elhacker.net cabecera Bienvenido(a), Visitante. Por favor Ingresar o Registrarse
¿Perdiste tu email de activación?.

 

 


Tema destacado: Como proteger una cartera - billetera de Bitcoin


  Mostrar Mensajes
Páginas: 1 2 [3] 4 5 6 7 8 9
21  Seguridad Informática / Wireless en Linux / Re: Kismet fatal illegal card source line "mon0" en: 4 Abril 2013, 20:46 pm
Hola ChimoC, gracias por contestar.

Pues te comento, lo único que he tocado del kismet.cong es la linea source, quedandome de la siguiente manera:

* Pongo el tochaco para que lo analiceis bien, pero os resalto en negrita la única linea que he alterado.

# Kismet config file
# Most of the "static" configs have been moved to here -- the command line
# config was getting way too crowded and cryptic.  We want functionality,
# not continually reading --help!

# Version of Kismet config
version=2007.09.R1

# Name of server (Purely for organizational purposes)
servername=Kismet

# User to setid to (should be your normal user)
#suiduser=your_user_here

# Do we try to put networkmanager to sleep?  If you use NM, this is probably
# what you want to do, so that it will leave the interfaces alone while
# Kismet is using them.  This requires DBus support!
networkmanagersleep=true

# Sources are defined as:
# source=sourcetype,interface,name[,initialchannel]
# Source types and required drivers are listed in the README under the
# CAPTURE SOURCES section.
# The initial channel is optional, if hopping is not enabled it can be used
# to set the channel the interface listens on.
# YOU MUST CHANGE THIS TO BE THE SOURCE YOU WANT TO USE
source=zd1211rw,mon0,ZyDAS   // Esta es la única línea que he modificado

# Comma-separated list of sources to enable.  This is only needed if you defined
# multiple sources and only want to enable some of them.  By default, all defined
# sources are enabled.
# For example:
# enablesources=prismsource,ciscosource


# Automatically destroy VAPs on multi-vap interfaces (like madwifi-ng).
# Madwifi-ng doesn't work in rfmon when non-rfmon VAPs are present, however
# this is a fairly invasive change to the system so it CAN be disabled.  Expect
# things not to work in most cases if you do disable it, however.
vapdestroy=true


# Do we channelhop?
channelhop=true

# How many channels per second do we hop?  (1-10)
channelvelocity=5

# By setting the dwell time for channel hopping we override the channelvelocity
# setting above and dwell on each channel for the given number of seconds.
#channeldwell=10

# Do we split channels between cards on the same spectrum?  This means if
# multiple 802.11b capture sources are defined, they will be offset to cover
# the most possible spectrum at a given time.  This also controls splitting
# fine-tuned sourcechannels lines which cover multiple interfaces (see below)
channelsplit=true

# Basic channel hopping control:
# These define the channels the cards hop through for various frequency ranges
# supported by Kismet.   More finegrain control is available via the
# "sourcechannels" configuration option.
#
# Don't change the IEEE80211<x> identifiers or channel hopping won't work.

# Users outside the US might want to use this list:
# defaultchannels=IEEE80211b:1,7,13,2,8,3,14,9,4,10,5,11,6,12
defaultchannels=IEEE80211b:1,6,11,2,7,3,8,4,9,5,10

# 802.11g uses the same channels as 802.11b...
defaultchannels=IEEE80211g:1,6,11,2,7,3,8,4,9,5,10

# 802.11a channels are non-overlapping so sequential is fine.  You may want to
# adjust the list depending on the channels your card actually supports.
# defaultchannels=IEEE80211a:36,40,44,48,52,56,60,64,100,104,108,112,116,120,124,128,132,136,140,149,153,157,161,184,188,192,196,200,204,208,212,216
defaultchannels=IEEE80211a:36,40,44,48,52,56,60,64

# Combo cards like Atheros use both 'a' and 'b/g' channels.  Of course, you
# can also explicitly override a given source.  You can use the script
# extras/listchan.pl to extract all the channels your card supports.
defaultchannels=IEEE80211ab:1,6,11,2,7,3,8,4,9,5,10,36,40,44,48,52,56,60,64

# Fine-tuning channel hopping control:
# The sourcechannels option can be used to set the channel hopping for
# specific interfaces, and to control what interfaces share a list of
# channels for split hopping.  This can also be used to easily lock
# one card on a single channel while hopping with other cards.
# Any card without a sourcechannel definition will use the standard hopping
# list.
# sourcechannels=sourcename[,sourcename]:ch1,ch2,ch3,...chN

# ie, for us channels on the source 'prism2source' (same as normal channel
# hopping behavior):
# sourcechannels=prism2source:1,6,11,2,7,3,8,4,9,5,10

# Given two capture sources, "prism2a" and "prism2b", we want prism2a to stay
# on channel 6 and prism2b to hop normally.  By not setting a sourcechannels
# line for prism2b, it will use the standard hopping.
# sourcechannels=prism2a:6

# To assign the same custom hop channel to multiple sources, or to split the
# same custom hop channel over two sources (if splitchannels is true), list
# them all on the same sourcechannels line:
# sourcechannels=prism2a,prism2b,prism2c:1,6,11

# Port to serve GUI data
tcpport=2501
# People allowed to connect, comma seperated IP addresses or network/mask
# blocks.  Netmasks can be expressed as dotted quad (/255.255.255.0) or as
# numbers (/24)
allowedhosts=127.0.0.1
# Address to bind to.  Should be an address already configured already on
# this host, reverts to INADDR_ANY if specified incorrectly.
bindaddress=127.0.0.1
# Maximum number of concurrent GUI's
maxclients=5

# Do we have a GPS?
gps=false
# Host:port that GPSD is running on.  This can be localhost OR remote!
gpshost=localhost:2947
# Do we lock the mode?  This overrides coordinates of lock "0", which will
# generate some bad information until you get a GPS lock, but it will
# fix problems with GPS units with broken NMEA that report lock 0
gpsmodelock=false

# Packet filtering options:
# filter_tracker - Packets filtered from the tracker are not processed or
#                  recorded in any way.
# filter_dump    - Packets filtered at the dump level are tracked, displayed,
#                  and written to the csv/xml/network/etc files, but not
#                  recorded in the packet dump
# filter_export  - Controls what packets influence the exported CSV, network,
#                  xml, gps, etc files.
# All filtering options take arguments containing the type of address and
# addresses to be filtered.  Valid address types are 'ANY', 'BSSID',
# 'SOURCE', and 'DEST'.  Filtering can be inverted by the use of '!' before
# the address.  For example,
# filter_tracker=ANY(!00:00:DE:AD:BE:EF)
# has the same effect as the previous mac_filter config file option.
# filter_tracker=...
# filter_dump=...
# filter_export=...

# Alerts to be reported and the throttling rates.
# alert=name,throttle/unit,burst/unit
# The throttle/unit describes the number of alerts of this type that are
# sent per time unit.  Valid time units are second, minute, hour, and day.
# Burst rates control the number of packets sent at a time
# For example:
# alert=FOO,10/min,5/sec
# Would allow 5 alerts per second, and 10 alerts total per minute.
# A throttle rate of 0 disables throttling of the alert.
# See the README for a list of alert types.
alert=NETSTUMBLER,10/min,1/sec
alert=WELLENREITER,10/min,1/sec
alert=LUCENTTEST,10/min,1/sec
alert=DEAUTHFLOOD,10/min,2/sec
alert=BCASTDISCON,10/min,2/sec
alert=CHANCHANGE,5/min,1/sec
alert=AIRJACKSSID,5/min,1/sec
alert=PROBENOJOIN,10/min,1/sec
alert=DISASSOCTRAFFIC,10/min,1/sec
alert=NULLPROBERESP,10/min,1/sec
alert=BSSTIMESTAMP,10/min,1/sec
alert=MSFBCOMSSID,10/min,1/sec
alert=LONGSSID,10/min,1/sec
alert=MSFDLINKRATE,10/min,1/sec
alert=MSFNETGEARBEACON,10/min,1/sec
alert=DISCONCODEINVALID,10/min,1/sec
alert=DEAUTHCODEINVALID,10/min,1/sec

# Known WEP keys to decrypt, bssid,hexkey.  This is only for networks where
# the keys are already known, and it may impact throughput on slower hardware.
# Multiple wepkey lines may be used for multiple BSSIDs.
# wepkey=00:DE:AD:C0:DE:00,FEEDFACEDEADBEEF01020304050607080900

# Is transmission of the keys to the client allowed?  This may be a security
# risk for some.  If you disable this, you will not be able to query keys from
# a client.
allowkeytransmit=true

# How often (in seconds) do we write all our data files (0 to disable)
writeinterval=300

# How old (and inactive) does a network need to be before we expire it?
# This is really only good for limited ram environments where keeping a
# total log of all networks is problematic.  This is in seconds, and should
# be set to a large value like 12 or 24 hours.  This is intended for use
# on stationary systems like an IDS
# logexpiry=86400

# Do we limit the number of networks we log?  This is for low-ram situations
# when tracking everything could lead to the system falling down.  This
# should be combined with a sane logexpiry value to flush out very old
# inactive networks.  This is mainly for stationary systems like an IDS.
# limitnets=10000

# Do we track IVs?  this can help identify some attacks, but takes a LOT
# of memory to do so on a busy network.  If you have the RAM, by all
# means turn it on.
trackivs=false

# Do we use sound?
# Not to be confused with GUI sound parameter, this controls wether or not the
# server itself will play sound.  Primarily for headless or automated systems.
sound=false
# Path to sound player
soundplay=/usr/bin/play
# Optional parameters to pass to the player
# soundopts=--volume=.3
# New network found
sound_new=//usr/share/kismet/wav/new_network.wav
# Wepped new network
# sound_new_wep=${prefix}/com/kismet/wav/new_wep_network.wav
# Network traffic sound
sound_traffic=//usr/share/kismet/wav/traffic.wav
# Network junk traffic found
sound_junktraffic=//usr/share/kismet/wav/junk_traffic.wav
# GPS lock aquired sound
# sound_gpslock=//usr/share/kismet/wav/foo.wav
# GPS lock lost sound
# sound_gpslost=//usr/share/kismet/wav/bar.wav
# Alert sound
sound_alert=//usr/share/kismet/wav/alert.wav

# Does the server have speech? (Again, not to be confused with the GUI's speech)
speech=false
# Server's path to Festival
festival=/usr/bin/festival
# Are we using festival lite?  If so, set the above "festival" path to also
# point to the "flite" binary
flite=false
# Are we using Darwin speech?
darwinsay=false
# What voice do we use?  (Currently only valid on Darwin)
speech_voice=default
# How do we speak?  Valid options:
# speech    Normal speech
# nato      NATO spellings (alpha, bravo, charlie)
# spell     Spell the letters out (aye, bee, sea)
speech_type=nato
# speech_encrypted and speech_unencrypted - Speech templates
# Similar to the logtemplate option, this lets you customize the speech output.
# speech_encrypted is used for an encrypted network spoken string
# speech_unencrypted is used for an unencrypted network spoken string
#
# %b is replaced by the BSSID (MAC) of the network
# %s is replaced by the SSID (name) of the network
# %c is replaced by the CHANNEL of the network
# %r is replaced by the MAX RATE of the network
speech_encrypted=New network detected, s.s.i.d. %s, channel %c, network encrypted.
speech_unencrypted=New network detected, s.s.i.d. %s, channel %c, network open.

# Where do we get our manufacturer fingerprints from?  Assumed to be in the
# default config directory if an absolute path is not given.
ap_manuf=ap_manuf
client_manuf=client_manuf

# Use metric measurements in the output?
metric=false

# Do we write waypoints for gpsdrive to load?  Note:  This is NOT related to
# recent versions of GPSDrive's native support of Kismet.
waypoints=false
# GPSDrive waypoint file.  This WILL be truncated.
waypointdata=%h/.gpsdrive/way_kismet.txt
# Do we want ESSID or BSSID as the waypoint name ?
waypoint_essid=false

# How many alerts do we backlog for new clients?  Only change this if you have
# a -very- low memory system and need those extra bytes, or if you have a high
# memory system and a huge number of alert conditions.
alertbacklog=50

# File types to log, comma seperated
# dump    - raw packet dump
# network - plaintext detected networks
# csv     - plaintext detected networks in CSV format
# xml     - XML formatted network and cisco log
# weak    - weak packets (in airsnort format)
# cisco   - cisco equipment CDP broadcasts
# gps     - gps coordinates
logtypes=dump,network,csv,xml,weak,cisco,gps

# Do we track probe responses and merge probe networks into their owners?
# This isn't always desireable, depending on the type of monitoring you're
# trying to do.
trackprobenets=true

# Do we log "noise" packets that we can't decipher?  I tend to not, since
# they don't have anything interesting at all in them.
noiselog=false

# Do we log corrupt packets?  Corrupt packets have enough header information
# to see what they are, but someting is wrong with them that prevents us from
# completely dissecting them.  Logging these is usually not a bad idea.
corruptlog=true

# Do we log beacon packets or do we filter them out of the dumpfile
beaconlog=true

# Do we log PHY layer packets or do we filter them out of the dumpfile
phylog=true

# Do we mangle packets if we can decrypt them or if they're fuzzy-detected
mangledatalog=true

# Do we do "fuzzy" crypt detection?  (byte-based detection instead of 802.11
# frame headers)
# valid option: Comma seperated list of card types to perform fuzzy detection
#  on, or 'all'
fuzzycrypt=wtapfile,wlanng,wlanng_legacy,wlanng_avs,hostap,wlanng_wext,ipw2200,ipw2915

# Do we do forgiving fuzzy packet decoding?  This lets us handle borked drivers
# which don't indicate they're including FCS, and then do.
fuzzydecode=wtapfile,radiotap_bsd_a,radiotap_bsd_g,radiotap_bsd_bg,radiotap_bsd_b,pcapfile

# Do we use network-classifier fuzzy-crypt detection?  This means we expect
# packets that are associated with an encrypted network to be encrypted too,
# and we process them by the same fuzzy compare.
# This essentially replaces the fuzzycrypt per-source option.
netfuzzycrypt=true

# What type of dump do we generate?
# valid option: "wiretap"
dumptype=wiretap
# Do we limit the size of dump logs?  Sometimes ethereal can't handle big ones.
# 0 = No limit
# Anything else = Max number of packets to log to a single file before closing
# and opening a new one.
dumplimit=0

# Do we write data packets to a FIFO for an external data-IDS (such as Snort)?
# See the docs before enabling this.
#fifo=/tmp/kismet_dump

# Default log title
logdefault=Kismet

# logtemplate - Filename logging template.
# This is, at first glance, really nasty and ugly, but you'll hardly ever
# have to touch it so don't complain too much.
#
# %n is replaced by the logging instance name
# %d is replaced by the current date as Mon-DD-YYYY
# %D is replaced by the current date as YYYYMMDD
# %t is replaced by the starting log time
# %i is replaced by the increment log in the case of multiple logs
# %l is replaced by the log type (dump, status, crypt, etc)
# %h is replaced by the home directory
# ie, "netlogs/%n-%d-%i.dump" called with a logging name of "Pok" could expand
# to something like "netlogs/Pok-Dec-20-01-1.dump" for the first instance and
# "netlogs/Pok-Dec-20-01-2.%l" for the second logfile generated.
# %h/netlots/%n-%d-%i.dump could expand to
# /home/foo/netlogs/Pok-Dec-20-01-2.dump
#
# Other possibilities:  Sorting by directory
# logtemplate=%l/%n-%d-%i
# Would expand to, for example,
# dump/Pok-Dec-20-01-1
# crypt/Pok-Dec-20-01-1
# and so on.  The "dump", "crypt", etc, dirs must exist before kismet is run
# in this case.
logtemplate=/var/log/kismet/%n-%d-%i.%l

# Where do we store the pid file of the server?
piddir=/var/run/

# Where state info, etc, is stored.  You shouldnt ever need to change this.
# This is a directory.
configdir=/var/lib/kismet/

# cloaked SSID file.  You shouldn't ever need to change this.
ssidmap=ssid_map

# Group map file.  You shouldn't ever need to change this.
groupmap=group_map

# IP range map file.  You shouldn't ever need to change this.
ipmap=ip_map


La verdad, no sé por que me da el error. De todas formas puedo usar kismet desde backtrack, solo que quería instalarla en ubuntu 12:10, pero me topé con ese error. Seguiré investigando.

Un saludo y gracias  :D
22  Seguridad Informática / Wireless en Linux / Kismet fatal illegal card source line "mon0" en: 3 Abril 2013, 17:56 pm
Hola

He buscado por varios sitios distintos solucion a mi problema, y he visto varias soluciones, pero a mí no me funciona ninguna de las que he visto, por eso acudo a este foro.

Mi problema es el siguiente. No puedo ejecutar kismet.

Poseo un dispositivo wifi usb Zydas.

Mis pasos son los siguientes:

1º Pongo a Zydas en modo monitor usando airmon-ng start wlan0 y lo compruebo de que así es el resultado.

root@neztgul-lnx:~# airmon-ng


Interface   Chipset      Driver

mon0      ZyDAS 1211   zd1211rw - [phy0]
wlan0      ZyDAS 1211   zd1211rw - [phy0]


Bien, ahora paso a ejecutar Kismet (no quiero configurarlo desde kismet.conf en source, prefiero hacerlo desde la terminal). En la terminal ejecuto:

kismet -c mon0

root@neztgul-lnx:~# kismet -c mon0
Launching kismet_server: //usr/bin/kismet_server
Suid priv-dropping disabled.  This may not be secure.
No specific sources given to be enabled, all will be enabled.
Non-RFMon VAPs will be destroyed on multi-vap interfaces (ie, madwifi-ng)
Enabling channel hopping.
Enabling channel splitting.
FATAL: Illegal card source line 'mon0'
Done
.

 :-\

He leído que antes (ya que ahora he visto vídeos y tal que con kismet -c  interfaz funciona perfectamente sin añadir nada más) se ejecutaba kismet -c DriverTarjeta,Interfaz,NombreTarjeta. Pero aún así también me falla.

root@neztgul-lnx:~# kismet -c zd1211rw mon0 ZyDAS 1211
Launching kismet_server: //usr/bin/kismet_server
Suid priv-dropping disabled.  This may not be secure.
No specific sources given to be enabled, all will be enabled.
Non-RFMon VAPs will be destroyed on multi-vap interfaces (ie, madwifi-ng)
Enabling channel hopping.
Enabling channel splitting.
FATAL: Illegal card source line 'zd1211rw'
Done.
      >:(

Espero que me podáis ayudar, os lo agradecería muchísimo. Un saludo a todos

Muchas Gracias  :P
 


23  Seguridad Informática / Hacking / Re: Extraer un PDF de un .pcap en: 11 Marzo 2013, 17:03 pm
Citar
buenas, no se si te servirá pero seria interesante que intentases abrir el pdf corrupto con peepdf, http://eternal-todo.com/tools/peepdf-pdf-analysis-tool, quizas puedas obtener algo más. un saludo y suerte

Hola Finfano, muchísimas gracias por tu respuesta pero no me ayudó, estuve dandole caña al tema pero no logré sacar nada en claro..aun así es una buena herramienta, gracias.

Morodog, probaré la herramienta y ya os cuento.

Gracias!
24  Seguridad Informática / Hacking / Extraer un PDF de un .pcap en: 8 Marzo 2013, 12:01 pm
Hola buenas,

Estoy un poco atascado en un punto y agradezco toda la ayuda necesaria.

Vereis, he capturado el tráfico de una red mediante Wireshark. El tráfico capturado lo he almacenado como .pcap y ahora me disponía a realizar un análisis forense del mismo.

He obtenido un correo en el cual se adjunta un archivo .pdf que para el caso es de vital importancia.

He conseguido extraer el .pdf con el software que conocereís como tcpxtract pero no me deja abrirlo indicandome de que el fichero está dañado o o codificado al ser un fichero de correo.

Con wireshark puedo obtener "el código" del pdf pero nada más.

Ahora os pregunto, a alguno de ustedes se os ocurre alguna forma de hacer "legible" el contenido de ese PDF? Ideas, sugerencias..

Muchas gracias, un saludo.

Ntl
25  Informática / Hardware / Re: Bios no reconoce SSD en: 9 Enero 2013, 18:29 pm
Hola Simorg, muchas gracias por contestar

Citar
Probablemente la incompatibilidad sea entre el Chipset de tu placa base y el Chipset de la PCB de tu SSD.

Ajá, bastante más claro todo.

Citar
Una prueba que podrias realizar es probar ese SSD en otra placa igual que la tuya, alguien que tuviera una, si tampoco funciona en esa, esta sería la causa probable

Pues la verdad es que no, pero como ya la he probado en 5 placas distintas y en 2 portatiles y funciona de lujo, concluyo que es el chipset de mi placa.

Citar
Si fuera así, no tiene solución, solo te quedaría usarlo con adaptador por USB

Bueno bueno....en el curro acabo de obtenernuna crosshair v formula y lo detecta de lujo...así que.. Jaja :laugh:

Hola aprendiz- oscuro,

Citar
Si dices que has comprobado todo lo comentado...  (y teniendo en cuenta que tanto BIOS de esa placa base y firmware del SSD están en ultima version)

Lo he probado TODO, y muchas de  las cosas ya las había probado antes de postear aquí...y vine aquí en busca de nuevas ideas... Y reprobar lo que me aconsejais... :silbar:

Citar
Podrias haberte ido a por un Samsung 830 o a por un Crucial M4 con firm actualizado. Son unidades SSD a tener en cuenta en cuanto a fiabilidad y rendimiento (aunque se han visto algun que otro caso de problemilla con unidades crucial M4 en cuanto a rendimiento se refiere)

Podría, pero fue un regalo de reyes, y los OCZ  también son muy buenos.

Lo dicho muchas gracias compañeros por vuestra ayuda, como siempre un placer sacar las cosas adelante con vuestros consejos.

Hasta el proximo desafío informático!
26  Informática / Hardware / Re: Bios no reconoce SSD en: 8 Enero 2013, 21:03 pm
Aprendiz-oscuro, te puedo asegurar que he probado y bien probado todo lo que comentas. De echo, mi pareja que es de la profesión también probó el equipo por si yo me había saturado y había pasado algo por alto y nada.

El firmware del SSD viene por defecto actualizado a la ultima versión, la 1.5, ya lo he comprobado mediante el tolbox bajo linux.

Creo que es algo de incompatibilidad con mi placa pero no se exactamente donde está el problema.

Lo de pcie decente tienes toda la razón, es la única manera real de aprovechar la potencia de un ssd  :P.

Saludos y gracias por tu tiempo.
27  Informática / Hardware / Re: Bios no reconoce SSD en: 8 Enero 2013, 10:23 am
Citar
El vertex 4 tiene jumpers (creo), a lo mejor tienes que ponerlo para que funcione bien en SATA2 en un sitio específico

El vertex 4 no tiene jumper

Saludos y gracias  :)
28  Informática / Hardware / Re: Bios no reconoce SSD en: 7 Enero 2013, 23:52 pm
He visto ese tema que comentas, pero creo que no es el mismo caso, tal vez me he explicado mal. Veamos:

Yo tengo 2 dispositivos de almacenamiento, un HDD sata de 7200rpm seagate, y un SSD vertex 4 sata de 128GB nuevo.

El HDD conectado a placa funciona perfectamente, ningún problema, ni en bios ni en windows. Quito el HDD, y conecto con los mismos cables y mismo puerto el SSD. No se reconoce en BIOS. Conecto la lectora SATA, el HDD SATA y el SSD SATA y el único que no se reconoce es el SSD.

El manual ya lo he visto varias veces, te explica el tema de los jumpers y lo típico de los puertos SATA, nada que indice ni oriente al posible fallo.

De jumpers no es el problema, ya que es quitar un HDD que la BIOS lo detecta de lujo y poner con todo igual el SSD y nada, y el ssd no tiene jumpers. En 3 ordenadores distintos se detecta el SSD perfectamente.

Saludos
29  Informática / Hardware / Re: Bios no reconoce SSD en: 7 Enero 2013, 23:21 pm
Citar
Placa base Crosshair formula II por lo que comentaste.

Correcto

Citar
Lo primero seria en que puertos SATA lo has probado

Lo he probado en los 4 puertos SATA principales ( los azules) y en los 2 negros.

Citar
mirar en BIOS el modo en el que lo tienes puesto

Lo tengo modo IDE. Pero tampoco lo detecta ni en modo RAID, ni AHCI.

Citar
Comprueba cableado de alimentacion y datos.

Lo he probado con 6 cables SATA, 3 de ellos rojos y 3 negros xD. Con el mismo cable SATA del SSD conecté un HDD y sí tiró. IDEM para el cableado de alimentación.

Citar
Con respecto a BIOS, comentaste que la tenias actualizada.

Correcto

Mi pareja lo acaba de probar en su placa como interno, y lo pilla de primeras en la BIOS.

Algo bastante raro hay no se si será algún dispositivo que entre en conflicto o yo que se.... lo he probado hasta sin gráfica, sin ningún otro SATA conectado.. yo ya no se que más probar.

Saludos y gracias.
30  Informática / Hardware / Bios no reconoce SSD en: 7 Enero 2013, 16:28 pm
Bueno pues la cosa hoy esta bastante gafada...después de solucionar lo de la gráfica pasa lo del SSD. SSD vertex 4 128gb. Mi placa Crosshair 2 formula no la detecta en BIOS. En ningún sata 2, ni cargando la bios por defecto. NADA. De forma externa por usb sin problemas.

Tanto en un portátil internamente como en otro pc funcionan internamente, pero no en mi placa...

En fin...a ver como lo soluciono, porque funcionar funciona.

Destaco que he probado con cables satas distintos y en distintos puertos de la misma placa y nada...
Páginas: 1 2 [3] 4 5 6 7 8 9
WAP2 - Aviso Legal - Powered by SMF 1.1.21 | SMF © 2006-2008, Simple Machines