Portál AbcLinuxu, 24. dubna 2024 22:38

SMC WBR14-G

Technické parametry

Identifikace pod Linuxem

$ nmap -v -sS -O -P0 router 
Starting nmap 3.50 ( http://www.insecure.org/nmap/ ) at 2005-08-23 23:00 CEST
Host 192.168.1.1 appears to be up ... good.
Initiating SYN Stealth Scan against 192.168.1.1 at 23:00
Adding open port 21/tcp
Adding open port 80/tcp
The SYN Stealth Scan took 264 seconds to scan 1659 ports.
Warning:  OS detection will be MUCH less reliable because we did not find at least 1 open and1 closed TCP port
For OSScan assuming that port 21 is open and port 36468 is closed and neither are firewalled
Interesting ports on 192.168.1.1:
(The 1657 ports scanned but not shown below are in state: filtered)
PORT   STATE SERVICE
21/tcp open  ftp
80/tcp open  http
Device type: general purpose
Running: OpenBSD 3.X
OS details: OpenBSD 3.0 SPARC with pf "scrub all" feature, OpenBSD 3.3 X86 with pf "scrub all" feature, OpenBSD 3.4 X86 with pf "scrub all" feature
TCP Sequence Prediction: Class=truly random
                         Difficulty=9999999 (Good luck!)
IPID Sequence Generation: Randomized

Nmap run completed -- 1 IP address (1 host up) scanned in 273.591 seconds

Postup zprovoznění pod Linuxem

Jde o síťový router s podporou WiFi, takže připojit kabely RJ45, nastavit na Linuxu stejnou síť:

ifconfig eth0:1 192.168.2.10 broadcast 192.168.255.255 netmask 255.255.0.0 up

Připojit se prohlížečem na http://192.168.2.1 (heslo smcadmin) a nastavit dle požadavků.

Poznámka

Je to strašný křáp, rozhodně nedoporučuji na žádné kritické místo sítě, pro připojení notebooku přes WiFi ale může posloužit dobře.

Dokument vytvořil: Fluttershy, yay!, 26.4.2011 23:09 | Zobrazeno: 655×

Tiskni Sdílej: Linkuj Jaggni to Vybrali.sme.sk Google Del.icio.us Facebook

ISSN 1214-1267, (c) 1999-2007 Stickfish s.r.o.