How To Use Wget – Includes Several Examples Using Wget

wget is a great command line utility that is natively available in Linux and can be downloaded for Windows (see also GNU WGet for Windows (Windows 7, Vista, XP, etc.)). wget can be used for many download situations including large files, recursive downloads, non-interactive downloads, multiple file downloads, etc. Note: options ARE case sensitive. 1. Download a […]

Using Remote Desktop for Linux with rdesktop

rdesktop client can be used to connect to Windows Terminal Services for Remote Desktop Protocol (RDP) from Linux machines. The rdesktop client supports all version of Microsoft Windows including the latest, Windows Server 2008 and Windows 7 Operating Systems, and it runs on most unix based platforms as well as other ports. Visit http://sourceforge.net/projects/rdesktop/ for more […]

HowTo: Crack WPA with Backtrack 3

This is an easy to follow tutorial on how to crack a WPA encrypted password. This information should only be used for education purposes. Steps: airmon-ng stop wlan0 ifconfig wlan0 down macchanger –mac 00:11:22:33:44:55 wlan0 airmon-ng start wlan0 airodump-ng wlan0 airodump-ng -c (channel) -w (file name) –bssid (bssid) wlan0 aireplay-ng -0 5 -a (bssid)wlan0 aircrack-ng […]

HowTo: Crack WEP with BackTrack 3

This is a tutorial on how to crack a wep encrypted password. This information should only be used for education purposes. Steps: airmon-ng stop wlan0 ifconfig wlan0 down macchanger –mac 00:11:22:33:44:55 wlan0 airmon-ng start wlan0 airodump-ng wlan0 airodump-ng -c (channel) -w (file name) –bssid (bssid) wlan0 aireplay-ng -1 0 -a (bssid) -h 00:11:22:33:44:55 wlan0 aireplay-ng […]

Wireless WPA/WPA2-PSK GPU Cracking with Pyrit – How to Use Pyrit in BackTrack

Pyrit is a GPU cracker for attacking WPA/WPA2 PSK protocols. It allows to create massive databases, pre-computing part of the WPA/WPA2-PSK authentication phase in a space-time-tradeoff.  Pyrit works with many platforms including CUDA, ATI-Stream, OpenCL and VIA Padlock. How toListing available cores pyrit list_cores Determining performance of cores pyrit benchmark Create a new ESSID pyrit […]

TrueCrypt – Free Open Source Industrial Strength Encryption

TrueCrypt provides a solution for encrypting sensitive data – everything from portable, mountable volumes to entire hard disks.  Encrypting your data renders that access useless, even if your computer or your thumbdrive falls into the wrong hands. And TrueCrypt makes it not only easy, but nearly un-crackable.  TrueCrypt is both open source and FREE. There […]

How to create and use Public Keys with SSH

SSH and SFTP Public Key Authentication requires that you create a public/private key pair. In this howto we will look at how to create then use those keys. SSH (Secure Shell) and SFTP (Secure FTP) support a very strong security model that can be used instead of the normal username and password authentication scheme. It […]

FREE Windows Utilities for Scanning, Auditing, and Monitoring

BareTailMany applications keep detailed logging data in straight text files because the Windows event logs aren’t appropriate for certain types of data (e.g., IIS log files). In the course of monitoring or troubleshooting these types of applications, it’s often helpful to watch these log files in real time. However, because they’re text files, that process […]

What is the Linux equivalent to RoboCopy?

The Linux equivalent to Window’s robocopy is the command line file mirroring utility called rsync. Whether you want to backup your data, distribute files securely or mirror your working documents over the internet from the office to home, between computers on your local network, or from your computer to your web server, rsync can get […]

Linux Commands for (Beginning and Forgetful) Administrators

Command Summary Use arp Command mostly used for checking existing Ethernet connectivity and IP address Most common use: arp This command should be used in conjunction with the ifconfig and route commands. It is mostly useful for me to check a network card and get the IP address quick. Obviously there are many more parameters, but […]