Bitcoin Forum
May 07, 2024, 01:15:43 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 2 3 4 5 6 7 8 9 10 [11] 12 »  All
  Print  
Author Topic: www.lketc.com 1TH Dragon miner direct order. 3000$  (Read 25444 times)
jimrome
Sr. Member
****
Offline Offline

Activity: 434
Merit: 250


View Profile
July 07, 2014, 07:04:48 AM
 #201

We found the machines are sending back encrypted packets back to a Chinese IP address, the packets are encrypted so we are not sure weather its sending back hashes or somethig more sinister.

We have re-wrote the lketc dragon miner software our self and found the units to be hashing 10% more, so likely stealing hashes from our power.

i will release more proof and our clean dragon miner software after more tests.

I am in The Netherlands at the moment, I can't make an image of the latest firmware of the Dragon miners that are password protected.
Can someone upload an image that is password protected?
I need it ASAP, I found a Dutch sotware engineer who can reverse engineer it.
I will tip him if he finds the password and stuff that don't belong in that image.

Good luck to your engineer, I wish him luck and he's going to need it Smiley
In order to get the maximum amount of activity points possible, you just need to post once per day on average. Skipping days is OK as long as you maintain the average.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1715087743
Hero Member
*
Offline Offline

Posts: 1715087743

View Profile Personal Message (Offline)

Ignore
1715087743
Reply with quote  #2

1715087743
Report to moderator
1715087743
Hero Member
*
Offline Offline

Posts: 1715087743

View Profile Personal Message (Offline)

Ignore
1715087743
Reply with quote  #2

1715087743
Report to moderator
1715087743
Hero Member
*
Offline Offline

Posts: 1715087743

View Profile Personal Message (Offline)

Ignore
1715087743
Reply with quote  #2

1715087743
Report to moderator
jimrome
Sr. Member
****
Offline Offline

Activity: 434
Merit: 250


View Profile
July 07, 2014, 05:25:11 PM
 #202

I thought I'd mention that it seems BFGMiner will now support The "jingtian" miner, which is essentially the same thing as all the other A1 miner clones.

I'm going to check it out, but it seems we finally have open source firmware and can avoid using the stock driver (and the other potentially nefarious crap which may come with it)
Luke-Jr
Legendary
*
Offline Offline

Activity: 2576
Merit: 1186



View Profile
July 07, 2014, 05:27:27 PM
 #203

I thought I'd mention that it seems BFGMiner will now support The "jingtian" miner, which is essentially the same thing as all the other A1 miner clones.
I'm not sure if it is... JingTian has a microcontroller that IIRC they designed themselves.
Either way, let me know how this works out. Smiley

jimrome
Sr. Member
****
Offline Offline

Activity: 434
Merit: 250


View Profile
July 07, 2014, 05:53:41 PM
 #204

I thought I'd mention that it seems BFGMiner will now support The "jingtian" miner, which is essentially the same thing as all the other A1 miner clones.
I'm not sure if it is... JingTian has a microcontroller that IIRC they designed themselves.
Either way, let me know how this works out. Smiley

I think their controller is an Rpi (which you can see the end of here: http://www.jtminer.com/product/28nm-miner/#). This would would make sense as they are probably just using innosilicon's driver as the rest of the A1 clone miner manufacturers.

It still might not be fully compatible, I'll let you know in around 45mins Smiley
jimrome
Sr. Member
****
Offline Offline

Activity: 434
Merit: 250


View Profile
July 07, 2014, 07:43:55 PM
 #205


<snip>
It still might not be fully compatible, I'll let you know in around 45mins Smiley

Yeah, so it doesn't work 'out-of-the-box', but I'm continuing to investigate if it's just a configuration issue (e.g. see if SPI ports can be polled)
defcon23
Legendary
*
Offline Offline

Activity: 1120
Merit: 1002


View Profile
July 23, 2014, 11:06:02 AM
 #206

anyone got a clean & recent english image of the "4 blade dragonboot" ? ( with unblocked ssh acces..)
thanx in advance  Wink
notlist3d
Legendary
*
Offline Offline

Activity: 1456
Merit: 1000



View Profile
July 23, 2014, 01:29:07 PM
 #207

Bumped the thread for you with Dragon information from Mr. Lee.  My image is on first page it's 4 blade with ssh .

https://bitcointalk.org/index.php?topic=545642.0 ( note prices in thread are old they are now cheaper in group buy thread)
Fsá
Newbie
*
Offline Offline

Activity: 7
Merit: 0


View Profile
July 25, 2014, 10:08:17 AM
 #208

Anyone know if the company is honest Dragon Miners?

I'm thinking of hiring the cloud service mining them.
defcon23
Legendary
*
Offline Offline

Activity: 1120
Merit: 1002


View Profile
July 25, 2014, 03:28:12 PM
 #209

Bumped the thread for you with Dragon information from Mr. Lee.  My image is on first page it's 4 blade with ssh .

https://bitcointalk.org/index.php?topic=545642.0 ( note prices in thread are old they are now cheaper in group buy thread)
thank you a lot Wink
defcon23
Legendary
*
Offline Offline

Activity: 1120
Merit: 1002


View Profile
July 25, 2014, 03:35:06 PM
 #210

Anyone know if the company is honest Dragon Miners?

I'm thinking of hiring the cloud service mining them.
i dont know their cloud service, but  i recently bought several units from them , and all is ok for me. ultra quick delivery from china to europe ( 4 days ups ).  the miners all work fine.  ( i paid in BTC ) contact: lketc.nancy@gmail.com
Easy2Mine
Hero Member
*****
Offline Offline

Activity: 854
Merit: 500


einc.io


View Profile
August 07, 2014, 08:50:41 AM
 #211

We found the machines are sending back encrypted packets back to a Chinese IP address, the packets are encrypted so we are not sure weather its sending back hashes or somethig more sinister.

We have re-wrote the lketc dragon miner software our self and found the units to be hashing 10% more, so likely stealing hashes from our power.

i will release more proof and our clean dragon miner software after more tests.

I am in The Netherlands at the moment, I can't make an image of the latest firmware of the Dragon miners that are password protected.
Can someone upload an image that is password protected?
I need it ASAP, I found a Dutch sotware engineer who can reverse engineer it.
I will tip him if he finds the password and stuff that don't belong in that image.

Good luck to your engineer, I wish him luck and he's going to need it Smiley

I haven't contact the Dutch engineer, instead I try to see if it was possible to do it myself before I call help.
I had to start as a noob in Linux.
The LKETC password was not the most diffecult part, the ghost files that replace any files you have change back to the original files every time
after a reboot are.
After I found out the password, I found an easier way to change the password, simply replace the file "shadow" with your own username and password.
This is a standaard Linux trick, so next time you run into a firmware that is locked and you have control over the SD card.
Backup the SD card and replace the password and username in the file "shadow" with your own password and username.
It takes only 5 minutes instead of hours.

All the LKETC firmware use CGminer 3.9.0, the only difference between them is the languages files.
The first versions only have Chinese, the later version have English added and the last version have also Russian.
The ghost files in the latest version is more trickier than in the first version.

https://www.dropbox.com/s/14a66jqudfjkulw/Dragon_192_168_1_101.7z

This is the latest firmware with all the languages files, I change all the LKETC logo with my own and added a password protected page that I have
learn here.
https://bitcointalk.org/index.php?topic=650114.msg7277745#msg7277745

The IP of the miner is 192.168.1.101
The username of the password protected page is admin, no password, you can change that when you SSH into the Raspberry Pi with PUTTY.
The Raspberry username is pi and the password is raspberry.
Once you are logged into the Raspberry.

su root
cd /var/www
nano passwordprotect.php
Change your username and password and save it by pressing Ctrl+x

I want to write a tutorial how you can replace the ghost files with your own customize files and logo, but I am afraid I am too busy to do that
at this moment.




upetmcz
Newbie
*
Offline Offline

Activity: 11
Merit: 0


View Profile
August 27, 2014, 02:44:52 AM
 #212

how to order?
grn
Sr. Member
****
Offline Offline

Activity: 357
Merit: 252


View Profile
August 27, 2014, 04:59:15 AM
 #213


I haven't contact the Dutch engineer, instead I try to see if it was possible to do it myself before I call help.
I had to start as a noob in Linux.
The LKETC password was not the most diffecult part, the ghost files that replace any files you have change back to the original files every time
after a reboot are.
After I found out the password, I found an easier way to change the password, simply replace the file "shadow" with your own username and password.
This is a standaard Linux trick, so next time you run into a firmware that is locked and you have control over the SD card.
Backup the SD card and replace the password and username in the file "shadow" with your own password and username.
It takes only 5 minutes instead of hours.

All the LKETC firmware use CGminer 3.9.0, the only difference between them is the languages files.
The first versions only have Chinese, the later version have English added and the last version have also Russian.
The ghost files in the latest version is more trickier than in the first version.

https://www.dropbox.com/s/14a66jqudfjkulw/Dragon_192_168_1_101.7z

This is the latest firmware with all the languages files, I change all the LKETC logo with my own and added a password protected page that I have
learn here.
https://bitcointalk.org/index.php?topic=650114.msg7277745#msg7277745

The IP of the miner is 192.168.1.101
The username of the password protected page is admin, no password, you can change that when you SSH into the Raspberry Pi with PUTTY.
The Raspberry username is pi and the password is raspberry.
Once you are logged into the Raspberry.

su root
cd /var/www
nano passwordprotect.php
Change your username and password and save it by pressing Ctrl+x

I want to write a tutorial how you can replace the ghost files with your own customize files and logo, but I am afraid I am too busy to do that
at this moment.





Glad you figured it out  Grin I would have shown you how a month earlier if cypotcelo and dropt werent being such assclowns about the whole reverse engineering is easy and noobs know nothing attack 

How is that Lexical analysis working out bickneleski?
Easy2Mine
Hero Member
*****
Offline Offline

Activity: 854
Merit: 500


einc.io


View Profile
August 27, 2014, 05:58:56 AM
 #214


I haven't contact the Dutch engineer, instead I try to see if it was possible to do it myself before I call help.
I had to start as a noob in Linux.
The LKETC password was not the most diffecult part, the ghost files that replace any files you have change back to the original files every time
after a reboot are.
After I found out the password, I found an easier way to change the password, simply replace the file "shadow" with your own username and password.
This is a standaard Linux trick, so next time you run into a firmware that is locked and you have control over the SD card.
Backup the SD card and replace the password and username in the file "shadow" with your own password and username.
It takes only 5 minutes instead of hours.

All the LKETC firmware use CGminer 3.9.0, the only difference between them is the languages files.
The first versions only have Chinese, the later version have English added and the last version have also Russian.
The ghost files in the latest version is more trickier than in the first version.

https://www.dropbox.com/s/14a66jqudfjkulw/Dragon_192_168_1_101.7z

This is the latest firmware with all the languages files, I change all the LKETC logo with my own and added a password protected page that I have
learn here.
https://bitcointalk.org/index.php?topic=650114.msg7277745#msg7277745

The IP of the miner is 192.168.1.101
The username of the password protected page is admin, no password, you can change that when you SSH into the Raspberry Pi with PUTTY.
The Raspberry username is pi and the password is raspberry.
Once you are logged into the Raspberry.

su root
cd /var/www
nano passwordprotect.php
Change your username and password and save it by pressing Ctrl+x

I want to write a tutorial how you can replace the ghost files with your own customize files and logo, but I am afraid I am too busy to do that
at this moment.





Glad you figured it out  Grin I would have shown you how a month earlier if cypotcelo and dropt werent being such assclowns about the whole reverse engineering is easy and noobs know nothing attack 

I think Cryptoceelo is pissed at LKETC, because they didn't give him the password and he has to use an older image with root access.
He claimed that the Dragons are stealing hashes or sending encrypted packages back to a Chinese IP address, but he is unable to locate all the hidden files and change the password.
I doubt about his claim that he has rewritten the firmware, untill now he hasn't proofed it yet.
If he is that good as he claim to be, he could have change the password himself and located all the hidden files easily.

If you analize the files on the older images, you will find traces of Innosilicon passwords.

I am still a Linux NOOB, but am still learning and it is fun to do.

dropt
Legendary
*
Offline Offline

Activity: 1512
Merit: 1000



View Profile
August 27, 2014, 02:35:42 PM
 #215

Glad you figured it out  Grin I would have shown you how a month earlier if cypotcelo and dropt werent being such assclowns about the whole reverse engineering is easy and noobs know nothing attack  

I made one comment about the existence of tools for reverse engineering as well as stating that a driver could be written from the A1 documentation, and I'm "being such [an] assclown".  You were so butthurt over someone having a differing opinion that you put me on ignore and then added it to your sig as if it was some sort of achievement.

Then, you refused to help others with their problems that you allege to have solutions for because two people on a forum of many didn't worship your worthless opinion.  Are you 12?

Hello assclown hypocrite!
dropt
Legendary
*
Offline Offline

Activity: 1512
Merit: 1000



View Profile
August 27, 2014, 02:38:27 PM
 #216

I think Cryptoceelo is pissed at LKETC, because they didn't give him the password and he has to use an older image with root access.
He claimed that the Dragons are stealing hashes or sending encrypted packages back to a Chinese IP address

And did anyone try to corroborate his findings with a simple network sniffer?   I would have, but I never purchased an LKETC machine because they pegged their prices to BTC-E and didn't update in real time (meaning it was always overpriced).
Easy2Mine
Hero Member
*****
Offline Offline

Activity: 854
Merit: 500


einc.io


View Profile
August 28, 2014, 07:52:24 AM
 #217

I think Cryptoceelo is pissed at LKETC, because they didn't give him the password and he has to use an older image with root access.
He claimed that the Dragons are stealing hashes or sending encrypted packages back to a Chinese IP address

And did anyone try to corroborate his findings with a simple network sniffer?   I would have, but I never purchased an LKETC machine because they pegged their prices to BTC-E and didn't update in real time (meaning it was always overpriced).

I follow all the command lines on the files and found nothing suspicious, that's how I was able to find out where the hidden files and hidden folders are located.
It is possible that I might have overlooked something, I am not an expert in Linux.
But from Innosilicon technical specification regarding the Turbo mode of the A1 chip, it is impossible for the Dragon to run 10% more than 1T with only 32 chips.
Until Cryptoceelo has upload his rewritten firmware with 10% more hashrate and can proove his findings, he is a BIG LIAR.

According to Creeptoceelo, the packages were encrypted, how do he know it was 10% or maybe more hasrate if he can't read the packages content.
I pm him regarding simple questions, I got pms back, but when I pm him asking about which IP the packages are sent to, he went silent.

dropt
Legendary
*
Offline Offline

Activity: 1512
Merit: 1000



View Profile
August 28, 2014, 04:03:30 PM
 #218

Until Cryptoceelo has upload his rewritten firmware with 10% more hashrate and can proove his findings, he is a BIG LIAR.

According to Creeptoceelo, the packages were encrypted, how do he know it was 10% or maybe more hasrate if he can't read the packages content.
I pm him regarding simple questions, I got pms back, but when I pm him asking about which IP the packages are sent to, he went silent.

And you're probably right.  Just use a computer on the same network as the miner and see what the ethernet traffic is using wireshark.  You should be able to see all of the IP's and type of related traffic being accessed over your network.
Easy2Mine
Hero Member
*****
Offline Offline

Activity: 854
Merit: 500


einc.io


View Profile
September 02, 2014, 07:54:59 AM
 #219

Until Cryptoceelo has upload his rewritten firmware with 10% more hashrate and can proove his findings, he is a BIG LIAR.

According to Creeptoceelo, the packages were encrypted, how do he know it was 10% or maybe more hasrate if he can't read the packages content.
I pm him regarding simple questions, I got pms back, but when I pm him asking about which IP the packages are sent to, he went silent.

And you're probably right.  Just use a computer on the same network as the miner and see what the ethernet traffic is using wireshark.  You should be able to see all of the IP's and type of related traffic being accessed over your network.

After following the command lines and reading Innosilicon's specs, I didn't bother to use wireshark in the first place.
But to be sure I haven't overlooked anything, I run wireshark yesterday and haven't found anything suspicious.

defcon23
Legendary
*
Offline Offline

Activity: 1120
Merit: 1002


View Profile
September 25, 2014, 11:43:09 AM
 #220

how to order?
contact: lketc.nancy@gmail.com
Pages: « 1 2 3 4 5 6 7 8 9 10 [11] 12 »  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!