Jump to content

denartha

Active Members
  • Posts

    14
  • Joined

  • Last visited

Everything posted by denartha

  1. RT @hacks4pancakes: I have a friend working on a @ihackcharities infosec kid's book (for charity). He needs an illustrator, cheap or pro bo…

  2. @MichaelKellyIC go to TV guide, then on the bar at the top go to options, then go to Other CH, there you will find ITV, UTV and even STV

  3. @BrianHonan @rtenews also stop telling people the head of marketing of a company is an IT Security expert.

  4. @anantshri @ChrisJohnRiley @notsosecure the penny drops. Thanks

  5. @CiaranmaK fighting fire with fire?

  6. @CiaranmaK just read your blog. Yep.

  7. RT @threatpost: Update to this morning's story: Flash 0day CVE-2016-4117 now in Angler Exploit Kit, dropping #Dridex malware: https://t.co/…

  8. @pgt_nullsec if its any consolation pornhub don't care about XSS.

  9. Do any if my followers in Dublin have a circular saw I can borrow for 30 mins?

  10. #digitalview I work in InfoSec. I'll never be out of a job.

  11. #digitalview you're "Cyber security investigator" is hopeless. I know more about the "data hack" than he does.

  12. RT @raistolo: If you think Ashley Madison is bad enough, think how much worse it could be if they had location tracking data. Oh, hi Tinder…

  13. By some sort of Karma my girlfriend woke up and I asked her for her laptop password. I tried, easily 14 times on my beloved Lenovo x220 running fedora to complete the unbricking process and it didnt work. My girlfriends crappy consumer-grade laptop running Windows 8 completed the unbricking process first time around. Good News: My Lan Turtle is back. Bad News: The world no-longer makes sense. Well, tbh, the world never made a lot of sense, but now it makes less. Barry, thank you!
  14. I'll need to set one up. Will post results tomorrow. Well, in about 10 hours.
  15. Just to clarify, it still isn't working.
  16. In the dmesg output I posted above they're were some USB errors, when plugged into a different port, the output of dmesg reads: [28802.157429] usb 2-1.2: new high-speed USB device number 10 using ehci-pci [28802.244972] usb 2-1.2: New USB device found, idVendor=0bda, idProduct=8152 [28802.244982] usb 2-1.2: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [28802.244987] usb 2-1.2: Product: USB 10/100 LAN [28802.244992] usb 2-1.2: Manufacturer: Realtek [28802.244995] usb 2-1.2: SerialNumber: 00E04C36083D [28802.321536] usb 2-1.2: reset high-speed USB device number 10 using ehci-pci [28802.463845] r8152 2-1.2:1.0 eth0: v1.04.0 (2014/01/15) [28802.536993] systemd-udevd[16336]: renamed network interface eth0 to enp0s29u1u2 [28802.557818] IPv6: ADDRCONF(NETDEV_UP): enp0s29u1u2: link is not ready [28804.160882] IPv6: ADDRCONF(NETDEV_CHANGE): enp0s29u1u2: link becomes ready
  17. Pretty much the exact same thing happened to me. After the upgrade I didnt get the amber light. I gave it a while, not an hour but 20 minutes anyway. Now when I plug it into my laptop, I get a steady green light and the amber comes on for about a second and then goes off. The device is recognised in dmesg. [27683.714098] usb 3-1: New USB device found, idVendor=0bda, idProduct=8152 [27683.714106] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [27683.714110] usb 3-1: Product: USB 10/100 LAN [27683.714114] usb 3-1: Manufacturer: Realtek [27683.714117] usb 3-1: SerialNumber: 00E04C36083D [27683.821966] usb 3-1: reset high-speed USB device number 15 using xhci_hcd [27683.822044] xhci_hcd 0000:0e:00.0: Setup ERROR: setup context command for slot 1. [27683.974449] usb 3-1: reset high-speed USB device number 15 using xhci_hcd [27683.974500] xhci_hcd 0000:0e:00.0: Setup ERROR: setup context command for slot 1. [27684.127777] usb 3-1: reset high-speed USB device number 15 using xhci_hcd [27684.142708] xhci_hcd 0000:0e:00.0: xHCI xhci_drop_endpoint called with disabled ep ed061a80 [27684.142717] xhci_hcd 0000:0e:00.0: xHCI xhci_drop_endpoint called with disabled ep ed061aac [27684.142720] xhci_hcd 0000:0e:00.0: xHCI xhci_drop_endpoint called with disabled ep ed061ad8 [27684.247812] r8152 3-1:1.0 eth0: v1.04.0 (2014/01/15) [27684.319136] systemd-udevd[15723]: renamed network interface eth0 to enp14s0u1 I don't get an IP although I can see the DHCP requests. I have assigned the IP 192.168.1.2 to the interface but I cannot ping or access the web interface. I have tried the unbricking method(dozens of times now actually) and either I am doing something wrong or something is wrong with my device. The instructions I followed are from the wiki, thus: 1. Download the latest factory image from https://downloads.lanturtle.com/turtle-2-factory.bin 2. Carefully open the LAN Turtle case by removing the two screws underneath the sticker on the bottom 3. While holding the button on the bottom of the LAN Turtle, plug the device into a computer 4. After 3 seconds let go of the button and wait an additional 30 seconds to receive an IP address from the LAN Turtle 5. If you do not receive an IP address in the 192.168.x range from the LAN Turtle within a minute, statically assign the LAN Turtle's interface to 192.168.1.2 (netmask 255.255.255.0) 6. Browse to the LAN Turtle firmware recovery web interface at http://192.168.1.1 7. Follow the on screen prompts to upload and flash the factory image downloaded in step 1 8. When the flash is complete the LAN Turtle will reboot and will be accessible again from 172.16.84.1 with the default username root and password sh3llz I'm kind of stumped. Any one have any suggestions?
  18. RT @PicardTips: Picard management tip: Time is the rarest commodity. Manage yours wisely.

  19. Logjam, new SSL vulnerability. No logo yet so probably not a big deal: http://t.co/fFiyOqqqBz

  20. RT @billclinton: Welcome to @Twitter, @POTUS! One question: Does that username stay with the office? #askingforafriend

  21. RT @LegitBS_CTF: We will be leaving some instances up until Wednesday evening, so you can test your exploits that you were "thiiiiis close"…

  22. RT @ProfCaryCooper: Funny & profound letter in the Telegraph! #life http://t.co/D79qcmzcyO

  23. RT @hdmoore: PoC for VENOM (CVE-2015-3456) is out, run as root in a qemu guest: https://t.co/jSnUPbwiQq

×
×
  • Create New...