34 entries in 0.654s
: i thought the point is to make a mikrotik
or huawei produce a broken key in its natural environment? to expand the db of factors?
: mats: not to mention, the orthogonal puzzler re mikrotik
: meanwhile, in archaeology, https://archive.is/DSMvg
>> 'running a couple Mikrotik
RB532 routerboards as broadband gateway routers under OpenWRT 10.03.1... ...looks like /dev/random provides no entopy'
routeros is thankfully not that bad
: picture, for instance, the poor mikrotik
boxes , for which no fewer than 3 remote-root orifices were published in recent yrs (~on top~ of their phuctoring)
: ( the correct place to do it ~from~, might even be the -- repurposed -- usg botnets, e.g. mikrotik
: ssl crapola scan is useful also to distinguish the brokenssh boxes from one another ( as i did since the orig scan, e.g. mikrotik
: at some point in near future i'ma add annotations per factor (e.g. 'debian', 'mikrotik
', etc )
still quite frustrated that he has not yet solved the various 'icebergs' whose 'birthday theorem' tip we are seeing -- e.g. mikrotik
: and also hilarious 'HIVE is a multi-platform CIA malware suite and its associated control software. The project provides customizable implants for Windows, Solaris, MikroTik
(used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants.'
: 15`645 2.3.0_Mikrotik_v2.9 << from mircea_popescu's mega-tally
: the thing to observe here is that, e.g., mikrotik
, should be susceptible to the debian treatment (enumerate the possible factors, then shoot)
: if you had sane router like dd-wrt or mikrotik