Linux and Unix

Page 1 of 212

Cheat sheet : Installing Snorby 2.2 with Apache2 and Suricata with Barnyard2 on Ubuntu 10.x

After spending a few hours fighting a battle against Snorby and Apache2 + Passenger, I finally managed to get it to run properly on my Ubunty 10.x box (32bit). Looking back, I figured I might not be the only one who is having issues with this.

So I decided to publish the notes I took while setting everything up, and as a little bonus, explain how to install and configure Suricata as well (configured in combination with barnyard2 which will pick up local logs and send them to the remote MySQL server).
Continue reading

Backtrack 4 cheat sheet

Download backtrack from http://www.remote-exploit.org/backtrack_download.html. Current version at the time of writing is BT4 Pre-Final.This document is based on BT4 pre-final. Ergo, some of the instructions below may not work with other versions of BT. FYI : An excellent guide about Backtrack4 can be found at BackTrack 4 – The Definitive Guide    1. Installing Backtrack […]

Cheatsheet : Cracking WPA2 PSK with Backtrack 4, aircrack-ng and John The Ripper

Basic steps : Put interface in monitor mode Find wireless network (protected with WPA2 and a Pre Shared Key) Capture all packets Wait until you see a client and deauthenticate the client, so the handshake can be captured Crack the key using a dictionary file (or via John The Ripper)   I’ll use a Dlink […]

Cheatsheet : Cracking WEP with Backtrack 4 and aircrack-ng

I know, there a probably already a zillion number of websites that show how to crack WEP. So I guess this will be website zillion+1 learning how to audit your own WEP security. To be honest, the main reason I’m putting this info on this blog because I just wanted it as a quick reference- […]

Nessus/OpenVAS wrapper for ike-scan

ike-scan is a great tool to audit VPN/IPSec implementations.  This tool, which runs under Lunix, Unix, MacOS and Windows, can be found at www.nta-monitor.com/tools/ike-scan/ (Latest version at time of writing is 1.9). My Nessus ike-scan NASL wrapper may or may not work with earlier versions or newer versions, so test test test) Some of the […]

Getting connected to the internet over IPv6 using Juniper/screenos

It started snowing today, so I guessed it would be the perfect timing to write a quick and dirty howto on getting connected to the internet over IPv6, using a Juniper ssg5.  I’ll also discuss the easy steps to configure Windows and Linux clients for IPv6 and access to the internet. Before looking at the […]

Using Fedora 9 as an OSPF / BGP router (Quagga / Zebra) and set up BGP between Linux and Juniper ScreenOS

In this post, I’m going to show you how to set up a Linux host (Fedora Core 9) and use it as a BGP enabled router.  In order to fully understand the setup & configuration, please have a look at this blog post first, because I’ll use the setup in that post as a foundation […]

Creating and installing lzm modules in Backtrack 2

Today, I will explain how you can create your own lzm modules & patch the backtrack 2 final ISO file (by adding your new module). First of all, get a fresh copy of the bt2final.iso file from http://www.remote-exploit.org/backtrack_download.html Write the ISO file to a CD and boot from the CD. This will load the bt2final […]

Connect to Openfiler SAN using CHAP authentication (MS iSCSI Initiator)

Assuming that you’ve made yourself familiar with the procedure on how to allow/deny access to a specific lun based upon IP addresses, then you might have wondered if you can secure access to a LUN even more. After all, spoofing an IP address is not that hard to do, and if IP based ACL is […]

Bind network interfaces on Linux for redundancy, load balancing and performance

If you have multiple network interfaces in your linux machine (and ideally they have the same speed & duplex), you may want to ‘bind’ the adapters together to increase bandwidth and create some redundancy. Before going into the details on how to set this up under Fedora/Openfiler/other… linux flavors, I’d like to give some info […]

Page 1 of 212

Demand Global Change

The world needs your help !

Please take a few moments to read the "Demand Global Change Call For Action" document at
http://bit.ly/demandglobalchange
Read the full document at
http://bit.ly/demandglobalchange_full and share the message with as many people as possible.

Like the Facebook page, and SHARE it with everyone you know.



Donate

Want to support the Corelan Team community ? Click here to go to our donations page.

Want to donate BTC to Corelan Team?



Your donation will help funding server hosting.

Protected by Copyscape Web Plagiarism Tool

Corelan Team Merchandise

You can support Corelan Team by donating or purchasing items from the official Corelan Team merchandising store.

Corelan Live training

Since 2011, Corelan GCV has been teaching live win32 exploit dev classes at various security cons and private companies & organizations.

You can read more about the training and schedules here

Corelan on IRC

You can chat with us and our friends on #corelan (freenode IRC)

Categories