brick:~# parted -s /dev/sdb print Warning: /dev/sdb contains GPT signatures, indicating that it has a GPT table. However, it does not have a valid fake msdos partition table, as it should. Perhaps it was corrupted -- possibly by a program that doesn't understand GPT partition tables. Or perhaps you deleted the GPT table, and are now using an msdos partition table. Is this a GPT partition table? Model: ViPowER VP-89118(SD1) (scsi) Disk /dev/sdb: 204GB Sector size (logical/physical): 512B/512B Partition Table: gpt Number Start End Size File system Name Flags 1 17.4kB 1024MB 1024MB ext3 primary 2 1024MB 6144MB 5120MB xfs primary 3 6144MB 7168MB 1024MB linux-swap primary 4 7168MB 204GB 197GB xfs primary brick:~#やっぱり残っている。
brick:~# parted -s /dev/sdb rm 4 Warning: /dev/sdb contains GPT signatures, indicating that it has a GPT table. However, it does not have a valid fake msdos partition table, as it should. Perhaps it was corrupted -- possibly by a program that doesn't understand GPT partition tables. Or perhaps you deleted the GPT table, and are now using an msdos partition table. Is this a GPT partition table? brick:~# ^4^3 parted -s /dev/sdb rm 3 brick:~# ^3^2 parted -s /dev/sdb rm 2 brick:~# ^2^1 parted -s /dev/sdb rm 1 brick:~# !?print parted -s /dev/sdb print Model: ViPowER VP-89118(SD1) (scsi) Disk /dev/sdb: 204GB Sector size (logical/physical): 512B/512B Partition Table: gpt Number Start End Size File system Name Flags brick:~#もうこれでええやろ
yasunari@ude:/srv/tftp$ tail -f /var/log/daemon.log : : Oct 5 21:46:44 ude in.tftpd[682]: connect from 192.168.11.150 (192.168.11.150) Oct 5 21:46:44 ude tftpd[683]: tftpd: trying to get file: uImage.buffalo Oct 5 21:46:44 ude tftpd[683]: tftpd: serving file from /srv/tftp Oct 5 21:46:44 ude in.tftpd[684]: connect from 192.168.11.150 (192.168.11.150) Oct 5 21:46:44 ude tftpd[685]: tftpd: trying to get file: initrd.buffalo Oct 5 21:46:44 ude tftpd[685]: tftpd: serving file from /srv/tftpしばらくして、LED が青点滅から、、、、やっぱりかわらない!
こんなところにまでハック封じが?
そんなところに工数使わずに、 ちゃんとセキュリティホール閉じてよ
|
← まっさらにする |
ハックの記録 LinkStation/玄箱 をハックしよう |
→ まっさらにする(3)LS-XHL の uImage.buffalo, initrd.buffalo で起動 |