Stealth Attack from the Produce Aisle
|
|
|
- Kenneth Chapman
- 10 years ago
- Views:
Transcription
1 Stealth Attack from the Produce Aisle Keith Benedict & Todd Dow 1
2 Introductions Keith Benedict Innovation & Security Specialist 30+ years IT experience MC* Todd Dow Team Lead, IT Security 15+ years IT experience CISA, 2
3 What are we going to talk about? What options are available? How to build a working device? Hardware add-ons Commonly available software tools Attack and defence scenarios 3
4 First: What are the scenarios? Think about this, where exactly can you see these devices being used? Silent, portable, 4x2x1 footprint, inexpensive and remotely accessible 4
5 Scenarios Targeted PC, either directly connected or MITM 5
6 Scenarios Device plugged into LAN 6
7 Scenarios Operating without wires, Evil AP or more 7
8 Scenarios Many more options exist 8
9 How to build a working device Step 1 - determine the hardware you will use 9
10 Raspberry Pi + Kali 10
11 What's in the box? CanaKit Raspberry Pi 2 complete starter kit, with: Raspberry Pi 2 Wifi 8 GB SD card Case Power supply HDMI cable SanDisk 32 GB Ultra Class 10 Micro SDHC card Alfa AWUS036NH 2000mW 2W g/n High Gain USB Wireless G/N Long- RangeWiFi Network Adapter w/ 5dBi Screw-On swivel rubber antenna and pane. 11
12 Assembling your Pi 12
13 Installing Kali on microsd 1. Download kali linux 2. Verify the download 3. Insert microsd card and determine device path 4. unmount the disk 5. use dd to image the kali file > shasum kali<insert full filename here> > diskutil list > diskutil unmount /dev/disk1 > dd if=kali rpi2.img of=/dev/disk1 bs=1m (control+t to see progress of image creation) 13
14 How to build it - part 2 1. Eject the microsd card 2. Insert disk into Raspberry Pi 2, plug in peripherals and power it up. Voila! 3. Connect via ssh: ssh root@ (substitute your machine's IP address here) You should now have a command line connection to Kali on your Raspberry Pi 2. 14
15 Kali - first things... Change SSH host keys: > rm /etc/ssh/ssh_host_* > dpkg-reconfigure openssh-server > service ssh restart Time setup: > dpkg-reconfigure tzdata Set up VNC Access: > apt-get update > apt-get dist-upgrade -y > apt-get install x11vnc -y > startx & > x11vnc & (in a separate terminal window) Set up Remote Access > apt-get install xrdp -y > chkconfig --levels 35 xrdp on > service xrdp start > service xrdp stop (when finished) Regular maintenance: > apt-get upgrade > apt-get update > apt-get dist-upgrade > cat /etc/issue > uname -a 15
16 Monitor Mode? Hardware Addons Chipsets matter in order to support putting a device into monitor mode. > iwconfig > ifconfig wlan0 up Problems? hardware not detected wpa support rfkill 16
17 Commonly Available Software Tools Tools include: Aircrack or EvilAP Airbase Arp spoofing hping DoS mitmproxy Snort arpwatch ossec log analysis network monitoring 17
18 Scenarios Revisited How to make a reverse ssh proxy Requirements: Public accessible ssh server (Static IP) Raspberry Pi configured to accept ssh connections Certificate setup sor ssh authentication Making the Connection from the Pi: > ssh -N -R 2222:localhost:22 serveruser@ From server you can now do: > ssh -l piuser -p 2222 localhost Persistence is just a small shell script away. Problems? 18
19 Late breaking news Advanced Wi-Fi Attacks Using Commodity Hardware Mathy Vanhoef: vanhoefm/modwifi "Low layer attacks such as reactive and constant jamming using commodity devices" such as AWUS036NHA (sound familiar?) Attacks include: Jamming Selective jamming Channel-based MITM Attack TKIP when used as a group cipher 19
20 Q&A - Third Party Links/Ref Power Brick by TunnelUp The Hacks of Mr. Robot: How to Build a Hacking Raspberry Pi Working with a Raspberry Pi for network attacks 20
Adafruit's Raspberry Pi Lesson 6. Using SSH
Adafruit's Raspberry Pi Lesson 6. Using SSH Created by Simon Monk Last updated on 2015-04-09 03:47:50 PM EDT Guide Contents Guide Contents Overview Enabling SSH Using SSH on a Mac or Linux SSH under Windows
Chapter 1 Hardware and Software Introductions of pcduino
Chapter 1 Hardware and Software Introductions of pcduino pcduino is a high performance, cost effective mini PC platform that runs PC like OS such as Ubuntu Linux. It outputs its screen to HDMI enabled
MITM Man in the Middle
MITM Man in the Middle Wifi Packet Capturing and Session Hijacking using Wireshark Introduction The main Objective of this Attack is to make a Fake Access point and send the fake ARP Packets on same Wi-Fi
CONNECTING THE RASPBERRY PI TO A NETWORK
CLASSROOM CHALLENGE CONNECTING THE RASPBERRY PI TO A NETWORK In this lesson you will learn how to connect the Raspberry Pi computer to a network with both a wired and a wireless connection. To complete
Raspberry Pi Android Projects. Raspberry Pi Android Projects. Gökhan Kurt. Create exciting projects by connecting Raspberry Pi to your Android phone
Fr ee Raspberry Pi is a credit card-sized, general-purpose computer, which has revolutionized portable technology. Android is an operating system that is widely used in mobile phones today. However, there
Getting Started Guide
Getting Started Guide Sophos Firewall Software Appliance Document Date: November 2015 November 2015 Page 1 of 14 Contents Preface...3 Minimum Hardware Requirement...3 Recommended Hardware Requirement...3
Connections and wiring Diagram
Introduction 1 7 Introduction Teleport-Video SD image is based on Asterisk and FreePBX running on the Raspberry Pi. For any information related to Raspberry Pi, check the original website at raspberrypi.org.
Adafruit's Raspberry Pi Lesson 1. Preparing an SD Card for your Raspberry Pi
Adafruit's Raspberry Pi Lesson 1. Preparing an SD Card for your Raspberry Pi Created by Simon Monk Last updated on 2015-11-25 11:50:13 PM EST Guide Contents Guide Contents Overview You Will Need Downloading
WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006
WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able
RASPBERRY PI BAT PROJEKT News and Add ons WLAN connection and UMTS (SMS transmission)
NEWSLETTER 1/2015 RASPBERRY PI BAT PROJEKT News and Add ons WLAN connection and UMTS (SMS transmission) Raspberry Pi is a trademark of the Raspberry Pi Foundation, http://www.raspberrypi.org 1. New WLAN
Raspberry Pi Setup Tutorial
Raspberry Pi Setup Tutorial The Raspberry Pi is basically a miniature linux- based computer. It has an ARM processor on it, specifically the ARM1176JZF- S 700 MHz processor. This is the main reason why
AlienVault. Unified Security Management 4.4-5.x Offline Update and Software Restoration Procedures
AlienVault Unified Security Management 4.4-5.x Offline Update and Software Restoration Procedures USM 4.4-5.x Offline Update and Software Restoration Procedures Copyright 2015 AlienVault, Inc. All rights
CDH installation & Application Test Report
CDH installation & Application Test Report He Shouchun (SCUID: 00001008350, Email: [email protected]) Chapter 1. Prepare the virtual machine... 2 1.1 Download virtual machine software... 2 1.2 Plan the guest
Operating System Installation Guide
Operating System Installation Guide This guide provides instructions on the following: Installing the Windows Server 2008 operating systems on page 1 Installing the Windows Small Business Server 2011 operating
Setting up a Raspberry Pi as a WiFi access point
Setting up a Raspberry Pi as a WiFi access point Created by lady ada Last updated on 2015-03-10 04:30:11 PM EDT Guide Contents Guide Contents Overview What you'll need Preparation Check Ethernet & Wifi
BeagleBone Black: Installing Operating Systems
BeagleBone Black: Installing Operating Systems Created by Justin Cooper Last updated on 2015-01-16 11:00:15 AM EST Guide Contents Guide Contents Overview Choosing an Operating System Angstrom Download
Installing Your Printer to the Network for the First Time
Installing Your Printer to the Network for the First Time PIXMA ip110 Windows OS Wireless Setup Using the USB Cable 1 Installing Your Printer to Your Network for the First Time PIXMA ip110 Windows OS Preparing
Create a virtual machine at your assigned virtual server. Use the following specs
CIS Networking Installing Ubuntu Server on Windows hyper-v Much of this information was stolen from http://www.isummation.com/blog/installing-ubuntu-server-1104-64bit-on-hyper-v/ Create a virtual machine
Using pcduino's WiFi Dongle With the Pi a
Using pcduino's WiFi Dongle With the Pi a learn.sparkfun.com tutorial Available online at: http://sfe.io/t173 Contents Introduction Hardware Setup Edit interfaces Edit wpa_supplicant.conf ifdown and ifup
Using Symantec NetBackup with Symantec Security Information Manager 4.5
Using Symantec NetBackup with Symantec Security Information Manager 4.5 Using Symantec NetBackup with Symantec Security Information Manager Legal Notice Copyright 2007 Symantec Corporation. All rights
Movie Cube. User s Guide to Wireless Function
Movie Cube User s Guide to Wireless Function Table of Contents 1. WLAN USB Adapter Connection...3 2. Wireless Setup...4 2.1 Infrastructure (AP)...5 2.2 Peer to Peer (Ad Hoc)...7 2.3 Settings for PC...8
Interlink Networks Secure.XS and Cisco Wireless Deployment Guide
Overview Interlink Networks Secure.XS and Cisco Wireless Deployment Guide (An AVVID certification required document) This document is intended to serve as a guideline to setup Interlink Networks Secure.XS
Preparing for the Installation
CHAPTER 3 This section describes how to set up the environment for installation. To ensure a successful installation, use the checklist provided in Installation Scenarios and Checklists, page 1-3 for the
Penetration Testing LAB Setup Guide
Penetration Testing LAB Setup Guide (External Attacker - Intermediate) By: magikh0e - [email protected] Last Edit: July 06 2012 This guide assumes a few things... 1. You have read the basic guide of this
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
CYBERTRON NETWORK SOLUTIONS
CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified
Building a Robot Kit with a Raspberry PI 2 and Windows 10 IoT Core
CODING 4 FUN Building a Robot Kit with a Raspberry PI 2 and Windows 10 IoT Core The Internet of Things (IoT) ecosystem is growing faster and faster, and with the introduction of Windows 10, Microsoft has
CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities
CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities DNS name: turing.cs.montclair.edu -This server is the Departmental Server
How to Install Applications (APK Files) on Your Android Phone
How to Install Applications (APK Files) on Your Android Phone Overview An Android application is stored in an APK file (i.e., a file named by {Application Name}.apk). You must install the APK on your Android
Troubleshooting Sprint Mobile Broadband USB Modem by Novatel Wireless TM (Ovation TM U727)
Troubleshooting Sprint Mobile Broadband USB Modem by Novatel Wireless TM (Ovation TM U727) If you are unable to resolve your issue using the Troubleshooting steps below, please contact Sprint Customer
ClearOS Network, Gateway, Server Quick Start Guide
ClearOS Network, Gateway, Server Quick Start Guide Welcome ClearOS is computer Operating System (OS) that provides enterprise-level network security and application services to the Small/Medium-sized Business
Checkmate 5.3.1: Hosted Solution Setup August 7, 2009
Introduction This document outlines the components required to set up a hosted solution, as well as details on how to set up each component. There are two major components: 1. Geotab Checkmate Web Server
USB 2.0 Flash Drive User Manual
USB 2.0 Flash Drive User Manual 1 INDEX Table of Contents Page 1. IMPORTANT NOTICES...3 2. PRODUCT INTRODUCTION...4 3. PRODUCT FEATURES...5 4. DRIVER INSTALLATION GUIDE...6 4.1 WINDOWS 98 / 98 SE... 6
Setting up VNC, SAMBA and SSH on Ubuntu Linux PCs Getting More Benefit out of Your Local Area Network
What Are These Programs? VNC (Virtual Network Computing) is a networking application that allows one computer's screen to be viewed by, and optionally controlled by one or more other computers through
Lab 9.1.1 Organizing CCENT Objectives by OSI Layer
Lab 9.1.1 Organizing CCENT Objectives by OSI Layer Objectives Organize the CCENT objectives by which layer or layers they address. Background / Preparation In this lab, you associate the objectives of
Partek Flow Installation Guide
Partek Flow Installation Guide Partek Flow is a web based application for genomic data analysis and visualization, which can be installed on a desktop computer, compute cluster or cloud. Users can access
Setup Wireless LAN (WLAN) on the Raspberry Pi
Setup Wireless LAN (WLAN) on the Raspberry Pi 1. Introduction Adding a wireless LAN connection to the Raspberry Pi (RPi) requires only a USB wireless access device (also called WLAN dongle and Wi-Fi dongle)
Snow Inventory. Installing and Evaluating
Snow Inventory Installing and Evaluating Snow Software AB 2002 Table of Contents Introduction...3 1. Evaluate Requirements...3 2. Download Software...3 3. Obtain License Key...4 4. Install Snow Inventory
TE100-P21/TEW-P21G Windows 7 Installation Instruction
Hardware Installation TE100-P21/TEW-P21G Windows 7 Installation Instruction 1. Go to http://www.trendnet.com/downloads/ to download the Windows 7 Utility. Save the file to your desktop. 2. Right click
Active Directory - User, group, and computer account management in active directory on a domain controller. - User and group access and permissions.
Vmware ESX 4/5/6 - Provision virtual machines through vsphere, assign available resources and install operating systems. - Configure the various built in alarms for monitoring, configure alarm thresholds
WEP WPA WPS :: INDEX : Introduction :
WEP WPA WPS With clients Without clients :: INDEX : Introduction > Overview > Terms & Definitions [ Step 1 ] : Configuring the network interface [ Step 2 ] : Collecting the network info [ Step 3 ] : Capturing
RMAR Technologies Pvt. Ltd.
Course Name : StartXHack V2.0 Ethical Hacking & Cyber Security Course Duration : 2 Days (8Hrs./day) Course Fee : INR 1000/participant Course Module : 1. Introduction to Ethical Hacking a. What is Ethical
How to configure your Thomson SpeedTouch 780WL for ADSL2+
How to configure your Thomson SpeedTouch 780WL for ADSL2+ Connecting up your router This guide assumes that you have successfully: unpacked your router connected it up to your phone socket using the DSL
Raspberry Pi Webserver
62 Int'l Conf. Embedded Systems and Applications ESA'15 Raspberry Pi Webserver Max Runia 1, Kanwalinderjit Gagneja 1 1 Department of Computer Science, Southern Oregon University, Ashland, OR, USA Abstract
Quick Installation Guide
V2.01 IP Wired / Wireless Camera Quick Installation Guide (For Windows OS) Model: FI8602/FI8602W ShenZhen Foscam Intelligent Technology Co., Ltd Packing List Quick Installation Guide 1) IP CAMERA X 1 2)
Adafruit's Raspberry Pi Lesson 3. Network Setup
Adafruit's Raspberry Pi Lesson 3. Network Setup Created by Simon Monk Last updated on 2016-01-04 12:07:57 PM EST Guide Contents Guide Contents Overview Using a Wired Network Buying a USB WiFi Adapter Setting
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
Installing a Symantec Backup Exec Agent on a SnapScale Cluster X2 Node or SnapServer DX1 or DX2. Summary
Technical Bulletin Application Note April 2013 Installing a Symantec Backup Exec Agent on a SnapScale Cluster X2 Node or SnapServer DX1 or DX2 Summary This application note describes how to install the
Pen Test Tips 2. Shell vs. Terminal
Pen Test Tips 2 Shell vs. Terminal Once you have successfully exploited a target machine you may be faced with a common dilemma that many penetration testers have, do I have shell access or terminal access?
PC-Duo Web Console Installation Guide
PC-Duo Web Console Installation Guide Release 12.1 August 2012 Vector Networks, Inc. 541 Tenth Street, Unit 123 Atlanta, GA 30318 (800) 330-5035 http://www.vector-networks.com Copyright 2012 Vector Networks
AdRadionet to IBM Bluemix Connectivity Quickstart User Guide
AdRadionet to IBM Bluemix Connectivity Quickstart User Guide Platform: EV-ADRN-WSN-1Z Evaluation Kit, AdRadionet-to-IBM-Bluemix-Connectivity January 20, 2015 Table of Contents Introduction... 3 Things
NetPoint Configuration Guide. for thin clients
NetPoint Configuration Guide for thin clients Contents Layout of this Manual... 2 1.1 Components... 2 You can find the following items in the color box of the device:... 2 1.2 Recommended Server Configuration...
Diamante WiFi Wireless Communication User Guide. CradlePoint CTR35
Diamante WiFi Wireless Communication User Guide CradlePoint CTR35 Release: July 2011; March 2011 Patent Pending. Copyright 2011, Stenograph, L.L.C. All Rights Reserved. Printed in U.S.A. Stenograph, L.L.C.
PFSENSE Load Balance with Fail Over From Version Beta3
PFSENSE Load Balance with Fail Over From Version Beta3 Following are the Installation instructions of PFSense beginning at first Login to setup Load Balance and Fail over procedures for outbound Internet
Installing the Operating System or Hypervisor
Installing the Operating System or Hypervisor If you purchased E-Series Server Option 1 (E-Series Server without preinstalled operating system or hypervisor), you must install an operating system or hypervisor.
Link Layer and Network Layer Security for Wireless Networks
Link Layer and Network Layer Security for Wireless Networks Interlink Networks, Inc. May 15, 2003 1 LINK LAYER AND NETWORK LAYER SECURITY FOR WIRELESS NETWORKS... 3 Abstract... 3 1. INTRODUCTION... 3 2.
Software Installation Guide
Software Installation Guide This manual explains how to install the software over a USB or network connection. Network connection is not available for models SP 200/200S/203S/203SF/204SF. To manually configure
WiFi Security Assessments
WiFi Security Assessments Robert Dooling Dooling Information Security Defenders (DISD) December, 2009 This work is licensed under a Creative Commons Attribution 3.0 Unported License. Table of Contents
What is Bitdefender BOX?
Quick Setup Guide What is Bitdefender BOX? Think about Bitdefender BOX like an antivirus for your network. It s a hardware device that sits next to your Wi-Fi router and protects all Internet connected
Uploading files to FTP server
V.150630 1. Overview Uploading files to FTP server The instructions in this article will explain how to upload the snapshots and videos from your camera to a FTP server. FTP is an Internet communications
The LimitlessLED Wifi Bridge 4.0 is compatible with RGBW(new), RGB(old), and Dual White(current) LimitlessLED lightbulbs.
www.limitlessled.com Wifi Bridge Receiver 4.0 User Guide The LimitlessLED Wifi Bridge 4.0 is compatible with RGBW(new), RGB(old), and Dual White(current) LimitlessLED lightbulbs. User Guide last updated
CT522-128 LANforge WiFIRE Chromebook 802.11a/b/g/n WiFi Traffic Generator with 128 Virtual STA Interfaces
1 of 8 Network Testing and Emulation Solutions http://www.candelatech.com [email protected] +1 360 380 1618 [PST, GMT -8] CT522-128 LANforge WiFIRE Chromebook 802.11a/b/g/n WiFi Traffic Generator with
Domain 5.0: Network Tools
ExamForce.com CompTIA Network+ N10-004 Study Guide 1 Domain 5.0: Network Tools Chapter 5 5.1 Given a scenario, select the appropriate command line interface tool and interpret the output to verify functionality
Networking. General networking. Networking overview. Common home network configurations. Wired network example. Wireless network examples
Networking General networking Networking overview A network is a collection of devices such as computers, printers, Ethernet hubs, wireless access points, and routers connected together for communication
How To Connect A Raspberry Pi To The Internet On A Microsoft Moonstone 2 (Microsoft) Microsoft Powerbook 2 (Powerbook 2) (Powerboard 2) And Powerbook 3 (Powerstation 2)
Adafruit's Raspberry Pi Lesson 3. Network Setup Created by Simon Monk Last updated on 2013-11-06 11:45:18 AM EST Guide Contents Guide Contents Overview Using a Wired Network Buying a USB WiFi Adapter Setting
Penetration Testing LAB Setup Guide
Penetration Testing LAB Setup Guide (Internal Attacker - Beginner version) By: magikh0e - [email protected] Last Edit: July 07 2012 This guide assumes a few things... 1. You have installed Backtrack before
Lab 8.3.1.2 Configure Basic AP Security through IOS CLI
Lab 8.3.1.2 Configure Basic AP Security through IOS CLI Estimated Time: 30 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, the student will learn the following
Microsoft Virtual Labs. Administering the IIS 7 File Transfer Protocol (FTP) Server
Microsoft Virtual Labs Administering the IIS 7 File Transfer Protocol (FTP) Server Table of Contents Exercise 1 Installing the Microsoft FTP Publishing Service for the IIS 7... 1 Exercise 2 Introducing
Ways to Use USB in Embedded Systems
Ways to Use USB in Embedded Systems by Yingbo Hu, R&D Embedded Engineer and Ralph Moore, President of Micro Digital Universal Serial Bus (USB) is a connectivity specification that provides ease of use,
The FlexiSchools Online Order Management (FOOM) Installation Guide
The FlexiSchools Online Order Management (FOOM) Installation Guide Installation Pack Welcome to the FlexiSchools system. You will have been sent an email and two packages delivered by courier, one with
Diamante WiFi Wireless Communication User Guide. Linksys E1200
Diamante WiFi Wireless Communication User Guide Linksys E1200 Release: February 2012; August 2011; February 2011 Patent Pending. Copyright 2012, Stenograph, L.L.C. All Rights Reserved. Printed in U.S.A.
Create bridges, add ports, show bridge and port statistics, status, as well as the OVS database
1 Introduction This document provides instructions on how to configure Pica8 s open switches to work in various application scenarios This document assumes the reader with minimal to no knowledge of the
Reference and Troubleshooting: FTP, IIS, and Firewall Information
APPENDIXC Reference and Troubleshooting: FTP, IIS, and Firewall Information Although Cisco VXC Manager automatically installs and configures everything you need for use with respect to FTP, IIS, and the
Wifi Web Server Module w TF Socket User s Guide
Wifi Web Server Module w TF Socket User s Guide 2004-2010 Sure Electronics Inc. MB-CM14117_Ver1.0 WIFI WEB SERVER MODULE W TF SOCKET USER S GUIDE Table of Contents Chapter 1. Overview...1 1.1 Overview...
WUA-1610, WUA-1610H. 300Mbps Wireless USB Adapter. User Manual V1.0
WUA-1610, WUA-1610H 300Mbps Wireless USB Adapter User Manual V1.0 Table of Contents Chapter 1 Introduction... 1 1.1 PACKAGE CONTENTS... 1 1.2 PRODUCT FEATURES... 1 1.3 LED INDICATOR DESCRIPTION... 2 1.4
Intel vpro. Technology-based PCs SETUP & CONFIGURATION GUIDE FOR
SETUP & CONFIGURATION GUIDE FOR Intel vpro Technology-based PCs This Setup Guide details what makes a true Intel vpro technology-based PC, and how to set up and configure Intel AMT (Active Management Technology)
Quick Start Guide. User Manual. 1 March 2012
Quick Start Guide User Manual 1 March 2012 This document outlines the steps to install SAMLite system into a single box of server and configure it to run for passive collection (domain login script). This
c. Securely insert the Ethernet cable from your cable or DSL modem into the Internet port (B) on the WGT634U. Broadband modem
Start Here Follow these instructions to set up your router. Verify That Basic Requirements Are Met Assure that the following requirements are met: You have your broadband Internet service settings handy.
DoorKing IM Server TM
Access Control Solutions DoorKing IM Server TM What exactly is the IM Server TM TM? Connection alternatives for programming your DoorKing Telephone Entry and Access Control systems DoorKing, Inc. [email protected]
vrealize Air Compliance OVA Installation and Deployment Guide
vrealize Air Compliance OVA Installation and Deployment Guide 14 July 2015 vrealize Air Compliance This document supports the version of each product listed and supports all subsequent versions until the
Step by step guide for connecting PC to wired LAN at dormitories of University of Pardubice
Step by step guide for connecting PC to wired LAN at dormitories of University of Pardubice English version Version 1.1 July 2008 Information Cente University of Pardubice Content A. Windows XP... 2 B.
How To Set Up Isu-Oit-Wpa On Windows 7 For Wireless Access (Isu- Oit- Wpa) On A Pc Or Mac Or Ipa (Windows 7) On An Ipa Or Ipac (Windows
Preface: The ISU-OIT-WPA implementation supports either WPA with TKIP or WPA2 with AES. Both support the enterprise DOT1X & CCKM Authentication Key Management features as well. This document is designed
SIP-DECT Knowledge Base SIP-DECT System Update
SIP-DECT Knowledge Base SIP-DECT System Update MAI 2015 DEPL-2046 VERSION 1.6 KNOWLEDGE BASE TABLE OF CONTENT 1) Introduction... 2 2) Update (New Service Pack in the same Release)... 3 2.1 OMM HOSTED ON
UBIQUITI BRIDGE CONFIGURATION PROCEDURE (PowerStation & NanoStation Units ONLY)
UBIQUITI BRIDGE CONFIGURATION PROCEDURE (PowerStation & NanoStation Units ONLY) Hardware Installation 1. Initial placement for programming and configuration purposes should be performed in an indoor environment.
Remote Unix Lab Environment (RULE)
Remote Unix Lab Environment (RULE) Kris Mitchell [email protected] Introducing RULE RULE provides an alternative way to teach Unix! Increase student exposure to Unix! Do it cost effectively http://caia.swin.edu.au
Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive
Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive This guide explains how to create and use a Rescue USB flash drive to reinstall and recover the ExtraHop system. When booting
Wireless Network Risks and Controls
Wireless Network Risks and Controls Offensive Security Tools, Techniques, and Defenses 22 January 2015 ISACA Phoenix Chapter Phoenix, AZ Presented by: Ruihai Fang Dan Petro Bishop Fox www.bishopfox.com
FinIntrusion Kit / Release Notes FINUSB SUITE SPECIFICATIONS. FINFISHER: FinIntrusion Kit 2.2 Release Notes
1 FINFISHER: FinIntrusion Kit 2.2 Release Notes 2 Copyright 2011 by Gamma Group International, UK Date 2011-09-23 Release information Version Date Author Remarks 1.0 2010-06-29 ht Initial version 2.0 2011-05-26
USB Functions for Windows 7
USB Functions for Windows 7 Getting Started Position the DSL-2750B in your desired location, and connect the power cable to the rear of the device. From the ADSL micro filter device that provides the separated
LOCKSS on LINUX. Installation Manual and the OpenBSD Transition 02/17/2011
LOCKSS on LINUX Installation Manual and the OpenBSD Transition 02/17/2011 1 Table of Contents Overview... 3 LOCKSS Hardware... 5 Installation Checklist... 7 BIOS Settings... 10 Installation... 11 Firewall
Network Server for Windows. Overview of the Sequencher Network Page 2. Installing Sequencher Server for the First Time Page 3
Network Server for Windows Installation Instructions Overview of the Sequencher Network Page 2 Installing Sequencher Server for the First Time Page 3 Adding Sequencher licenses to KeyServer Page 4 Updating
MN-700 Base Station Configuration Guide
MN-700 Base Station Configuration Guide Contents pen the Base Station Management Tool...3 Log ff the Base Station Management Tool...3 Navigate the Base Station Management Tool...4 Current Base Station
Author A.Kishore/Sachin http://appsdba.info. VNC Background
VNC Background VNC means Virtual Network Computing, is an open-source, crossplatform protocol for viewing GUI desktops on remote machines within a LAN or over a WAN/Internet connection. This document discusses
Transferring AIS to a different computer
Transferring AIS to a different computer AIS can easily be transferred from one computer to another. There are several different scenarios for transferring AIS to another computer. Since AIS is designed
Installing Windows 95 Drivers and Utilities for the Cisco Aironet 340/350 Series Client Adapters
Installing Windows 95 Drivers and Utilities for the Cisco Aironet 340/350 Series Client Adapters Document ID: 12134 You need a valid Cisco.com account in order to download Cisco Aironet drivers, firmware,
Guide for Updating Firmware and Troubleshooting Connection Issues
Guide for Updating Firmware and Troubleshooting Connection Issues This document provides detailed instructions for updating firmware and for troubleshooting for connection issues with Raspberry Pi board.
