Thursday, March 31, 2011

Avaya notes

For the 406

Device: IP Office

Run IP Office Manager, user password are the same usually (copy/paste).

Software VM Pro is installed on a pc, then use PM PRO Client to access it.

Export the database and save it frequently, before changes, upgrades etc.
The vmdata.mdb is what the program edits, and then when you save it produces the zoom.vdp file. But you can't go backwards from the .vdp file...it is a text file and can read it, but will have to recreate the actions again.



Great Wireless Router or Access Point

Buffalo

WZ-HP-G300NH

(suffix of -US)

Good write up here:


Friday, March 11, 2011

Reset IP and such

Reset IP protocol

netsh int ip reset resetlog.txt.

see
http://support.microsoft.com/kb/299357

Reset or Reinstall Internet Explorer
http://support.microsoft.com/kb/318378

Winsock repair tool (at least one verison - haven't tried this one)
http://www.snapfiles.com/get/winsockxpfix.html

Thursday, March 3, 2011

Cisco ASA 5505 for allowing Pings out

Pings Outbound
There are two options in PIX 7.x that allow inside users to ping hosts on the outside. The first option is to setup a specific rule for each type of echo message.
For example:
access-list 101 permit icmp any any echo-reply
access-list 101 permit icmp any any source-quench
access-list 101 permit icmp any any unreachable
access-list 101 permit icmp any any time-exceeded
access-group 101 in interface outside
This allows only these return messages through the firewall when an inside user pings to an outside host. The other types of ICMP status messages might be hostile and the firewall blocks all other ICMP messages.
Another option is to configure ICMP inspection. This allows a trusted IP address to traverse the firewall and allows replies back to the trusted address only. This way, hosts on all inside interfaces can ping hosts on the outside and the firewall allows the replies to return. This also gives you the advantage of monitoring the ICMP traffic that traverses the firewall. In this example, icmp inspection is added to the default global inspection policy.
For example:
policy-map global_policy
class inspection_default
inspect icmp

from
http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094e8a.shtml


had to use (for now)
access-list outside_access_in permit icmp any any echo-reply

Cisco Terminal Commands

Show running-config
Copy running-config statup-config

Terminal page 0
Or terminal page 24


Config t


Don’t forget ctrl-z



More at

http://www.cisco.com/en/US/products/sw/iosswrel/ps1818/products_configuration_example09186a0080204528.shtml

also for acl
http://www.cisco.com/en/US/products/sw/secursw/ps1018/products_tech_note09186a00800a5b9a.shtml

some acl removal info here
http://www.velocityreviews.com/forums/t33107-remove-access-list.html

And putting in acl’s from text files
http://ciscotips.wordpress.com/category/access-lists/



wr for write
reload to restart


--
To see locked vpn user

Sh aaa local user

If locked, delete and recreate
..
To see max FAIL attempts (which is 16)

Config t

aaa local auth attempts

Cisco ASDM

Easiest way to get it is to login to device
at httpS://address.x.y.z

Good blog posts on multitude of software


Also a post on hitman pro, and other cloud analysis AV tools

Online AV scanners



MBR info

from Wikipedia

Note, when having various TDSS and other rootkits whcih invade the MBR, diskpart cannot see drives (lis dis in CL).

Though it is possible to manipulate the bytes in the MBR sector directly using various disk editors, there are tools to write fixed sets of functioning code to the MBR. Since MS-DOS 5.0, the DOS-mode program fdisk has included the (undocumented, but widely used) switch /mbr, which will rewrite the MBR code. Under Windows 2000 or later, the Recovery Console can be used to write new MBR code to a hard disk using its fixmbr command. Under Windows Vista and Windows 7, the Recovery Environment can be used to write new MBR code to a hard disk by clicking on Command Prompt and typing bootrec /FixMbr. Some third-party utilities may also be used for directly editing the contents of partition tables (without requiring any knowledge of hexadecimal or disk/sector editors).

Tuesday, March 1, 2011

Good tech blog

And has info on online storage, particularly TrendMicro's SafeSync

http://blog.insanegenius.com/

SafeSync had some problems, but can access through a webdrive and DAV client (needs a windows registry tweak)
SafeSync