Posts Tagged 'Security'

RetroShare is a cross-platform application for sharing files across the network F2F , which is considered very safe as it authenticates with GPG and you are connecting through an ssh tunnel . On the site official , there are ready made ​​packages for different distributions. In the specific case Debian, there is only 32bit package for Squeeze, since I use Sid amd64, I had to arrange:

wget http://ppa.launchpad.net/csoler-users/retroshare-snapshots/ubuntu/pool/main/r/retroshare/retroshare_0.5.3-0.5256~oneiric_amd64.deb

sudo dpkg-i-retroshare_0.5.3 0.5256 ~ oneiric_amd64.deb

once you start the configuration is intuitive.

enjoy ;)

Share on Tumblr http://img337.imageshack.us/img337/4888/retroshare.png Digg This Submit to reddit Share
Tags: ,

Comments 2 Comments »

I had already spoken in the past of ExifTool , a tool that is used to extract all the exif data from a photo. In the repo there are definitely other programs to get the exif data, but this is what I use for a few years now and I got affezzionato. In my repository packages are ready:

Download amd64

Download i386

enjoy ;)

Share on Tumblr http://www.edmondweblog.com/wp-includes/images/smilies/icon_wink.gif Digg This Submit to reddit Share
Tags: , , ,

Comments No Comments »

In recent times happen to have USB flash drives or hard drives in abundance, and then not be able to use them. Sometimes you give away or sell these drives, and as a matter of safety, it would be best to make sure that no one is fun to recall some personal information. It 'been shown that more than 30% of all PCs connected to the Internet every day, surfing on porn sites, saving photos and videos filthy, how does picchiopc . So the goal is to make life difficult for those who want to peek into other people's habits :) Once you have identified the disk to be formatted, the command is simple:

  $ Sudo dd if = / dev / zero of = / dev / sdX 

enjoy ;)

Share on Tumblr http://img268.imageshack.us/img268/8607/harddiskhot.png Digg This Submit to reddit Share
Tags: , ,

Comments 18 Comments »

Place in a single CD / DVD or USB flash drive, multiple operating systems, can be very convenient, both in terms of the savings of the same CD / DVD either because you will have at your fingertips, all the tools that can help us solve some problems. The other important factor, in my opinion, and that this Live CD / DVD, can be built in multiple architectures, so who will have on their hard drives different O: S. diferrenti and architecture, you will find a unique tool that will allow him to chroottarsi necessary. multicd is nothing more than a script that helps us to build our custom DVD, I, for example, I have a DVD mutidistro, 3.8 jig, constructed inside a 64bit Debian Live, Clonezilla, Backtrack, GParted, Ultimate Boot CD.

Requirements:

Obtain the ISO of the OS supported :

then:

  $ Wget ftp://downloads.tuxfamily.org/multicd/multicd-6.8.sh 

  $ Chmod + x multicd-6.8.sh 

  # Apt-get install genisoimage 

At this point you have to change the names of the systems have downloaded, as described on the website , for example:

 $ Mv debian-live-6.0.3-i386-gnome-desktop.iso binary.iso $ mv clonezilla-live-1.2.8-46-i686.iso $ clonezilla.iso etc..  etc..  etc.. 

Now just run the script multicd, and wait a few minutes:

  # ./multicd-6.8.sh 

enjoy ;)

Share on Tumblr http://img26.imageshack.us/img26/8687/multicd.png Digg This Submit to reddit Share
Tags: ,

Comments 13 Comments »

My sheela

I have already spoken in the past of exiftool , and how important it is to delete the metadata that are hidden in a photo, before distributing it around. However, for reasons that I am not here to explain, I always check the data in the pictures, because, it makes me realize, with the help of specific questions later, if the person who has sent speaks the truth. But if I wanted to deliberately lie? to believe that the photo was taken in a different date, and then deceive an eye careless? .... how?? Simple, just manipulate the data with exiftool . As an example, the picture slightly harbor "purified" of my sheela, taken in 2007. The data on the photo are as follows:

ORIGINAL:

edmond @ Debianbox: ~ / Desktop / test $ exiftool-a-u-g1 sheela.jpg
- ExifTool -
ExifTool Version Number: 8.60
- System -
File Name: sheela.jpg
Directory:.
File Size: 189 kB
File Modification Date / Time: 2007:09:30 15:23:51 +02:00
File Permissions: rw-r -
- File -
File Type: JPEG
MIME Type: image / jpeg
Image Width: 500
Image Height: 375
Encoding Process: Baseline DCT, Huffman coding
Bits Per Sample: 8
Color Components: 3
Y Cb Cr Sub Sampling: YCbCr4: 4:4 (1 1)
- JFIF -
JFIF Version: 1:01
Resolution Unit: inches
X Resolution: 72
Y Resolution: 72
- Composite -
Image Size: 500 × 375

then to manipulate the date, making a copy of the original, the command to use is as follows:

  $ Exiftool-DateTimeOriginal = '2012: 01:15 14:50:04 'foto.jpg 

FAKE:

edmond @ Debianbox: ~ / Desktop / test $ exiftool-DateTimeOriginal = '2012: 01:15 14:50:04 'sheela.jpg
1 image files updated
edmond @ Debianbox: ~ / Desktop / test $ exiftool-a-u-g1-sheela.jpg - ExifTool -
ExifTool Version Number: 8.60
- System -
File Name: sheela.jpg
Directory:.
File Size: 190 kB
File Modification Date / Time: 2012:01:15 14:50:37 +01:00
File Permissions: rw-r -
- File -
File Type: JPEG
MIME Type: image / jpeg
Exif Byte Order: Big-endian (Motorola, MM)
Image Width: 500
Image Height: 375
Encoding Process: Baseline DCT, Huffman coding
Bits Per Sample: 8
Color Components: 3
Y Cb Cr Sub Sampling: YCbCr4: 4:4 (1 1)
- JFIF -
JFIF Version: 1:01
Resolution Unit: inches
X Resolution: 72
Y Resolution: 72
- IFD0 -
X Resolution: 72
Y Resolution: 72
Resolution Unit: inches
Y Cb Cr Positioning: Centered
- ExifIFD -
Exif Version: 0230
Date / Time Original: 2012:01:15 14:50:04
Components Configuration: Y, Cb, Cr, -
Flashpix Version: 0100
Color Space: sRGB
- Composite -
Image Size: 500 × 375

to clear all metadata:

  $ Exiftool-all = foto.jpg 
 

enjoy ;)

Share on Tumblr http://img542.imageshack.us/img542/622/sheela.jpg Digg This Submit to reddit Share
Tags: ,

Comments No Comments »

Reaver WPS fails with an attack brute force to decrypt the password WPA/WPA2 our network under certain conditions. First of all WPS or Wi-Fi Protected Setup is common in home routers, it is generally located under wifi-protection. The vulnerability lies in prorpio this standard, because, if you use the insert mode pin instead of the push button, this opens a flaw. Virtually bombarding the router packet, it returns a lot of information useful to cracking. However, in the network are more comprehensive and detailed explanations. Firstly you must install aircrack-ng , and compilarselo , since it is no longer present in the official repositories, or get it from my repository . In order to have reaver on Debian:

  $ Sudo apt-get install libsqlite3-dev libpcap0.8 - dev 

  $ Wget http://reaver-wps.googlecode.com/files/reaver-1.3.tar.gz 

  $ Tar-xvf reaver-1.3.tar.gz 

  Reaver-1.3/src $ cd / 

  $. / Configure 

  $ Make 

  $ Sudo make install 

put the card into monitor mode:

  # Airmon-ng start wlan0 

The above command will create mon0 in monitor mode

Interface Chipset Driver

wlan0 Ralink 2561 PCI rt61pci - [phy0]
(Monitor mode enabled on mon0)

scanning to detect wpa networks:

  # Walsh-i mon0 - ignore-fcs 

attack:

  # Reaver-i mon0-b 00:11:22:33:44:55 - dh-small 

for other commands to read the documentation inside the package.

enjoy ;)

Share on Tumblr http://img600.imageshack.us/img600/4707/reaverwps.jpg Digg This Submit to reddit Share
Tags: , , ,

Comments 11 Comments »

Metasploit Project is a project of computer security that provides information about the vulnerabilities, penetration testing simplifies and assists in the development of intrusion detection systems. The best-known sub-project is the Metasploit Framework, a tool for developing and executing exploit against a remote machine. Other important sub-projects include the Opcode Database, the archive of shellcode and security research ( Wikipedia ) There are several Linux distributions that deal with testing the security of a system, of which the most famous is Backtrack . But we can also install Metasploit on our favorite distro, in this case Debian Squeeze.

Requirements:

# apt-get install build-essential subversion ruby libruby irb rdoc libyaml-ruby libzlib-ruby libopenssl-ruby libdl-ruby libreadline-ruby libiconv-ruby rubygems sqlite3 libsqlite3-ruby libsqlite3-dev

Installation:

$ svn co http://metasploit.com/svn/framework3/trunk/ metasploit

$ cd metasploit

$ svn up

start in console mode:

$ ./msfconsole

Press to view help for more commands. For the moment I will stop here, namely in a forthcoming guide does not rule out continuing with examples of usage.

enjoy ;)

Share on Tumblr http://img254.imageshack.us/img254/3883/metasploitp.png Digg This Submit to reddit Share
Tags: , ,

Comments 6 Comments »

To me it often happens that I will block the door to the cdrom and therefore you can not eject the cd / dvd, this may depend on the poor quality of a cd, maybe those rw used an infinite number of times. In this situation, 98 times out of 100 you have to reboot even as a:

$ Eject / dev/cdrom0

fails to eject, then the solution is to disable the door lock cdrom:

# Echo 0> / proc / sys / dev / cdrom / autoclose

# Echo 0> / proc / sys / dev / cdrom / lock

to make final changes:

# Nano / etc / sysctl.conf

and insert:

dev.cdrom.autoclose = 0
dev.cdrom.lock = 0

Share on Tumblr Save on Delicious Digg This Submit to reddit Share
Tags: , , ,

Comments No Comments »