An Introduction to SwiftNET - An overview you always wanted

An Introduction to SwiftNET - An overview you always wanted
Due to recent onslaught of attacks on SWIFT network, I thought why not to release a small introduction on the same. Here it is then gentlemen -An Introduction to SwiftNET you always wanted. I have tried to keep it as simple as possible whilst ensuring the information is complete and relevant. Hope you will find it userful.

As usual, comments, questions and critique are welcome.

Fortigate SSH Backdoor Password Calculator

Recently Fortinet confirmed there was a backdoor in their firewalls which impacted FortiGate OS Version 4.x -  5.0.7. An exploit was released in the wild but it took some efforts to work with (I am looking at you : paramiko/termios/msvcrt). So I ported the code to create a quick and dirty password calculator that will help in pwning Fortinet firewalls with vulnerable versions.

Tested it on test firewalls and it works like a charm : )

My time with Cisco EX90

My time with Cisco EX90
Got my hands on Cisco EX90 (that was malfunctioning) & here is my impression of it - sucks balls.

The box has poor support for rs232 , has a special cable provided separately (USB to serial) without which it won't jack up on console at all. Yes I tried everything & the damn thing needs a specific ft232r driver to make it work. Speed settings are 38400 with no flow control & parity, post which the sucker boots up in admin mode with xConfig disabled. Now vendor nowadays have a very pragmatic approach to make CLI as difficult for the folks they intended to create. They tackle this problem by creating pseudo-shells (with limited capabilities,generally have limited to no debug facility, sometimes you really feel lucky if you are able to read proper logs ) which miserably fail to provide full view of what the heck is wrong with the device/service. The Result? After pulling hairs and cursing the box, you eventually dial 1-800-100-1364 to share your plight, resulting in more revenue for Cisco & you end up drinking more beer than you usually do in a bad manner. After all, a frustrated tinkerer is a good customer.

Coming to the point, Cisco has xConfig running over standard bash, which is more or less a limited configuration mode so that you can recover the device. But heck, since it was booting without it, I configured "rootsettings on Cisc0" , logged out and logged in as root with Cisc0 as password & jumped into a bash shell over Linux 3.4. Some more exploring and found  the environment was pretty loaded on factory defaults ; (as compared to trimmed, hardened network devices I have seen), heck, its having Python 2.6 :)

Not wasting anytime I configured the box with a static IP & tried upgrading it with 7.x code, which as expected failed. Upgrade gave unable to create squashfs on dmesg, at that moment I pretty much sighed & handed over things to Cisco Collab guy. I was already unimpressed with its poor recovery capabilities & time would not permit any more r&d on a production device.

Note to self: need to get my hands dirty once its dismounted.

Wardriving at Delhi Updated –The OPEN, WEP & WPA faces of Delhi

I got an overwhelming response to my Wardriving at Delhi project and have got a lot of emails regarding the same. I am so thrilled that so many people want to contribute to the project. Inspired by your feedback, I am here by producing here an update to my mapping project. This time I went Via Saket to Gurgaon and as usual I got a lot of access points which were OPEN with no security, WEP secured vulnerable access points & WPA/WPA PSK2 secured points.
 Wardriving at Delhi Updated - The OPEN,WEP and WPA
As usual, I used -
The target is to make a map of Delhi with all the access points  to analyse in layman terms -
  1. The security awareness of people and organizations
  2. The devices they are using
  3. The security mechanisms they are using.
  4. Wifi range analysis of individual device.
Well, in all you can find the data from below links -
If you are interested in contributing to the data, please contact me at admin<at> . You can also read how to Hack Wifi using Backtrack , How to detect if someone is using your WiFi  or how to detect WiFi hotspots . If you are having an Android, you can also read about how to use your Android for Wardriving.

Happy Wardriving.