Posts

Showing posts from July, 2012

Install VNC server on Backtrack

I need Backtrack remote desktop for my work. So i choose VNC.
On backtrack, install VNC server:
apt-get install vnc4server
vncserver
set your password.

Edit file: /root/.vnc/xstartup
 #!/bin/sh

# Uncomment the following two lines for normal desktop:
# unset SESSION_MANAGER
# exec /etc/X11/xinit/xinitrc

#[ -x /etc/vnc/xstartup ] && exec /etc/vnc/xstartup
#[ -r $HOME/.Xresources ] && xrdb $HOME/.Xresources
#xsetroot -solid grey
#vncconfig -iconic &
#x-terminal-emulator -geometry 80×24+10+10 -ls -title “$VNCDESKTOP Desktop” &
#x-window-manager &

xrdb $HOME/.Xresources
xsetroot -solid grey
x-terminal-emulator -geometry 80×24+10+10 -ls -title “$VNCDESKTOP Desktop” &
gnome-session &


On client, use VNC viewer connect to server: [IP]:[Port], port start at 5901.
Ex: 192.168.1.1:5901
Connect and use it

------------------------------------------------------------
Thanks for reading
--------------------------------------------------------------------------
Security Research

Fix aireplay can not change channel error

When i was using aireplay to spoof packet, i got one error:
aireplay-ng: Wouldn't false authenticate OR deauth = mon0 is on channel -1, but the AP uses channel 11
and airodump is:
airodump-ng: Fixed channel to -1 = fixed channel mon0: -1
So, i fixed it :D. This is instructor:

wget http://www.orbit-lab.org/kernel/compat-wireless-3-stable/v3.5/compat-wireless-3.5-rc5-1.tar.bz2
tar -jxf compat-wireless-2010-10-16.tar.bz2 cd compat-wireless-2010-10-16
wget http://patches.aircrack-ng.org/mac80211.compat08082009.wl_frag+ack_v1.patch
patch -p1 < mac80211.compat08082009.wl_frag+ack_v1.patch
wget http://patches.aircrack-ng.org/channel-negative-one-maxim.patch
patch ./net/wireless/chan.c channel-negative-one-maxim.patch
make
make install
make unload
reboot

After reboot, you can change mon0 interface channel: ( 1 to 11)
airmon-ng start wlan0 11

------------------------------------------------------------
Thanks for reading
--------------------------------------------------------…

Fix conky color - Segmentation fault (core dumped) in Ubuntu 12.04

When i install conky in Ubuntu 12.04, i got one error:
$ conky Conky: desktop window (c00021) is subwindow of root window (15d) Conky: window type - desktop Conky: drawing to created window (0x2a00001) Conky: drawing to double buffer Segmentation fault (core dumped) That is conky 1.8 conflict with Ubuntu 12.04, so, i fixed with this instructor:
1) Install an run Synaptic package manager (synaptic).
2) Using synaptic, enable the precise-backports repository (Settings > Repositories > Updates). Then hit the Reload button.
3) Using synaptic, search for package "conky-std". Left-click on it, then Package > Force Version > select the version from precise-backports.
4) Hit "Apply" to install the update.
Finally, run `conky --version` from the terminal to verify that you're running the right version. If 1.9 is ok. Conky command normally
------------------------------------------------------------
Thanks for reading
-------------------------------------…

Python script to check network connection

I need one script to check my network, because it usually down. So code little python script :)

import winsound
import urllib2
import time
def internet_on():
    try:
        response=urllib2.urlopen('http://74.125.113.99',timeout=1)
        return True
    except urllib2.URLError as err: pass
    return False

while 1:
    if internet_on() == 1:
        print "Network on"
    else:
        print "Network off"
        winsound.Beep(500,500)
    time.sleep(5)
    pass
------------------------------------------------------------
Thanks for reading
--------------------------------------------------------------------------
Security Research
All my Lab:
Linux Lab -- window and Cisco Lab
to be continued - I will update more.

SSH with Public key ( Using putty)

Image
------------------------------------------------------------
Thanks for reading
--------------------------------------------------------------------------
Security Research
All my Lab:
Linux Lab -- window and Cisco Lab
to be continued - I will update more.

Pass The Hash attack

Image
Pass the hash attack: Using to privilege escalation. After you had hash password ( via exploit browser, file format etc, you can access sam file, or using fgdump)
You can use hash password to login smb, using psexe. Now you can login with other account, etc Administrator. So from normal user like limited user, you became Administrator:


------------------------------------------------------------
Thanks for reading
--------------------------------------------------------------------------
Security Research
All my Lab:
Linux Lab -- window and Cisco Lab
to be continued - I will update more.