Thursday, September 14, 2017

Hi everybody! welcome back to war! I think the boolean tribe liked this one...its because webservers are not direct connected to the internet, and so you we need a hacking hardware, for listen to their protection sensors. and then send the packet storm, because there's no way, they going solve this on any firewall !

How to use ESP8266 ESP-01 as a SENSOR web client


I’m not going to explain in detail what is ESP8266 because if you have found this post I’m sure you already know it. But just in case, it is an awesome cheap board (less than 4$) with built-in wifi communication (802.11 b/g/n), and SPI, UART. You can also use its processor to run your code.

Wiring: ESP8266 - reflash firmware

Use FTDI with 3V3 output. If you face problems with this running on Windows check this link: Unbrick FTDI 232R

Burning LuaFirmware

Download Coolterm http://freeware.the-meiers.org/ (putty like app but much cooler)
Check that your ESP8266 has some firmware through coolterm
Enter with coolterm at 115200 (most probable default speed)
Once in, type AT+GMR, my firmware was based on 00160901
esp8266-update-01
Congrats, you’ve got a working ESP8266 with a espressif firmware in it. If you want to play with this firmware check this out: http://www.electrodragon.com/w/Wi07c#Other_firmware
Now to burn LUA firmware:
To Burn a firmware: CH_PD pin must be always connected to HIGH and GPIO0 pin to GROUND (LOW)
Download ESP8266 flasher: https://docs.google.com/file/d/0B3dUKfqzZnlwVGc1YnFyUjgxelE/editDownload LUA Firmware: https://github.com/nodemcu/nodemcu-firmwareExecute ESP8266_flasher.exe and burn the bin inside LUA Firmware
esp8266-update-02
After burning it,  GPIO0 pin should be disconnected from ground in order to reboot in normal mode. Otherwise it will be reboot in UPLOAD mode. So power it OFF, disconnect GPIO0 pin  from ground… and voilà! you’ve got a ESP8266 with LUA Firmware


BasicCoding

Now with a burned LUA Firmware, we should reconfigure CoolTerm at 9600bps to be able to communicate with the board.
Connect and type this basic code to check the wifi connectivity:
1
2
3
4
5
6
print(wifi.sta.getip())
--0.0.0.0
wifi.setmode(wifi.STATION)
wifi.sta.config("SSID","password")
print(wifi.sta.getip())
--192.168.18.110
Congrats, now each time you power it on back again, it will remember last wifi connection wifi setup.


Coding the automatic script

For this example we have used the following wiring:
ESP8266 - Push button web
With this basic script we will be able to know the state of a push button from the web.
Firstly we will build a LUA script named door.lua
So boot the terminal and type the following:
1
2
3
4
5
6
7
8
9
10
11
12
13
file.remove(“door.lua”)
file.open(“door.lua”,”w”)
writeline([[srv=net.createServer(net.TCP) srv:listen(80,function(conn)]])
writeline([[conn:on("receive",function(conn,payload)]])
writeline([[print(node.heap())]])
writeline([[door="open"]])
file.writeline([[if gpio.read(8)==1 then door="OPEN" else door="CLOSED" end]])
file.writeline([[conn:send("<h1> The door is " .. door ..".</h1>")]])
file.writeline([[end)]])
file.writeline([[conn:on("sent",function(conn) conn:close() end)]])
file.writeline([[end)]])
file.close()<b>
</b>
After this, you will have written a door.lua script that it’s gonna be available in the ESP8266 after each power off and on.
To execute it type:
1
dofile(“door.lua”)
and if you don’t know the ip of ESP8266 type:
1
2
print(wifi.sta.getip())
--192.168.18.110
Now input the IP of the ESP8266 as a URL on your favorite browser and you will have the result you’ve been looking for!
An issue is that the script is stored on the circuit but it’s not loading automatically. To fix this, we have to modify the init.lua script. Type at console:
1
2
3
4
5
file.remove(“init.lua”)
file.open(“init.lua”,”w”)
writeline([[print("Pete's LUA module 0.1")]])
file.writeline([[tmr.alarm(4000, 0, function() dofile("door.lua") end )]])
file.close()
Reboot, and now each time will be automatically executing the code. Plug the esp8266 to two 1.5V battery, remove FTDI and voilà! Automatic DOOR Sensor IOT!!!
Thanks to everyone who has spend many hours developing and sharing.

Bonus

ESP8266 range test with awesome results!


https://importhack.wordpress.com/2014/11/22/how-to-use-ep8266-esp-01-as-a-sensor-web-client/
Advertisements

Monday, September 11, 2017

Switching your TG582n router from ADSL to Fibre Optic Broadband

Hi everybody! welcome back to war !!!! so we want to writerun a code that uploads an image to docker...

// start all services required for the build
 // that will get linked to the container.
 for _, service := range b.Build.Services {

  // Parse the name of the Docker image
  // And then construct a fully qualified image name
  owner, name, tag := parseImageName(service)
  cname := fmt.Sprintf("%s/%s:%s", owner, name, tag)

  // Get the image info
  img, err := b.dockerClient.Images.Inspect(cname)
  if err != nil {
   // Get the image if it doesn't exist
   if err := b.dockerClient.Images.Pull(cname); err != nil {
    return fmt.Errorf("Error: Unable to pull image %s", cname)
   }

   img, err = b.dockerClient.Images.Inspect(cname)
   if err != nil {
    return fmt.Errorf("Error: Invalid or unknown image %s", cname)
   }
  }

  // debugging
  log.Infof("starting service container %s", cname)

  // Run the contianer
  run, err := b.dockerClient.Containers.RunDaemonPorts(cname, img.Config.ExposedPorts)
  if err != nil {
   return err
  }

  // Get the container info
  info, err := b.dockerClient.Containers.Inspect(run.ID)
  if err != nil {
   // on error kill the container since it hasn't yet been
   // added to the array and would therefore not get
   // removed in the defer statement.
   b.dockerClient.Containers.Stop(run.ID, 10)
   b.dockerClient.Containers.Remove(run.ID)
   return err
  }

  // Add the running service to the list
  b.services = append(b.services, info)
 }

https://searchcode.com/codesearch/view/86051745/

Sunday, September 10, 2017

New World - Ikigai [Defcon]

ChaosCtrl & R3T3P - Subversion

Address (Host or Network)Netmask (i.e. 24)Netmask for sub/supernet (optional)
 /move to: 
  

Address:   79.169.234.130        01001111.10101001.11101010 .10000010
Netmask:   255.255.255.0 = 24    11111111.11111111.11111111 .00000000
Wildcard:  0.0.0.255             00000000.00000000.00000000 .11111111
=>
Network:   79.169.234.0/24       01001111.10101001.11101010 .00000000 (Class A)
Broadcast: 79.169.234.255        01001111.10101001.11101010 .11111111
HostMin:   79.169.234.1          01001111.10101001.11101010 .00000001
HostMax:   79.169.234.254        01001111.10101001.11101010 .11111110
Hosts/Net: 254                   

3vilTwinAttacker - Create Rogue Wi-Fi Access Point and Snooping on the Traffic


This tool create an rogue Wi-Fi access point , purporting to provide wireless Internet services, but snooping on the traffic.

Software dependencies:
  • Recommended to use Kali linux.
  • Ettercap.
  • Sslstrip.
  • Airbase-ng include in aircrack-ng.
  • DHCP.
  • Nmap.

Saturday, September 9, 2017

the islamic state is problem for us boolean. the more they are "given" the opportunity of striking, the more powerfull the "system" gets. the stupid good cop, shoots them down, and the secret service leaks an information about another plan, convinetly, and then bingo...another political victory! the "system" is obedient. courts, police, entiry armies. obdient. they have the "constitucion"! we don't own the media, they do. . Any email with the CIA's vice with number 2 ISIS man at Beirute, is ignored. armament dealers, do their business, Tancos robbering, one of both, or Greek confusion, or Iran target! ISIS quit Mossul, the "system" decided to go to Iran. Maybe striking Saudi Arabia computation...to get advantage over them. Russia plays along, even warns the US for litle assassination plots against american ambassadors; they do it, right here, at Lisbon. Cicada . Who are they?

How to cause kernel panic with a single command?


compile the following code into a module and insmod it, sure you should get a panic:
static int crash_module_init(void)

{
     printf("crash module starting\n");
     int *p = 0;

     printk("%d\n", *p);

     return 0;
}

static void crash_module_exit(void)
{
    printf("crash module exiting\n");
}

module_init(crash_module_init);
module_exit(crash_module_exit);

Def Leppard - Armageddon It

"FORK" the opening exit of notes


electronic forceps to pull the roll carpet



this is a laraoscopy surgery instrument...as you see has the forceps, and the cable is flexible plastic.


complement the idea may be with some air spray gear...endoscopy spray probe...this one is good for accessing the ATM, by the card entrancy , and electric cut circuit