPs. See the [[eop:operating_systems:conventional:dos|DOS]] page. 
 + 
 +=== WinNT, XP, Win10, DOS, etc. === 
 +The function of this is hard to classify, but in essence, it is a low-power device meant for accessing a host machine using VoIP sessions. Even though it’s normally meant to be used headless, there is a VGA output available on it’s front. Using this and a USB drive, one can install various OSes on this, while playing games such as DOOM and MS Flight Simulator. 
 + 
 +https://www.youtube.com/watch?v=pCPseZTZtaI 
 + 
 +https://www.youtube.com/watch?v=XyX5VURNXps 
 + 
 +https://www.ucmadscientist.com/running-doom-on-a-teams-isdn-gateway/ 
 + 
 +https://www.ucmadscientist.com/ribbon-sbc-1000s-dirty-little-secret-vga-port/ 
 + 
 + 
 + 
 +===== Western Digital MyCloud ===== 
 + 
 +==== Operating Systems (???) ==== 
 +=== Linux === 
 +>a series of network attached storage devices 
 + 
 +An absolutely massive amount of exploits and methods exist for this thing. One can even write to it’s LCD. Pick the method that is best suited for one’s purposes. 
 + 
 +https://www.exploitee.rs/index.php/Western_Digital_MyCloud
eop/office_electronics/networking_hardware.1640909652.txt.gz · Last modified: by io55admin