HOME > MENU > SETTINGS > type 711 (for a kindle 3)
Quote:
Originally Posted by hippy dave
to get the 711 page on a k4, go to the settings page, then hold the keyboard button & press the right-side next-page button.
|
Then try telnetting from your machine
(I forget what the windows 7 cmd prompt looks like so I made it up, here)
YourMachine: telnet (the ip from 711) 22 - so like
telnet 192.168.1.244 22
you should get
Trying 192.168.1.244...
Connected to 192.168.1.244.
Escape character is '^]'.
This is just a sanity test that it IS actually there.
Ping is blocked by default IIRC. and while this WON'T get you in via ssh at least you will know your not going mad.
If that works you can confidently say "Well the port *is* open".
A typical 3 iptables is below
[root@kindle us]#
clear && iptables --line-numbers -L -n -v
Code:
Chain INPUT (policy DROP 3690 packets, 254K bytes)
num pkts bytes target prot opt in out source destination
1 0 0 ACCEPT tcp -- ppp0 * 0.0.0.0/0 0.0.0.0/0 tcp dpt:40317 (trojan port via 3g)
2 0 0 ACCEPT tcp -- ppp0 * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
3 60676 53M ACCEPT tcp -- wlan0 * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED (its our wirelss connection)
4 198 48645 ACCEPT udp -- wlan0 * 0.0.0.0/0 0.0.0.0/0 state ESTABLISHED (wireless udp)
5 5 384 ACCEPT udp -- ppp0 * 0.0.0.0/0 0.0.0.0/0 state ESTABLISHED (udp for the 3g)
6 2365 170K ACCEPT all -- lo * 127.0.0.1 0.0.0.0/0 (localstuff is ok)
7 937 307K ACCEPT all -- usb0 * 0.0.0.0/0 0.0.0.0/0 (usb waiting to work)
8 16559 1466K ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED (This is the INPUT CHAIN mind. it doesn't reply, probably stealthed)
9 10 536 ACCEPT tcp -- wlan0 * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 (and last but not least SSH : ) )
Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
num pkts bytes target prot opt in out source destination
(nothing, thankfully)
Chain OUTPUT (policy ACCEPT 72669 packets, 9433K bytes)
num pkts bytes target prot opt in out source destination
1 2365 170K ACCEPT all -- * lo 0.0.0.0/0 127.0.0.1
(allow everything to happen locally)
HIGHLY ANNOYINGLY (on a side point)
tail -f /var/log/messages has this to say about Settings 711
Code:
input=********* 1- Connection *********
120822:120816 cvm[3847]: 1.1 MAC: xx:EF:99:89:17:xx
120822:120816 cvm[3847]: 1.2 Wireless: On(1)
120822:120816 cvm[3847]: 1.3 AP: MoneyHole (00:36:9b:99:9a:99)
120822:120816 cvm[3847]: 1.3.1 Signal strength: 5/5
120822:120816 cvm[3847]: 1.3.2 Captive: no
120822:120816 cvm[3847]: 1.3.3 Security: WPA2-PSK
120822:120816 cvm[3847]: 1.3.4 Channel: 99
120822:120816 cvm[3847]: 1.6 Country: <unknown>
120822:120816 cvm[3847]:
120822:120816 cvm[3847]: ********* 2- Wireless Configuration *********
120822:120816 cvm[3847]: 2.1 Belkin_0CDD999 0 [WPA2-PSK][TKIP][CCMP] (1)
120822:120816 cvm[3847]: 2.2 MoneyHole 1 [WPA2-PSK][CCMP] (4)
120822:120816 cvm[3847]: 2.3 NortonArmsWifi 2 [WPA2-PSK][TKIP][CCMP] (1)
120822:120816 cvm[3847]:
120822:120816 cvm[3847]: ********* 3- Interface Configuration *********
120822:120816 cvm[3847]: 3.1 IP Address: 192.168.1.99
120822:120816 cvm[3847]: 3.2 Netmask : 255.255.255.0
120822:120816 cvm[3847]: 3.3 Broadcast :
120822:120816 cvm[3847]: 3.4 Gateway : 192.168.1.257
120822:120816 cvm[3847]: 3.5 Config : DHCP
120822:120816 cvm[3847]: 3.6 DNS : 192.168.1.257,
120822:120816 cvm[3847]: 3.7 Sponsored : no
120822:120816 cvm[3847]:
120822:120816 cvm[3847]: ********* 4- Last DHCP Session *********
120822:120816 cvm[3847]: Sending discover...
120822:120816 cvm[3847]: Offer from server xxx.xxx.1.257 received
120822:120816 cvm[3847]: Sending select for xxx.xxx.1.99...
120822:120816 cvm[3847]: Lease of xxx.xxx.1.99 obtained, lease time 86400
120822:120816 cvm[3847]:
120822:120816 cvm[3847]: 5 Device Time: Wed Aug 22 12:08:16 2012
120822:120816 cvm[3847]:
120822:120816 cvm[3847]: , focus=TRUE
Hmm seems a bit OTT to record my MAC addresses, but meh.
In essence if you can get into your device via USB perhaps you could dredge something from the guts to help you find out the issue.
HTH. :\