Thursday, October 20, 2011
A Quick Review on Openbox S10 Satellite Receiver
Posted by
Shipcode
at
20.10.11
Labels:
filipino hackers,
Filsat,
free channels,
FTA,
Linux,
open source,
Openbox S10,
phildish,
satellite hackers,
satellite receivers
Are
you a satellite hobbyist or interested in satellite security? Well then, this
satellite receiver is for you!
Meet
Openbox S10 HD Satellite Receiver, a Linux MIPS (Microprocessor without
Interlocked Pipeline Stages) OS satellite receiver that has a CCcam Plugin for
watching HD (High- Definition) in your TV. It has similar functions of a Dreambox Satellite Receiver but is the
cheapest and easy to configure satellite receiver that the world has ever
known.
So
what’s with this satellite receiver? Unlike other satellite receivers that you
receive if you subscribe with satellite cable companies like GSAT, CIGNAL, and Dream, this kind of receiver is
configurable and can be loaded with flash images.
This
is an ideal tool for satellite hobbyist who loves to shoot FTA (Free to Air)
and encrypted channels in different frequencies. And because this kind of
receiver has an Ethernet port, this can be used for card sharing also known as
control word sharing which is a popular method of pirate decryption.
Basically,
card sharing allows access to a specific valid subscription for multiple
clients or satellite receivers. A smart card is attached to a satellite
receiver loaded with software that supports the “control word” over the
Internet.
Openbox S10 (the successor of Openbox S9) supports HD and if paired with a LED (Light Emitting Diode) TV, the graphics are god-like or should I say “imba”. In fact, my father and I tried testing it with just a CRT (Cathode Ray Tube) TV and it’s like watching channels in a DVD Bluray mode.
This
satellite receiver has a user-friendly GUI (Graphic User Interface) and is one
of the coolest satellite receivers and boots faster than any set-top boxes out
there.
Below are the complete specifications of this set-top box:
1. 300 MHz MIPS
Processor - Linux Operating System
2. Fully compliant
MPEG-4 H.264/AVC Main Profile Level 3 & High Profile Level 4.1
3. Fully compliant
MPEG-2 MP@HL & MP@ML
4. Fully compliant
MPEG-1 Layer I & II & III, Dolby Digital Audio (AC3)
5. SCPC & MCPC
receivable from C/Ku band satellites
6. Multiple
LNB-Switching control (supports DiSEqC1.0/ 1.1/ unicable/1 .2/ 1.3 (USALS)
supported)
7. NIT search supported
8. Support MHEG-5
9. Support HDMI 1.3
10. Support PVR (store
in USB disk)
11. Multimedia files
playback (by USB)
12. Support Electronic
Program Guide (EPG) for 7 days
13. Teletext and
subtitle out through OSD
14. Support multi-lingual
DVB subtitle and teletext
15. Automatic and manual
channel scan options
16. Automatic service
scan
17. Channel-change time:
1 second
18. OSD in many
languages and skin-support
19. Multilingual support
on screen menu (OSD): English, French, Deutsch, Italian, Spanish, Swedish,
Danish, Greece, Portuguese, Finland, Holland, Turkish, Czech, selectable
20. LED Display
21. Multiple display
modes: 1080i/720p/570p/576i/480p
22. MPEG-2 / H.264
Hardware decoding
23. Videotext Decoder
24. Analog audio output:
stereo(L+R)
25. Screen format: auto,
4:3, and 16:9
26. Upgrade software
through USB2.0 port
27. Powerful program management
function, parent lock
28. CA 1x slot and CI
1xslot
29. 10/100Mbit Ethernet
Interface
30. Directly
bouquet-lists
31. Size (W x D x H):
300 mm x 220 mm x 56 mm Weight: 2.0 kg without USB HDD
The
receiver is really good and I hope next time they will improve their firmware
by including new capabilities like able to play AVI, MKV, etc. so that it will
surpass the capabilities of a multimedia player.
And by
the way, for those of you who are interested in shooting FTA channels just
visit Lyngsat.com for more resources.
Happy
shooting guys!
About the Contributor:
Shipcode is a prolific blogger of ROOTCON and at the same time an InfoSec enthusiast from Cebu. He was inspired to join ROOTCON as part of the core team to share his knowledge in information security. He encourages other like minded individuals to come forward and share their knowledge through blogging right here at ROOTCON Blog section.
ROOTCON is managed by like minded InfoSec professionals across the Philippines. All rights reserved. Designated trademarks, brands and articles are the property of their respective owners.
Sunday, October 02, 2011
Be on Guard against Crackers and Wardrivers by Securing your Wi-Fi at Home
Posted by
Shipcode
at
2.10.11
Labels:
airsnare,
AP attacks,
network encryption,
wardrivers,
WEP,
Wi-Fi hacking,
Wi-Fi paint,
Wi-Fi security,
wirless security,
WPA,
WPA2
In my last article, I demystified an easy to use tool that cracks Wi-Fi AP’s (Access Points) easier. Now it’s time to give some tips about securing your Wi-Fi AP at home.
But first of all why do we need to secure our AP? Well, if someone is using your connection then it can decrease your speed (duh!). And the intruder could sniff the packets in your network or he or she may try to exploit your own PC (Personal Computer).
Scared? Don’t worry we have some simple configurations and setups for you in order to protect your privacy and your Wi-Fi network. Here are some simple steps you can apply:
1. The most obvious thing you should do first is to determine the login page of your router by typing the internal IP address of your router in the browser. (For example 192.168.1.1 or 192.168.2.1)
2. Once you are done logging in to your router, read the manual so that you will be familiar with your router.
3. The next thing you should do is to change the default values for the admin and password settings under the Administration settings of your router. Create a unique password and don’t use common passwords.
4. Change the SSID (Service Set Identifier) name or the Wireless network name so that the attacker could not identify the model of your router because he could google it in order to search for exploits. Don’t use your name or other obvious information for the SSID.
5. In order to prevent other users from accessing your AP, enable network encryption. There are several encryptions for wireless security settings which includes; WEP (Wired Equivalent Privacy), WPA (WPA-Personal), and WPA2 (Wi-Fi Protected Access version 2). WEP can be easily cracked and is the most basic encryption thus making it least secure. Use WPA2 (AES) encryption because it is the most secured encryption.
6. For the WPA2 encryption, use a unique or complex passphrase so that crackers will have a hard time cracking it with their wordlist. If you suspect any activities, change your passphrase monthly. The cracker could have a hard time cracking it because he is only as good as his wordlist.
7. Reduce the signal of your wireless router; you could do this by decreasing the signal range by either changing the mode of your router to 802.11g (instead of 802.11n or 802.11b) or use a different wireless channel.
8. Enable MAC filtering so that it will only allow friendly MAC addresses on the AP. But sad to say, MAC addresses can be spoofed but first things first, the attacker should know one of the MAC addresses connected to the wireless network before he can spoof it thus he needs to sniff the packets first.
9. Update the firmware of your router by checking the official website of the manufacturer in order to be on guard with the latest exploits. And also because some old routers don't have WPA2 encryption in their firmware.
10. Then to check for users connected to your wireless network open your router's administration page (using the 192.168.* address) and look for the DHCP Clients Table (it's under Status > Local Network on Linksys routers). Here you will see a list of all computers and wireless devices that are connected to your home network. But you could also use Airsnare which is a “free utility that alerts you to unfriendly MAC addresses on your network and will also alert you to DHCP requests taking place”.
11. And if you are too paranoid, apply the Anti-Wifi Paint. LOL!
Well, that’s it for now! If you want to add some other tips, just reply to this blog article.
Shipcode is a prolific blogger of ROOTCON and at the same time an InfoSec enthusiast from Cebu. He was inspired to join ROOTCON as part of the core team to share his knowledge in information security. He encourages other like minded individuals to come forward and share their knowledge through blogging right here at ROOTCON Blog section.
ROOTCON is managed by like minded InfoSec professionals across the Philippines. All rights reserved. Designated trademarks, brands and articles are the property of their respective owners.
Subscribe to:
Posts (Atom)
Subscribe to:
Posts (Atom)