The bmannconsulting.com website

dns323

Changed files
+11 -3
_notes
assets
+11 -3
_notes/DNS 323.md
···
- NAS
- D-Link
---
-
An old D-Link product that I used to run a lot of things on my [[Home Lab]].
+
An old D-Link product that I used to run a lot of things on my [[Home Lab]], an early home NAS that was hackable to run a few other things.
-
I dragged it out for the [[Z-Space Electronics Bazaar]]
+
![DLink NAS DNS 323 Front](/assets/2025/DNS_323_A1.png)
+
![DLink NAS DNS 323 Back](/assets/2025/DNS_323_Back.png)
+
Here's the [original product page](https://www.dlink.com/uk/en/products/dns-323-sharecenter-2-bay-network-storage-enclosure) and the [legacy product page](https://legacy.us.dlink.com/pages/product.aspx?id=dab7c4098c6a49789a2c7386fdfffd0b) showing May 2013 as its end of life date, and original [datasheet PDF](https://www.dlink.com/uk/en/-/media/consumer_products/dns/dns-323/datasheet/dns_323_datasheet_en_uk.pdf).
-
[Datasheet PDF](https://www.dlink.com/uk/en/-/media/consumer_products/dns/dns-323/datasheet/dns_323_datasheet_en_uk.pdf)
+
I dragged it out for the [[Z-Space Electronics Bazaar]], but didn't get rid of it because I needed to hook it up and see what was on the drives / wipe the drives. It has two 2TB drives, setup as mirrored RAID1.
+
+
Got it on the Z-Space network and it popped right up, and used my old-forever-password for the admin luckily!
+
+
I guess i went pretty deep into this before, putting some custom boot loaders with [fun_plug](http://dns323.kood.org/howto:fun_plug) that I vaguely remember. The backup files have dates around [[2011]] - [[2012]] - [[2013]].
+
+
Also, looks like I was using "bare" SMTP user/pass for my old gmail account, which might be the vector for how that account was hacked.
assets/2025/DNS_323_A1.png

This is a binary file and will not be displayed.

assets/2025/DNS_323_Back.png

This is a binary file and will not be displayed.