Download backtrack from http://www.remote-exploit.org/backtrack_download.html. Current version at the time of writing is BT4 Pre-Final.This document is based on BT4 pre-final. Ergo, some of the instructions below may not work with other versions of BT.
FYI : An excellent guide Read more
Basic steps :
I know, there a probably already a zillion number of websites that show how to crack WEP.
So I guess this will be website zillion+1 learning how to audit your own WEP security. To be honest, the main reason Read more
ike-scan is a great tool to audit VPN/IPSec implementations. This tool, which runs under Lunix, Unix, MacOS and Windows, can be found at www.nta-monitor.com/tools/ike-scan/ (Latest version at time of writing is 1.9). My Nessus ike-scan NASL wrapper may Read more
It started snowing today, so I guessed it would be the perfect timing to write a quick and dirty howto on getting connected to the internet over IPv6, using a Juniper ssg5. I’ll also discuss the easy steps to Read more
In this post, I’m going to show you how to set up a Linux host (Fedora Core 9) and use it as a BGP enabled router.
In order to fully understand the setup & configuration, please have a look Read more
Today, I will explain how you can create your own lzm modules & patch the backtrack 2 final ISO file (by adding your new module).
First of all, get a fresh copy of the bt2final.iso file from http://www.remote-exploit.org/backtrack_download.html
Write Read more
Assuming that you’ve made yourself familiar with the procedure on how to allow/deny access to a specific lun based upon IP addresses, then you might have wondered if you can secure access to a LUN even more. After all, Read more
If you have multiple network interfaces in your linux machine (and ideally they have the same speed & duplex), you may want to ‘bind’ the adapters together to increase bandwidth and create some redundancy.
Before going into the details Read more