Posts

Showing posts from July, 2012

Install VNC server on Backtrack

I need Backtrack remote desktop for my work. So i choose VNC. On backtrack, install VNC server: apt-get install vnc4server vncserver set your password. Edit file: /root/.vnc/xstartup  #!/bin/sh # Uncomment the following two lines for normal desktop: # unset SESSION_MANAGER # exec /etc/X11/xinit/xinitrc #[ -x /etc/vnc/xstartup ] && exec /etc/vnc/xstartup #[ -r $HOME/.Xresources ] && xrdb $HOME/.Xresources #xsetroot -solid grey #vncconfig -iconic & #x-terminal-emulator -geometry 80×24+10+10 -ls -title “$VNCDESKTOP Desktop” & #x-window-manager & xrdb $HOME/.Xresources xsetroot -solid grey x-terminal-emulator -geometry 80×24+10+10 -ls -title “$VNCDESKTOP Desktop” & gnome-session & On client, use VNC viewer connect to server: [IP]:[Port], port start at 5901. Ex: 192.168.1.1:5901 Connect and use it ------------------------------------------------------------ Thanks for reading ----------------------------------------------------------------

Fix aireplay can not change channel error

When i was using aireplay to spoof packet, i got one error: aireplay-ng: Wouldn't false authenticate OR deauth = mon0 is on channel -1, but the AP uses channel 11 and airodump is: airodump-ng: Fixed channel to -1 = fixed channel mon0: -1 So, i fixed it :D. This is instructor: wget http://www.orbit-lab.org/kernel/compat-wireless-3-stable/v3.5/compat-wireless-3.5-rc5-1.tar.bz2 tar -jxf compat-wireless-2010-10-16.tar.bz2 cd compat-wireless-2010-10-16 wget http://patches.aircrack-ng.org/mac80211.compat08082009.wl_frag+ack_v1.patch patch -p1 < mac80211.compat08082009.wl_frag+ack_v1.patch wget http://patches.aircrack-ng.org/channel-negative-one-maxim.patch patch ./net/wireless/chan.c channel-negative-one-maxim.patch make make install make unload reboot After reboot, you can change mon0 interface channel: ( 1 to 11) airmon-ng start wlan0 11 ------------------------------------------------------------ Thanks for reading ----------------------------------

Fix conky color - Segmentation fault (core dumped) in Ubuntu 12.04

When i install conky in Ubuntu 12.04, i got one error: $ conky Conky: desktop window (c00021) is subwindow of root window (15d) Conky: window type - desktop Conky: drawing to created window (0x2a00001) Conky: drawing to double buffer Segmentation fault (core dumped)   That is conky 1.8 conflict with Ubuntu 12.04, so, i fixed with this instructor: 1) Install an run Synaptic package manager (synaptic). 2) Using synaptic, enable the precise-backports repository (Settings > Repositories > Updates). Then hit the Reload button. 3) Using synaptic, search for package "conky-std". Left-click on it, then Package > Force Version > select the version from precise-backports. 4) Hit "Apply" to install the update. Finally, run `conky --version` from the terminal to verify that you're running the right version. If 1.9 is ok. Conky command normally ------------------------------------------------------------ Thanks for reading --------------------

Python script to check network connection

I need one script to check my network, because it usually down. So code little python script :) import winsound import urllib2 import time def internet_on():     try:         response=urllib2.urlopen('http://74.125.113.99',timeout=1)         return True     except urllib2.URLError as err: pass     return False while 1:     if internet_on() == 1:         print "Network on"     else:         print "Network off"         winsound.Beep(500,500)     time.sleep(5)     pass ------------------------------------------------------------ Thanks for reading -------------------------------------------------------------------------- Security Research All my Lab: Linux Lab -- window and Cisco Lab to be continued - I will update more.  

SSH with Public key ( Using putty)

Image
------------------------------------------------------------ Thanks for reading -------------------------------------------------------------------------- Security Research All my Lab: Linux Lab -- window and Cisco Lab to be continued - I will update more.  

Pass The Hash attack

Image
Pass the hash attack: Using to privilege escalation. After you had hash password ( via exploit browser, file format etc, you can access sam file, or using fgdump) You can use hash password to login smb, using psexe. Now you can login with other account, etc Administrator. So from normal user like limited user, you became Administrator: ------------------------------------------------------------ Thanks for reading -------------------------------------------------------------------------- Security Research All my Lab: Linux Lab -- window and Cisco Lab to be continued - I will update more.