Skip to main content

Posts

Kismet

As you setup your wireless access point you need to make sure it has encryption either it's WEP or WPA. My recommendation is WPA2 if you have that choice. More likely wireless network don't have a password on it - over 80% of them don’t. Using kismet the hacker watchs you check your email. Kismet records every packet you send on the network. Kismet records the email server you connected to, and the login name and password you used to get your email. The hacker lets Kismet collect wifi packets for several hours, usually during the peak times this wifi network is in use. If this is a nearby hotel the hacker collects packets through the evening, if it’s a cafe or sandwich shop the hacker collects packets during lunch. The hacker goes back home and runs dsniff on the capture files that kismet created. Dsniff dumps out all the servers and name/password combinations that kismet collected that day. The hacker gets your server and login name/password and sets up his email clien...

Setting up your Linux Firewall Distribution (Part 2)

Welcome to part 2 of setting up your Linux Firewall since I took a lot of pictures of the installment of setting up the Linux Firewall I decided to make a PDF file for you to view. enjoy! Download now File Name: DTS Enterprise IPCOP.pdf File Size: 810 KB (829,620 bytes) Date Created: 03/03/2010   Hosted by Microsoft Office Live

Setting up your Linux Firewall Distribution (Part 1)

Today I'm going to show you how to get start. In order to create a network you must design it in paper, visio, or any kind of drawing that shows your plan. If you don't create some kind of drawing your network will not be very efficient. This drawing was done Microsoft new version of visio which is still in beta it called visio 2010 and yes I do have a legit license for it. The way that I design this is setup as two networks instead of one. Reason why you may ask because Network A is does not have a speed restriction and not monitor. Network B is has a speed limit and it is monitor. This is a basic drawing for this configuration. Remember the computer that your going to use must have at least two network cards. Let's break it down the red line named eth0 is your unfilter internet access which your trying to protect. eth1 is the green line which is your internal network which means that anything inside that network is protected. The blue line is optional, but I use it f...

Turn your old machine into a firewall

Have an old machine that laying around in your closet gathering dust. You can make that machine into route. whats the difference between store bought router and a home made router. A route sold in the stores were design to make networking simple to consumers and you can't really make own. When you make your own router you can take more control of your network. Advantage of making your own router You can cap bandwidth for users You can block unwanted applications from updating from the web You can setup a proxy server  You can restrict user from downloading executes, torrents, P2P without modifying there own computer settings You can setup an IDS system You can monitor users by IP address, username, or hostname You can setup (DMZ) demilitarized zone   I know this may look hard and confusing, but later on during the day I show you how to setup a more complex network.   

WPA Encryption

Yes it can be crack the only issue is that you really need a huge dictionary list the more the better. what does this mean it just means that you just have to think of a long pass-phrase for your password. Back in mid 2005 you just needed a good CPU to process large amount of data, but now on curtain NVidia cards it can speed up decryption 8 characters - This is consider weak password to industry standards. 20 characters - This is the minimum for industry standards. 63 characters - This is the maximum and consider tough to crack. You may start thinking that any wireless connection is unsafe well its like a catch-22. There are tools out there that can alert you when a hacker is attempting to get in your network. I know most large corporations do have these tools they can either software or hardware. Remember, doing this illegal without the person or corporations permission, but its legal to try it at your own home router. Want to see the process of cr...

Nessus 4.2.1 New Version

I sure everyone in the IT industry had to use nessus at some point. It didn't have the greatest interface, but it did its job. The new version they redid everything, but before it was GUI application. The only problems that I ever had where that it took long time to login to the application other than that it work pretty well. Now with 4.2.1 they changed it to be a web application. Actually it loads really quick, but before it can load you need to start the service. maddog@DTS-Enterprise:~/Desktop$ sudo /etc/init.d/nessusd start -- This is to start the service [sudo] password for maddog: $Starting Nessus : .   maddog@DTS-Enterprise:~/Desktop$ sudo /etc/init.d/nessusd stop -- This is to stop the service $Shutting down Nessus : .  When starting the nessus services it requires root privileges. By default the nessus service loads when the computer starts. To stop nessus from loading when the computer starts type this command sudo update-rc.d -f nessusd...

Learning Linux

Learning linux from the ground up is really a challenge. As you progress even more you start customizing your OS from how it starts and how it shutdown. As soon as you start on a Live CD your x server is pretty much either gnome or KDE. I mean it looks easy to do, but as soon as you start research how the x server it can get trick. My recommendation is to also learn the bash line or command prompt. if your good with the line commands then reconfiguring your computer shouldn't be a problem, but you just learn the GUI layer of it and not the line commands believe me your going to have hard time restoring your computer. As I ask people around they say linux is hard to install. The easiest way to partition your drive manually is like this. sda1 /home -- This is where you want to store all your data in case your linux gets corrupted. This space can be as big as you want sda2 /swap -- Linux is just like windows it needs it virtual space. The swap size depends on your phys...