Kon-Boot is an prototype piece of software which allows to change contents of a linux kernel (and now Windows kernel also!!!) on the fly (while booting). In the current compilation state it allows to log into a linux system as ‘root’ user without typing the correct password or to elevate privileges from current user to […]
Category: Security
Securely delete files in Windows
The only way to ensure that deleted files, as well as files that you encrypt with EFS, are safe from recovery is to use a secure delete application. Secure delete applications overwrite a deleted file’s on-disk data using techiques that are shown to make disk data unrecoverable, even using recovery technology that can read patterns […]
Securing SSH on Linux
SSH (Secure Shell) is a protocol which supports logging into a remote system or executing commands on a remote system, using an encrypted communication between the two systems. By default SSH is running version 1 and allowing direct root access to the system. You should disable direct root access on the sshd_config file and use […]
Installing & Configuring Brute Force Detection on Linux
BFD is a modular shell script for parsing applicable logs and checking for authentication failures. There is not much complexity or detail to BFD yet and likewise it is very straight-forward in its installation, configuration and usage. The reason behind BFD is very simple; the fact there is little to no authentication and brute force […]
Detecting DoS / DDoS Attack on a Windows 2003 / 2008 Server
How do I detect a DDOS (Distributed denial of service) / DOS attack on a Windows Server 2003 / 2000 / 2008, XP, Vista or Windows 7? Can I use Linux netstat command syntax to detect DDoS attacks? A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a […]
Delete File Securely / Permanently Delete File Data in Windows
I know how to delete a file securely using GNU/Linux and Open source tools under Linux. I’m looking for DoD 5520.22-M or NNSA NAP-14.x.secure compliant delete utility under Windows. How do I delete a file permanently under Windows XP or Server operating system with NTFS; so that no one can retrieve my data? Linux offers […]
How to delete files securely in Linux
How to remove files securely so that it cannot be undeleted. Peter Gutmann paper “Secure Deletion of Data from Magnetic and Solid-State Memory” has very good information. Here are some commands/tools available under Debian GNU/Linux (it should work with other Linux distributions) to delete file securely. srm: Securely remove files or directories This command is […]
Wireless WPA/WPA2-PSK GPU Cracking with Pyrit – How to Use Pyrit in BackTrack
Pyrit is a GPU cracker for attacking WPA/WPA2 PSK protocols. It allows to create massive databases, pre-computing part of the WPA/WPA2-PSK authentication phase in a space-time-tradeoff. Pyrit works with many platforms including CUDA, ATI-Stream, OpenCL and VIA Padlock. How toListing available cores pyrit list_cores Determining performance of cores pyrit benchmark Create a new ESSID pyrit […]
Root Access Email Alert
Get notified when a user logs in with root privileges. 1) Edit .bashrc under /root to get notified by email when someone logs in as root 2) Add the following: echo ‘ALERT – Root Shell Access (Server Name) on:’ `date` `who` | mail -s “Alert: Root Access from `who | cut -d”(” -f2 | cut […]
How To Install Backtrack4 Using Grub On Ubuntu
Backtrack is an operating system that is specially designed for networking security. Bactrack OS is based on Linux. As of this writing the latest version of Bactrack is Backtrack4 with many, many useful applications. Before installing BT4, make sure you have installed Ubuntu on your computer so we can use Ubuntu’s Grub for booting. Follow these steps to install and configure dual booting Ubuntu […]