Feburary 23 - 28th 2013 - vmware partner exchange 2013 (Las Vegas) February 25 - March 1- RSA Security USA 2013 San Francisco March 5 to 9 - CeBIT 2013, (Hannover - Germany) March 12-15, 2013 - Blackhat Amsterdam, Netherlands March 18th 2013 - RSA Summit Qatar April 15-18 2013 - Symantec Vision 2013 Las Vegas, NV April 22nd 2013 - RSA Security Summit Barbican, London May 5 – 8, 2013 - HP TECHCON (Anaheim in Southern California) MAY 6-10 2013 - INTEROP Las Vegas May 14 - 16 2013 - BITS - A CeBIT event Porto Alegre, Brazil May 28 - 30 2013 - CeBIT Sydney, Australia May 29-31, 2013 - Linuxconf Tokyo, Japan (Chinzan-so Conference Center) June 3-6 2013 - Microsoft TechED New Orleans, LA June 5 – 6 2013 - RSA Conference Asiapacific Marina Bay Sands, Singapore June 11-14, 2013 - redhat summit 2013 - Boston June 12-15, 2013 - INTEROP Tokyo June 11-13 2013 - HP Discover 2013 Las Vegas, Nevada June 12-14 2013 - RSA Archer GRC Summit Washington DC June 25-28 2013 - Microsoft TechED Madrid, Spain July 22-25 2013 - Oracle World Shanghai July 27 - August 1 2013 - Blackhat Las Vegas USA August 25-29 2013 - vmworld 2013 San Francisco September 3-4 2013 - Symantec Vision 2013 Sao Paulo, Brazil September 3-6 2013 - Microsoft TechED Goldcoast, Australia September 10-12, 2013 - Blackhat Summit Istanbul, Turkey September 18-20, 2013 - Linuxconf (Hyatt Regency New Orleans) September 21–26, 2013 - Oracle World San Francisco September 30 - October 4, 2013 - Interop New York October 1 - 3 2013 - MCAFFFE FOCUS LAS VEGAS October 8-10 2013 - Symantec Vision 2013 Nice, France October 15-17, 2013 - vmworld 2013 Barcelona October 21-22 2013 - Symantec Vision 2013 Mexico City, Mexico October 21-23, 2013 - Linuxconf Edinburgh, UK (Edinburgh International Conference Centre) October 23 2013 - CSA CEE Summit 2013 Ljubljana, Slovenia October 29 – 31 2013 - RSA Conference Europe The Netherlands November 20-22, 2013 - Interop Mumbai October 24 to 27 2013 - CeBIT Bilisim Eurasia Istanbul Turkey November 26-27, 2013 - Blackhat Summit Sao Paulo, Brazil NOV 29 - 2 DEC 2013 - CeBIT Bilisim Eurasia December 10-12 2013 - Oracle World, Sao Paulo Brazil December 10-12 2013 - HP Discover 2013 Barcelona, Spain
Search This Blog
Showing posts with label nerd. Show all posts
Showing posts with label nerd. Show all posts
Monday, 18 November 2013
Information Technology conferences 2013
I’ve created the below list of IT conferences around the world for
2013. Maybe one day ill get to do a junket world tour or the list might
help you for tax related holidays :)
Wednesday, 20 February 2013
Fixing Merlin 430R garage roller door wireless remote
I found my Merlin 430R roller door wireless remote playing up after a couple of years. It intermittently would not receive the wireless signal (even when standing right under the unit!) but everything else was working fine. So first step of troubleshooting… Go buy a new remote!
After buying the new remote I had limited success so I figured the logic board wireless must be broken. I found a new one on ebay (see below) and it seemed pretty simple to install but it seemed a little pricey at $175 (I can buy a brand new one for $315!!)
After looking around with out much luck for a second hand unit I came across this little gem. Its a 12v wireless RF relay remote control which works in the 315Mhz range and is able to remotely (apparently 50 – 100m – tested 20m) switch 2 relays. In laymans terms a replacement wireless remote for under $10
I was able to wire in the wireless remote into the accessory terminal strip using the following wiring diagram:
The unit fits nicely in the light housing or can be fitted in a box if required and has been working perfectly for the last couple of months. The remotes are hard coded to a 315Mhz frequency depending on the chip-set. If you want 2 remotes make sure they are the same chip-set so they work on the same frequency however getting a replacement remote is quite easy since you can get self programming remotes like this one . Happy days!
Thursday, 14 July 2011
openvas 4 how to setup guide
Yet another how to guide to hopefully save people some time when setting up openvas4
For this guide i have installed and configured openvas4 running on centos 5.2
Installation
download and install centos which can be found here(i used centos 5.2) once installed setup your yum repositories for openvas4
[root@localhost ~]#wget -q -O - http://www.atomicorp.com/installers/atomic | sh
[root@localhost ~]#yum update
[root@localhost ~]#yum upgrade [root@localhost ~]# yum search openvas Loaded plugins: fastestmirror Loading mirror speeds from cached hostfile * atomic: www6.atomicorp.com * base: mirror.optus.net * extras: mirror.optus.net * updates: mirror.optus.net =============================== Matched: openvas =============================== greenbone-security-assistant.i386 : GSA openvas.noarch : The Open Vulnerability Assessment (OpenVAS) suite openvas-administrator.i386 : The Open Vulnerability Assessment (OpenVAS) : Administrator openvas-cli.i386 : The Open Vulnerability Assessment (OpenVAS) CLI openvas-glib2.i386 : A library of handy utility functions openvas-glib2-devel.i386 : The GIMP ToolKit (GTK+) and GIMP Drawing Kit (GDK) : support library openvas-libraries.i386 : Support libraries for Open Vulnerability Assessment : (OpenVAS) Server openvas-libraries-devel.i386 : Development files for openvas-libraries openvas-manager.i386 : The Open Vulnerability Assessment (OpenVAS) Manager openvas-scanner.i386 : The Open Vulnerability Assessment (OpenVAS) Server [root@localhost ~]#
install openvas4
[root@localhost ~]# yum install openvas [root@localhost ~]# yum install openvas-administrator
[root@localhost ~]# /etc/init.d/openvas-scanner status openvassd (pid 5796) is running... [root@localhost ~]# /etc/init.d/openvas-manager status -l (pid 4550) is running... [root@localhost ~]# /etc/init.d/openvas-administrator status -l (pid 4931) is running... [root@localhost ~]# /etc/init.d/gsad status gsad (pid 4587) is running... [root@localhost ~]#
Configure Openvas4
Once you have openvas4 installed and running its time to configure. Start off by creating an user which is used to access the web interface
[root@localhost ~]# openvas-adduser Using /var/tmp as a temporary file holder.
Add a new openvassd user --------------------------------- Login : openvas Authentication (pass/cert) [pass] : Login password : Login password (again) : User rules --------------- openvassd has a rules system which allows you to restrict the hosts that openva has the right to test. For instance, you may want him to be able to scan his own host only. Please see the openvas-adduser(8) man page for the rules syntax. Enter the rules for this user, and hit ctrl-D once you are done: (the user can have an empty rules set) Login : openvas Password : *********** Rules : Is that ok? (y/n) [y] y user added. [root@localhost ~]#
I had to elevate the users privileges to be able to login and use the web interface (Greenbone security assistant)
[root@localhost ~]# openvasad --enable-modify-settings -c set_role -u openvas -r Admin ad main:MESSAGE:2684:2011-06-30 10h28.20 EST: The role of user openvas has been successfully changed. [root@localhost ~]#
Update your signatures to ensure you have all the latest vulnerability tests
[root@localhost auth]# openvas-nvt-sync [i] This script synchronizes an NVT collection with the 'OpenVAS NVT Feed'. [i] The 'OpenVAS NVT Feed' is provided by 'The OpenVAS Project'. [i] Online information about this feed: 'http://www.openvas.org/openvas-nvt-feed.html'. [i] NVT dir: /var/lib/openvas/plugins [i] Will use rsync [i] Using rsync: /usr/bin/rsync [i] Configured NVT rsync feed: rsync://feed.openvas.org:/nvt-feed OpenVAS feed server - http://openvas.org/ This service is hosted by Intevation GmbH - http://intevation.de/ All transactions are logged. Please report problems to admin@intevation.de receiving file list ... 43805 files to consider ./ sent 43 bytes received 742045 bytes 87304.47 bytes/sec total size is 96498257 speedup is 130.04 [i] Checking dir: ok [i] Checking MD5 checksum: ok [root@localhost ~]# /etc/init.d/openvas-scanner restart
Add the following to cron if you would like your signatures automatically updated
#update signatures on the 27th of each month at 1am #crontab -e 0 1 27 * * /usr/sbin/openvas-nvt-sync-cron
Using Openvas4
Once all the above is done you can setup a scan by doing the following:
browse to the openvas4 web interface on: https://localhost:9392 and log in with your credentials you created above.
Once logged in create a new target by selecting targets from the left hand menu. Fill in appropriate details (you can also use /subnet masks on the end of the network) and create target
Next create a task by selecting New Task from the left hand menu. Fill in the appropriate fields and select your newly created target. Click on create task
Once you have created your new task you can launch the scan manually by clicking on the little play icon. This will launch the scan of the target machine. You can also see the progress of this scan with the progress bar
You can also create a scan schedule which will automatically kick off your scan at the specific time / interval. To setup a schedule select schedules from the left hand menu, fill in the appropriate details and frequency then select create schedule.
To add your schedule to a task, select Tasks from the left hand menu then click on the little spanner icon to edit your task.
Change the schedule drop down to your newly created scheduled time / frequency and save task.
You can now see you cannot manually run your task, a clock icon has replaced the play button which will start your task at the specified time.
Troubleshooting
NIKTO
I had issues with nikto when scanning saying: “Could not find a valid nikto config file” so i had to create the following configuration
/etc/nikto.conf ######################################################################################################### # CONFIG STUFF # $Id: config.txt 94 2009-01-21 22:47:25Z deity $ ######################################################################################################### # default command line options, can't be an option that requires a value. used for ALL runs. # CLIOPTS=-g -a # ports never to scan SKIPPORTS=21 111 # User-Agent variables: # @VERSION - Nikto version # @TESTID - Test identifier # @EVASIONS - List of active evasions USERAGENT=Mozilla/5.00 (Nikto/@VERSION) (Evasions:@EVASIONS) (Test:@TESTID) # RFI URL. This remote file should return a phpinfo call, for example: # You may use the one below, if you like. RFIURL=http://cirt.net/rfiinc.txt? # IDs never to alert on (Note: this only works for IDs loaded from db_tests) #SKIPIDS= # if Nikto is having difficulty finding the 'plugins', set the full install path here EXECDIR=/usr/share/nikto # The DTD NIKTODTD=docs/nikto.dtd # the default HTTP version to try... can/will be changed as necessary DEFAULTHTTPVER=1.0 # Nikto can submit updated version strings to CIRT.net. It won't do this w/o permission. You should # send updates because it makes the data better for everyone *NO* server specific information # such as IP or name is sent, just the relevant version information. # UPDATES=yes - ask before each submission if it should send # UPDATES=no - don't ask, don't send # UPDATES=auto - automatically attempt submission *without prompting* UPDATES=yes # Warning if MAX_WARN OK or MOVED responses are retrieved MAX_WARN=20 # Prompt... if set to 'no' you'll never be asked for anything. Good for automation. #PROMPTS=no # cirt.net : set the IP so that updates can work without name resolution -- just in case CIRT=174.142.17.165 # Proxy settings -- still must be enabled by -useproxy #PROXYHOST=127.0.0.1 #PROXYPORT=8080 #PROXYUSER=proxyuserid #PROXYPASS=proxypassword # Cookies: send cookies with all requests # Multiple can be set by separating with a semi-colon, e.g.: # "cookie1"="cookie value";"cookie2"="cookie val" #STATIC-COOKIE= # The below allows you to vary which HTTP methods are used to check whether an HTTP(s) server # is running. Some web servers, such as the autopsy web server do not implement the HEAD method CHECKMETHODS=HEAD GET # If you want to specify the location of any of the files, specify them here # EXECDIR=/opt/nikto # PLUGINDIR=/opt/nikto/plugins # TEMPLATEDIR=/opt/nikto/templates # DOCDIR=/opt/nikto/docs # Default plugin macros @@MUTATE=dictionary;subdomain @@DEFAULT=@@ALL;-@@MUTATE;tests(report:500) #Choose SSL libs # Options: # SSLeay - use Net::SSLeay # SSL - use Net::SSL # auto - automatically choose whats available # (SSLeay wins if both are available) LW_SSL_ENGINE=auto
The following was needed to update nikto
[root@localhost nikto]# mkdir docs
[root@localhost nikto]# touch docs/CHANGES.txt [root@localhost nikto]# nikto.pl -update
Wednesday, 13 July 2011
UNIX sudo guide for setting up restricted access for user accounts
another thing i was looking to setup quickly but couldn’t find anyone else with examples on the web was restricted sudo access. The below links are good examples of sudo however don’t seem to think about the implications of allowing users to have access to the passwd command. If your wondering what sudo is click here!
Most people who know sudo know the usual ALL=(ALL) ALL in the sudoers file. Its actually possible to give restricted sudo access to commands based on user / group / server information. I have implemented it specifically for a technical ops kind of role which enables them to do basic tasks but does not give them full system access. The below implementation was done using ixSudo (A.16.00-1.7.4p6.001) on HPUXv3 however this should work on most sudo implementations. If anyone knows what versions it does / doesn’t work on feel free to contact me on your experiences!
Step 1. Install Sudo
To install sudo on HPUX:
- download the sudo package from http://software.hp.com
- swinstall -s /pathtodepot/sudodepot.depot
To install sudo on Linux or other UNIX:
- apt-get install sudo or yum install sudo depending on your flavor (linux)
- rpm -ivh /pathtorpm/sudopackage.pm (linux)
- pkgadd -d sudo (solaris)
- untar source, ./configure, make, make install
Step 2. Configure Sudo
On this version of sudo the sudoers file is located at: /opt/iexpress/sudo/etc/sudoers
Most sudoers file location is either: /etc/sudoers or /usr/local/etc/sudoers
You need to edit / vi the configuration and add the following config. Just a brief overview what is configured:
- user accounts (in the /etc/passwd file) are user1, user2, user3, user4 and leea
- a few command alias groups are configured which enables you to give users access to groups of commands (say you wanted to give uses access to printing functions, account management, etc)
- the NOPASSWD: line allows those commands to be executed without users having to supply their password
- the !/command denies the user the ability to run as root. for example you may want a user to be able to reset accounts but not change the root password. this is important since if not setup correctly you essentially are giving them root access!!!!
User_Alias TECHOP = user1, user2, user3, user4, leea Cmnd_Alias PRINTING = /usr/bin/cancel, /usr/bin/enable, /usr/bin/disable,\ /usr/sbin/lpmove, /usr/sbin/accept, /usr/sbin/lpsched, /usr/sbin/lpshut
Cmnd_Alias USERS = /usr/lbin/modprpw -k *, /usr/bin/passwd [A-z]*, !/usr/bin/passwd root Cmnd_Alias TECHOP_CMD = /usr/bin/passwd [A-z]*, !/usr/bin/passwd root,\ /usr/bin/crontab -l *, /usr/lbin/modprpw -x *,\ /usr/sbin/fuser, !/usr/sbin/fuser -k *,\ /usr/bin/find, !/usr/bin/find * -ok *, !/usr/bin/find * -exec *,\ !/usr/bin/find * -cpio *, !/usr/bin/find * -ncpio *,\ /usr/bin/file, /usr/bin/ls, /usr/bin/du -ks *, /opt/OV/bin/OpC/opcagt root ALL=(ALL) ALL TECHOP ALL=(root) NOPASSWD: /usr/bin/sudo -l TECHOP ALL = (root) TECHOP_CMD,PRINTING, USERS
Step 3.Test Sudo
use #sudo -l to show what sudo commands are available to run under your account
hpuxserver:/home/leea# sudo -l User leea may run the following commands on this host: (root) NOPASSWD: /usr/bin/sudo -l (root) /usr/bin/passwd [A-z]*, !/usr/bin/passwd root, /usr/bin/crontab -l *, /usr/lbin/modprpw -x *, /usr/sbin/fuser, !/usr/sbin/fuser -k *, /usr/bin/find, !/usr/bin/find * -ok *, !/usr/bin/find * -exec *, !/usr/bin/find * -cpio *, !/usr/bin/find * -ncpio *, /usr/bin/file, /usr/bin/ls, /usr/bin/du -ks *, /opt/OV/bin/OpC/opcagt, (root) /usr/bin/cancel, /usr/bin/enable, /usr/bin/disable, /usr/sbin/lpmove, /usr/sbin/accept, /usr/sbin/lpsched, /usr/sbin/lpshut, (root) /usr/lbin/modprpw -k *, /usr/bin/passwd [A-z]*, !/usr/bin/passwd root
below is an example of not using / using sudo (notice the permission issues when not using sudo)
hpuxserver:/home/leea# find /opt/ -mtime -1 /opt/hpsmh/data/htdocs/navfile.htm find: cannot open /opt/hpsmh/tomcat/conf20 find: cannot open /opt/hpsmh/tomcat/conf22 find: cannot open /opt/hpsmh/tomcat/work /opt/hpsmh/conf22/php.ini /opt/hpsmh/conf22/mod_proxy.conf /opt/hpsmh/conf22/smhpd.conf /opt/hpsmh/conf22/hmmolist.map find: cannot open /opt/sfm/bin /opt/hpws22/apache/logs find: cannot open /opt/hpws22/webmin/conf find: cannot open /opt/hpws22/webmin/logs find: cannot open /opt/hpws22/webmin/newconfig/opt /opt/fcms/debug find: cannot search /opt/ssh/src find: cannot open /opt/uxprov/bin find: cannot open /opt/swa/mx find: cannot open /opt/swa/mxhelp find: cannot open /opt/hpwebadmin /opt/hpservices/cfg /opt/hpservices/cfg/cfg2html.sh.out /opt/hpservices/cfg/hpuxserver.html /opt/iexpress/sudo/etc/sudoers hpuxserver:/home/leea# hpuxserver:/home/leea# sudo find /opt/ -mtime -1 sudo: /var/adm owned by uid 4, should be uid 0 We trust you have received the usual lecture from the local System Administrator. It usually boils down to these three things: #1) Respect the privacy of others. #2) Think before you type. #3) With great power comes great responsibility. Password: Last successful login: Tue Jul 12 15:52:30 EST 2011 Last authentication failure: Mon Jul 11 11:40:48 EST 2011 10.10.10.10 /opt/hpsmh/data/htdocs/navfile.htm /opt/hpsmh/conf22/php.ini /opt/hpsmh/conf22/mod_proxy.conf /opt/hpsmh/conf22/smhpd.conf /opt/hpsmh/conf22/hmmolist.map /opt/hpws22/apache/logs /opt/fcms/debug /opt/hpservices/cfg /opt/hpservices/cfg/cfg2html.sh.out /opt/hpservices/cfg/hpuxserver.html /opt/iexpress/sudo/etc/sudoers hpuxserver:/home/leea#
Tuesday, 3 August 2010
how to configure Microsoft Network Policy Server with Cisco router using RADIUS
I couldn’t find anyone who has done this previously on the internet so i decided to write my own guide to hopefully save someone else some time and effort. I did however find a few pages which helped in the process of setting this up which are listed below.
Before you begin.
OK so assuming you already have Microsoft Network Policy Server installed on a Win2k8 server and your Cisco device up and running and ready to be configured for AAA (RADIUS authentication) the following steps will guide you though setting up both devices to talk to each other.
I have modified some of public IP addresses in this guide for security reasons
Configuring Cisco Router.
The below is the required configuration on your Cisco device to enable RADIUS authentication. 172.27.109.245 is the IP address of the Network Policy Server. You can set your radius-server key using #radius-server key 0
#aaa authentication login userauthen group radius local
#radius-server host 172.27.109.245 auth-port 1645 acct-port 1646
#radius-server key 7
#aaa authentication login userauthen group radius localradius-server host 172.27.109.245 auth-port 1645 acct-port 1646radius-server key 7
Configuring NPS.
To configure Microsoft Network Policy Server open up NPS (Administrative Tools –> NPS)Right Click RADIUS Clients and Select “New”
Enter your Cisco router details. Address is the IP address of your Cisco Router. Shared Secret is the same key used in #radius-server key 0
Keep all the defaults on the Advanced tab.
Create a new Connection Request Policy (Right click New)
Configure you Policy name and set the type of network access server to “Unspecified”
Set your conditions to be NAS IPv4 Address where the address is the IP of your Cisco Router (this means NPS will only allow connection requests from the values in the conditions)
Keep all settings as default
Create a Network Policy which will permit users in a specific windows group to be allowed to authenticate via RADIUS
Set the Type of network access server to be “Unspecified”
Set your conditions to be a Windows Group where the Windows group is the group of users you wish to permit authentication against RADIUS
Set the Constraints to use only the less secure method of “Unencrypted authentication (PAP,SPAP)”
This authenticated method is definitely less secure than what else is available. You should only allow this kind of authentication to traverse a private network segment. I know some people maybe thinking “I want my authentication requests sent across the wire in a more secure fashion? ~ this was the only way i could get NPS to authenticate RADIUS requests. If this method does not meet your security requirements you may need to look at an alternate method)
Keep all settings to be the defaults
Thats pretty much it! I have also included a grab of a user in Active Directory which has their account setup correctly.
A couple of things to note is on the “Dial-in” tab make sure that the radio button is on “Control access through NPS Network Policy” and you have registered your NPS in active directory (from NPS right click NPS (LOCAL) –> Register server in Active Directory)
Troubleshooting.
Cisco Router
Enable Debugging on your Cisco router and turn logging onto your terminal
#debug aaa authentication
#debug radius
#term mon (#no term mon ~ to turn off)
The below is an output of a successful authentication request to Microsoft NPS
002958: Jul 28 15:48:11.440 AEST: AAA/AUTHEN/LOGIN (00000058): Pick method list 'userauthen'
002959: Jul 28 15:48:11.440 AEST: RADIUS/ENCODE(00000058):Orig. component type = VPN_IPSEC
002960: Jul 28 15:48:11.440 AEST: RADIUS: AAA Unsupported Attr: interface [158] 13
002961: Jul 28 15:48:11.440 AEST: RADIUS: 31 36 35 2E 32 32 38 2E 32 30 2E [165.228.20.]
002962: Jul 28 15:48:11.444 AEST: RADIUS/ENCODE(00000058): dropping service type, "radius-server attribute 6 on-for-login-auth" is off
002963: Jul 28 15:48:11.444 AEST: RADIUS(00000058): Config NAS IP: 0.0.0.0
002964: Jul 28 15:48:11.444 AEST: RADIUS/ENCODE(00000058): acct_session_id: 84
002965: Jul 28 15:48:11.444 AEST: RADIUS(00000058): sending
002966: Jul 28 15:48:11.444 AEST: RADIUS/ENCODE: Best Local IP-Address 172.27.109.253 for Radius-Server 172.27.109.245
002967: Jul 28 15:48:11.444 AEST: RADIUS(00000058): Send Access-Request to 172.27.109.245:1645 id 1645/63, len 99
002968: Jul 28 15:48:11.444 AEST: RADIUS: authenticator 70 A4 A4 25 56 F0 3A 08 - E8 29 C9 07 9F 4A ED F6
002969: Jul 28 15:48:11.444 AEST: RADIUS: User-Name [1] 12 "admin"
002970: Jul 28 15:48:11.444 AEST: RADIUS: User-Password [2] 18 *
002971: Jul 28 15:48:11.444 AEST: RADIUS: Calling-Station-Id [31] 16 "CISCO VPN CLIENT PUBLIC IP ADDRESS"
002972: Jul 28 15:48:11.444 AEST: RADIUS: NAS-Port-Type [61] 6 Virtual [5]
002973: Jul 28 15:48:11.444 AEST: RADIUS: NAS-Port [5] 6 0
002974: Jul 28 15:48:11.444 AEST: RADIUS: NAS-Port-Id [87] 15 "PUBLIC IP ADDRESS OF CISCO ROUTER"
002975: Jul 28 15:48:11.444 AEST: RADIUS: NAS-IP-Address [4] 6 172.27.109.253
002976: Jul 28 15:48:11.452 AEST: RADIUS: Received from id 1645/63 172.27.109.245:1645, Access-Accept, len 102
002977: Jul 28 15:48:11.452 AEST: RADIUS: authenticator 6B F9 1F 36 C1 C8 8A B8 - EA 53 75 3B 40 C9 6F B2
002978: Jul 28 15:48:11.452 AEST: RADIUS: Framed-Protocol [7] 6 PPP [1]
002979: Jul 28 15:48:11.452 AEST: RADIUS: Service-Type [6] 6 Framed [2]
002980: Jul 28 15:48:11.452 AEST: RADIUS: Class [25] 46
002981: Jul 28 15:48:11.452 AEST: RADIUS: D5 70 0A C8 00 00 01 37 00 01 02 00 AC 1B 6D F5 [?p?????7??????m?]
002982: Jul 28 15:48:11.452 AEST: RADIUS: 00 00 00 00 C8 EE 6F C3 4D B6 14 82 01 CB 2E 14 [??????o?M?????.?]
002983: Jul 28 15:48:11.452 AEST: RADIUS: A5 E3 53 E2 00 00 00 00 00 00 00 17 [??S?????????]
002984: Jul 28 15:48:11.452 AEST: RADIUS: Vendor, Microsoft [26] 12
002985: Jul 28 15:48:11.452 AEST: RADIUS: MS-Link-Util-Thresh[14] 6
002986: Jul 28 15:48:11.452 AEST: RADIUS: 00 00 00 32 [???2]
002987: Jul 28 15:48:11.452 AEST: RADIUS: Vendor, Microsoft [26] 12
002988: Jul 28 15:48:11.452 AEST: RADIUS: MS-Link-Drop-Time-L[15] 6
002989: Jul 28 15:48:11.452 AEST: RADIUS: 00 00 00 78 [???x]
002990: Jul 28 15:48:11.456 AEST: RADIUS(00000058): Received from id 1645/63
002991: Jul 28 15:48:11.456 AEST: RADIUS: Constructed " ppp negotiate"
Microsoft NPS
I had issues reading the original IAS formatted logs as per the below
C:\Windows\System32\LogFiles\iaslog.log (not sure if this is the original path to the log) 172.27.109.253,admin,07/28/2010,15:53:03,IAS,BADC02,31,1.1.1.1,61,5,5,0,87,1.1.1.2,4,172.27.109.253,4108,172.27.109.253,4116,0,4128,Cisco Router,4154,NAS IP,4155,1,4129,BA\admin,4127,1,4149,default,25,311 1 172.27.109.245 07/28/2010 05:20:52 24,8136,1,8153,0,8111,0,4130,ba/Users/admin,4136,1,4142,0 172.27.109.253,admin,07/28/2010,15:53:03,IAS,BADC02,25,311 1 172.27.109.245 07/28/2010 05:20:52 24,8153,0,8111,0,4130,ba/Users/admin,4294967209,120,4294967210,50,4108,172.27.109.253,4116,0,4128,Cisco Router,4154,NAS IP,4155,1,4129,BA\admin,4127,1,4149,default,8136,1,7,1,6,2,4136,2,4142,0
So i installed the below tool which made it easier to read! IAS LOG VIEWER v2.67 by Deepsoftware (http://www.deepsoftware.ru/iasviewer/)
Monday, 17 May 2010
Nintendo Wii – Complete Softmod guide – Play USB games on your Wii.
OK so i decided to write my own Softmod guide since i could not find one that explained everything to get it all working from loading the twilight princess hack to loading up your games and playing them on the Wii.
I have used some information from existing (incomplete) guides since i am a huge fan of not re-inventing the wheel. Though I am more than happy to give credit where credit is due, so see the bottom of the page for the original guides!
**NOTE** This guide below is pretty much how i did my Wii, i recommend you read some other guides and look up some details from other people (maybe for some reason your Wii cant be soft mod’d) before doing your own since you could turn it into a large paperweight (apparently – mine works (“,) )
Stuff you need before you begin.
- Nintendo Wii (of course)
- Nintendo Wii with Wii controller and Nunchuck
- Portable USB disk / key to store your Wii iso’s on (4GB or bigger, the bigger it is the more games you can store)
- SD Memory Card and Card Reader ( 32Mb to 2GB will work except the newer HC SD Cards)
- Original copy of ‘The Legend of Zelda Twilight Princess’
- Internet connection using a Wi-Fi Router, don’t even try this unless you have it configured and working correctly as some files need to be downloaded during the install process!
- Windows PC to load your games (with the SD reader)
- Winrar for your PC (most games / files are packaged in rar format)
- The following software:
REQUIRED: Twlight Princess save game hack, Homebrew channel, WBFS Manager, NeoGamma, Configurable USB loader, cIOSX installer or get the all-in-one from here (maybe out of date)
OPTIONAL: WiiMC (Wii Media Center)
Checking your firmware revision and Twilight Princess game version
To check the firmware loaded on your Wii, go into Wii Options and clicking on the Wii Settings. The firmware version is shown at the top of the screen. You will need to know this to determine which version of the Twilight Princess hack is needed for your Wii. Pick the Twilight Princess hack version that corresponds to your firmware version.
Check the version of your Twilight Princess game by checking the code on the disc as per the below picture.
Preparing SD card
Use a card reader to format the SD card to FAT 16/32. Load on the twilight princess archive with the home brew channel in the root of the SD card (the all in one zip should show you the tree structure - apps go in the apps directory)
Loading Home-brew Channel
You will need to load the correct game save for your version of the game this can be determined by checking the text string which is on the inner circle of the data surface with the ones below. Write down this information and the related ‘TwilightHack’ you need to use.
- RVL-RZDE-0A-0 USA >> TwilightHack0
- RVL-RZDE-0A-2 USA >> TwilightHack2
- RVL-RZDP-0A-0 JPN >> TwilightHack
- RVL-RZDJ-0A-0 JPN >> TwilightHack
- RVL-RZDE-0A-0 JPN >> TwilightHack0
Don’t worry if you load a saved game and it doesn’t work you’re probably loading the wrong one (i did the first time)
I assume you have played the game ‘The Legend of Zelda Twilight Princess’ at least once correct? You need to play at least once to create a save or you can’t copy the save from the SD card, also note while creating your first save you’ll need to NOT change the default character names or the save may not work.
- Put your SD card in your Wii and turn it on.
- Go into Wii Options –> Data Management –> Save Data –> Wii.
- Find your Zelda save, click on it, click “Erase”, and click Yes.
- Open the SD card and select the “Twilight Hack” save that corresponds to your game region. Note: Some people are having problems with the Wii not “seeing” the save file on the SD card. If you are experiencing this, try setting the archive bit for the ‘data.bin’ file – in Windows this can be be done from the file’s properties dialog (right click on it in Windows Explorer and check the box).
- Click copy and then yes. Now exit out of the menu.
- If you are using Firmware 3.4, you must immediately put the Twilight Hack to use. Turning off or running some other channel or game will have the System Menu delete the savegame again, and you’ll have to start over.
- Insert The Legend of Zelda: Twilight Princess game disc and run the game.
If you have the USA version of the game, load the “TwilightHack0″ or “TwilightHack2″ version of the game as appropriate (remember you wrote it down). Otherwise, load the only “Twilight Hack” save game. - Once in the game, either walk backwards or talk to the man standing in front of you. this will initiate the install of the homebrew channel (which is the boot.dol in the root of your SD card)
Congrats, you should now have Homebrew Channel installed!
See this dude’s you-tube video for a walk through of the above (slightly different with the loader)
Install custom CIOS
CIOS stands for Custom IOS, i’m not 100% sure exactly what it is but i think of it like a BIOS / Operating system which allows you to run custom applications. I know you need a specific version for some applications to work.
Within your homebrew channel you should have the cIOSX application ready to run.
Launch the cIOSX application, follow the prompts and MAKE SURE you choose network installation (it should go off to the internet and fetch the latest version)
You will know if it worked correctly if the following USB loaders work. See this video for using cIOSX and Neogamma
Preparing your USB disk / key with games
Use the wbfsmanager to load existing ISO’s onto your USB disk / Key. Note this application will erase your USB disk / key and all of your existing data! you can find how to use this application here.
Playing your games on the Wii
Once you have loaded your games onto your USB disk / Key you can use the NeoGamma / Configurable USB Loader applications to load your games from your USB device.
If this guide helps you or you have some changes to recommend please let me know.
Enjoy! (“,)
Credits
Subscribe to:
Posts (Atom)