This is my personal Web Site, here you will find some IT related information based on my experience. I’m an Italian Electronic Engineer with more than 30 years of experience in the fields of IT management, Network and Unix System Administration, Telecommunications and Digital Electronics.
Last week I started the Make Me Hack YouTube channel about Hardware Hacking and Reverse Engineering. I also started the Make Me Hack Website to complement the YoutTube channel with additional links and information.
02 – How To Find The UART Interface about how to identify the position and pin-out of the IoT serial interface using simple tools, like a multi-meter, and how to connect this interface to a PC using a USB TTL Serial Adapter.
GitHub repositories related to the Home Router Example
hacking-gemtek: the complete reverse engineering project for the home router example, a Gemtek home router (WVRTM-127ACN), distributed in Italy by Linkem, with the purpose to modify the firmware, gain root access, recover default WiFi password.
I did a presentation, in Italian (see below for similar presentation in English), at the RomHack 2019 – Cyber Security Conference on 28th September 2019 about “Reverse Engineering of IoT devices: Hack a Home Router”.
GNS3 is a fantastic piece of software, it glues together different open source software and allows to emulate a network that includes Cisco routers (using real Cisco firmware), Cisco switches (using IOU, Cisco IOS on Unix), Cisco ASA and any other devices that can run on Qemu or Virtual Box emulator.
It also allows to connect the virtual network to the physical network, it is possible to access Internet in the emulated world and vice-versa. GNS3 is available on Windows, Mac OSX and on Linux, but it shines on Linux because, to use IOU, if you are not on Linux you need a Linux virtual machine running on VirtualBox.… Read the rest
I am not a fan of Microsoft products, I don’t like their complexity and the “dangerous by design” philosophy; recently I switched company and I am involved in implementing a data center for a public institution based primary on Microsoft Technology. One of this product is Microsoft Exchange; after many years of Unix System Management experience I didn’t believe how flawed Exchange was until I red by myself the official Microsoft Exchange documentation (Microsoft Exchange Server 2003 Resource Kit).… Read the rest
English version here
Nel corso del mese di dicembre 2006 abbiamo provveduto ad installare un nuovo filtro per bloccare le email indesiderate (“spam”) e le email contenenti virus o files potenzialmente pericolosi per la sicurezza della nostra rete.
Le emails possono essere bloccate per le seguenti ragioni:
il server che ci invia posta per conto del mittente è stato incluso in una lista nera (black list) di server usati dagli spammers. In questo caso l’errore ritornato al mittente è: “554 Rejected as spam x.x.x.x
Italian version here
In December 2006 we installed a new anti-spam/anti-virus email filter.
Emails can be blocked for the following reasons:
the sender’s email server has been included in a blacklist of known spammers. In this case the error returned to the server is “554 Rejected as spam x.x.x.x found in dnsbl.sorbs.net” or “554 Rejected as spam see: http://spamcop.net/bl.shtml?x.x.x.x” where “x.x.x.x” is the sender’s server IP address.
This means that this server has been included in one of the two blacklists that I am using.