Monthly Archives: August 2007

Creating and installing lzm modules in Backtrack 2

Today, I will explain how you can create your own lzm modules & patch the backtrack 2 final ISO file (by adding your new module). First of all, get a fresh copy of the bt2final.iso file from http://www.remote-exploit.org/backtrack_download.html Write the ISO file to a CD and boot from the CD. This will load the bt2final […]

How to manually install Dameware Remote client

Manual Installation Instructions: You can manually install the Dameware Mini Remote Control Client Agent Service (DWRCS.EXE) on any machine, by simply coping the required files to the appropriate directory on the remote machine, and then executing a simple command to install the Client Agent as a Service. Copy the following files from your DameWare Development […]

Connect to Openfiler SAN using CHAP authentication (MS iSCSI Initiator)

Assuming that you’ve made yourself familiar with the procedure on how to allow/deny access to a specific lun based upon IP addresses, then you might have wondered if you can secure access to a LUN even more. After all, spoofing an IP address is not that hard to do, and if IP based ACL is […]

Bind network interfaces on Linux for redundancy, load balancing and performance

If you have multiple network interfaces in your linux machine (and ideally they have the same speed & duplex), you may want to ‘bind’ the adapters together to increase bandwidth and create some redundancy. Before going into the details on how to set this up under Fedora/Openfiler/other… linux flavors, I’d like to give some info […]

Running Snort with Dynamic IP on Fedora

One of my Linux boxes has a direct cable connection to the internet. I’ve been using Snort in corporate environments for a long time now, but I never had to configure snort to look at interfaces that have a DHCP assigned IP address and actually use that IP address as its HOME_NET. There’s an easy […]

How to mount an Openfiler snapshot in Windows

After playing with Openfiler for a while, I started wondering how I could get access to a snapshot that was created with Openfiler. This is how it works (according to me, I just hope Openfiler and iSCSI Enterprise Target find another way to make this easier) On one of my LUN’s, I have created a […]

Build a free SAN with Openfiler

After playing with iSCSI Enterprise Target for a while, I decided to have a look at some other solutions as well. I’m not saying that iSCSI Enterprise Target is not a stable and mature solution, but it lacks some important features (such as snapshots). I came across OpenFiler which seems to be a good (free) […]

Connect to an iSCSI SAN from Windows

In a previous post, I’ve shown how to set up a Linux based SAN solution, based upon Fedora Core 6 and the free iSCSI Enterprise Target tool. In this post, I’ll show how to connect to the SAN from Windows First, make sure you have the Microsoft iSCSI initiatior software loaded onto your system. The […]

Create a free SAN on Fedora Core 6

While setting up the basic infrastructure for my VMWare environment, I wondered if it would be possible to emulate a SAN on a Linux box, for free. And as a matter of fact, it is possible. I stumbled across the iSCSI Target project on sourceforge which was built to do exactly that. In this post, […]

Demand Global Change

The world needs your help !

Please take a few moments to read the "Demand Global Change Call For Action" document at
http://bit.ly/demandglobalchange
Read the full document at
http://bit.ly/demandglobalchange_full and share the message with as many people as possible.

Like the Facebook page, and SHARE it with everyone you know.



Donate

Want to support the Corelan Team community ? Click here to go to our donations page.

Want to donate BTC to Corelan Team?



Your donation will help funding server hosting.

Protected by Copyscape Web Plagiarism Tool

Corelan Team Merchandise

You can support Corelan Team by donating or purchasing items from the official Corelan Team merchandising store.

Corelan Live training

Since 2011, Corelan GCV has been teaching live win32 exploit dev classes at various security cons and private companies & organizations.

You can read more about the training and schedules here

Corelan on IRC

You can chat with us and our friends on #corelan (freenode IRC)

Categories