I wrote a simple bash script for monitoring changes in a webpage. I was able to find a couple or more such scripts on the web but non of those worked for https websites with non-valid cerfificates. So here is one that does:
while true; do
if [[ -f new_page.html ]]; then
mv new_page.html old_page.html
wget --tries=45 --wait=10 $1 -O new_page.html --no-check-certificate > /dev/null 2>&1
diff ./new_page.html ./old_page.html > /dev/null
if [[ $? -ne 0 ]]; then
echo "The webpage has changed!"
# mpg123 -q /home/user/latin_rhythm_guitar.mp3
echo "No change"
# sleep some time
The line mpg123 -q /home/user/latin_rhythm_guitar.mp3 is commented out. If you choose to play a song each time a change in the webpage occurs change the filename and un-comment.
Part of the source code is from the script found here.
I am a happy owner of the DG834PN router from Netgear.
It is a little old but I am satisfied from its speed and wifi coverage.
However, I always felt I had to hack this router. The router by default does not support an external antenna. This is fine, since it covers every corner of my appartment. But I had to add an external anntenna connector anyway…
So here it is:
I bought male-female rp-sma cable and cut it in the middle.
I soldered the female part on the internal antenna circuit and used some tape to keep the cable from moving.
Here is the first soldering point:
…and the other one:
*Your can use your multimeter to search for soldering points.
Drilled a hole on the backpanel and glued the connector.
Closed the router case carefully and connected it to power!
Everything works fine! (I need to clean that desk.)
I do not have a way to measure if the signal was improved inside the house, since it was maximum anyway. But I will try around the house and keep you updated!
One of my favourite tools for penetration testing is ZAProxy or ZAP.
In case you haven’t heard about it you can find more information and download it here.
In this post I will publish an answer Psiinon (the project lead) gave in the ZAP mailing list. I decided to publish this because I was asked the same thing many times, especially from new ZAP users.
Is there any danger when scanning with ZAP against a live website (e.g. create/delete/update/corrupt data)?
I usually try to explain it this way:
Proxying (and therefore passive scanning) requests via ZAP is completely safe and legal, it just allows you to see whats going on.
Spidering is a bit more dangerous. Is could cause problems depending on how your application works (and we should make the ‘no post’ option visible!).
Active scanning is dangerous and depending on your app may create/modify/delete data.
So the only really safe thing is proxying and passive scanning, the other 2 could cause problems and could be considered illegal if you perform them on apps you dont have permission to test.
I have wondered about adding a ‘safe’ mode to ZAP which will only allow you to do safe things. Thoughts anyone? I know its not something pentesters would use;)
Hope that helps,
I did searched a bit in the ZAP FAQ or wiki but I was not able to find it. Hope it helps!
Hi! Sorry for the long absense…
I got back from Denmark but I won’t say much on it instead I am going to post some photos in the next days.
Today I was looking for interesting embedded systems websites and I came towards this wiki: elinux.org . It is filled with information and guides on embedded systems hacking and much more!
I hope you enjoy it!