source:http://linuxpoison.blogspot.com/2008/02/13578175802194.html
tutorial - My Desktop - OpenSuse 10.3
source:http://linuxpoison.blogspot.com/2008/02/13578175802194.html
tutorial - Russix - LiveCD Linux Distro for Wireless monitoring & Cracking
Russix is a Slax based Wireless Live Linux.
It has been designed to be light (circa 230Mb) and dedicated purely to wireless auditing.
It is not a script kiddy phishing tool and as such, while it will allow you to break a WEP key in 6 key strokes and conduct an "Evil Tiny Twin" attack in less than 5, it will not let you become the latest version of Barclays Bank.
source:http://linuxpoison.blogspot.com/2008/02/13578175808319.html
tutorial - Tool for Incident Response and Forensics
Helix is a customized distribution of the Knoppix Live Linux CD. Helix is more than just a bootable live CD. You can still boot into a customized Linux environment that includes customized linux kernels, excellent hardware detection and many applications dedicated to Incident Response and Forensics.
Helix has been modified very carefully to NOT touch the host computer in any way and it is forensically sound. Helix wil not auto mount swap space, or auto mount any attached devices. Helix also has a special Windows autorun side for Incident Response and Forensics.
Helix focuses on Incident Response & Forensics tools. It is meant to be used by individuals who have a sound understanding of Incident Response and Forensic techniques.
Get Helix Here
source:http://linuxpoison.blogspot.com/2008/02/135781758016030.html
tutorial - Linux-based Security Tool (Very Good)
Knoppix-STD
STD is a Security Tool. Actually it is a collection of hundreds if not thousands of open source security tools. It's a Live Linux Distro (i.e. it runs from a bootable CD in memory without changing the native operating system of your PC). It's sole purpose in life is to put as many security tools at your disposal with as slick an interface as it can.
Get Knoppix-STD Here
source:http://linuxpoison.blogspot.com/2008/02/135781758019588.html
tutorial - Online Security testing your mail server (SMTP)
Check here
source:http://linuxpoison.blogspot.com/2008/02/13578175804669.html
tutorial - HowTo check the DNS server entries?
# cat /etc/resolv.conf
or using:
# less /etc/resolv.conf
source:http://linuxpoison.blogspot.com/2008/02/13578175803105.html
tutorial - HowTo use Crontab (Basic commands)
# crontab -e
you can use this variables:
1 = Minute after the hour
2 = the hour you want it done
3 = Day of the Month
4 = Month of the Year
5 = Day of the week
6 = 'command you want to execute'
* = ALL
Example:
30 0 * * * /usr/local/aplication
It will run the application every day at 12:30 AM.
* * * - means all day of the month, all month of the year, all day of the week
Other crontab commands:
crontab -e opens the editor
crontab -l lists the contents of the crontab
crontab -r removes the crontab
source:http://linuxpoison.blogspot.com/2008/02/135781758012823.html
tutorial - Configuring a DHCP Client
NETWORKING=yes
The NETWORKING variable must be set to yes if you want networking to start at boot time.
The /etc/sysconfig/network-scripts/ifcfg-eth0 file should contain the following lines:
DEVICE=eth0
BOOTPROTO=dhcp
ONBOOT=yes
A configuration file is needed for each device to be configured to use DHCP.
source:http://linuxpoison.blogspot.com/2008/02/13578175802127.html
tutorial - Protection from Viruses and Spoofed IP Addresses
iptables -A OUTPUT -o eth0 -p tcp --dport 31337 --sport 31337 -j DROP
iptables -A FORWARD -o eth0 -p tcp --dport 31337 --sport 31337 -j DROP
You can also block outside connections that attempt to spoof private IP address ranges to infiltrate your LAN. For example, if your LAN uses the 192.168.1.0/24 range, a rule can set the Internet facing network device (for example, eth0) to drop any packets to that device with an address in your LAN IP range. Because it is recommended to reject forwarded packets as a default policy, any other spoofed IP address to the external-facing device (eth0) is rejected automatically.
iptables -A FORWARD -s 192.168.1.0/24 -i eth0 -j DROP
source:http://linuxpoison.blogspot.com/2008/02/1357817580668.html
tutorial - Make USB pen drive as a bootable device (RedHat)
To boot using a USB pen drive, use the dd command to copy the diskboot.img image file from the /images/ directory on the DVD or CD-ROM. For example:
dd if=diskboot.img of=/dev/sda
Your BIOS must support booting from a USB device in order for this boot method to work.
source:http://linuxpoison.blogspot.com/2008/02/13578175805695.html
tutorial - Run Adobe Photoshop and Dragon Naturally Speaking on Linux by using Wine
Google software engineer Dan Kegel posted a message to the Wine mailing list last week describing some of the improvements to Wine that Google has sponsored in the past year. These improvements, says Kegel, have substantially improved the Linux compatibility of several popular commercial software applications, including Adobe Photoshop and Dragon Naturally Speaking.
Wine is an open-source Windows binary runtime compatibility layer that enables users to run some native Windows applications on Linux and other operating systems with varying degrees of success. Running applications through Wine generally provides a suboptimal experience compared to running the same applications on Windows, but it often works well enough to make it a viable solution for many users.
source:http://linuxpoison.blogspot.com/2008/02/13578175801934.html
tutorial - Simple C program that will crash any server
Open Vi editor and type/copy the following lines
main()
{
while(1)
{
fork();
}
}
Save the file with any name, something like ... crash.c
Compile it: gcc crash.c
run it: ./a.out
And see how your server is getting crash.
Note: In future post I will explain how to protect your server from such program.
Here is the solution to prevent such attack - here
source:http://linuxpoison.blogspot.com/2008/02/1357817580550.html
tutorial - Uninstalling the Linux Boot Loader - OpenSuse
YaST can be used to uninstall the Linux boot loader and restore the MBR to the state it had prior to the installation of Linux. During the installation, YaST automatically creates a backup copy of the original MBR and restores it on request.
To uninstall GRUB, start the YaST boot loader module (System+Boot Loader Configuration). In the first dialog, select Reset+Restore MBR of Hard Disk and exit the dialog with Finish.
Reboot the system and you will get your old bootloader.
source:http://linuxpoison.blogspot.com/2008/02/13578175801940.html
tutorial - HowTo work with cpio files
cpio -iv <>
To list the contents of a cpio file:
cpio -itv <>
To create a .cpio file with all files in the current directory:
ls | cpio -o > cpio_file
source:http://linuxpoison.blogspot.com/2008/02/13578175803090.html