Showing headlines posted by npn

Adventures in Sniffing the Network

This article is intended to provide a simple demonstration of how easy it is to sniff/intercept traffic on various types of networks, and serve as a warning to utilize secure methods of communication on a) untrusted networks and b) known networks with the potential for untrusted clients or administrators.

Signs your Linux Box has been Compromised

There are a number of warning signs that a system has been compromised. The cases described warrant further investigation. Of course, they aren’t all guarantees that your system has been compromised, however they can be strong indicators.

Resetting a Linux root Password

There are a couple of reasons why you might want to reset a Linux root password. If the current password is known to you, just log in as root and issue the passwd command. What if you’ve forgotten the password and can’t log in? Resetting a Linux root password is simple if you have access to the machine. There are 2 main methods.

Linux Namespaces: Powerful Isolation & OS Level Virtualization

  • IODigitalSec; By Adam Palmer (Posted by npn on Nov 23, 2014 11:11 PM EDT)
  • Story Type: Tutorial; Groups: Kernel, Linux
Starting in kernel 2.6.24, Linux supports 6 different types of namespaces. Namespaces are useful in creating processes that are more isolated from the rest of the system, without needing to use full low level virtualization technology.

Linux Based Robot Finds its Charger Automatically

  • IODigitalSec; By Adam Palmer (Posted by npn on Nov 20, 2014 12:41 AM EDT)
  • Story Type: Video; Groups: Linux
This article contains a video of a homebrew Linux based robot automatically charging using location logging and ultrasonic sensors

Simpe Hard Drive Data Recovery with a twist

  • IODigitalSec; By Adam Palmer (Posted by npn on Nov 13, 2014 7:49 PM EDT)
  • Story Type: Tutorial; Groups: Debian, Linux
This article discusses hard disk data recovery on Linux with fdisk and dd.

Nginx, SSL, php4-fpm on Debian Wheezy HOWTO

I decided to take a break from my love affair with Apache and set up a recent development project on Nginx. I set up a LEMP server (Linux, Nginx, MySQL, PHP), minus the MySQL as it’s already installed on my VM host server, and plus SSL.

MySQL Master to Master Replication, Heartbeat, DRBD, Apache/PHP/Varnish MegaHOWTO

I created this HOWTO while building a new development environment. The intention is to take a single Apache2/Varnish/MySQL environment and scale it to two servers, with one effectively a “hot-standby” – increase redundancy and continuity whilst maintaining current performance. This HOWTO is based on Debian Wheezy

Linux Challenge Blackbox

  • IODigitalSec; By Adam Palmer (Posted by npn on Oct 6, 2014 7:16 AM EDT)
  • Groups: Linux; Story Type: News Story
The small blackbox challenge covers some Linux file manipulation, C/ASM, GDB and filesystem. Please post questions or feedback in the comments.

Linux iproute2 multiple default gateways

  • IODigitalSec; By Adam Palmer (Posted by npn on Oct 5, 2014 11:37 PM EDT)
  • Story Type: Tutorial; Groups: Debian, Linux
This article describes a Linux server set up with 2 interfaces (eth0) and (eth1) and multiple default gateways. Each interface has a separate ISP and network details.

OpenVPN + Squid3 with Transparent Proxying on Debian Wheezy HowTo

A step by step HOWTO covering Squid3 transparent proxying on an OpenVPN server. Also covers PKI setup for OpenVPN.

Fully Automatic Wireless Hacking Station on Raspberry Pi

This article describes a working all-in-one standalone mobile wireless attack station that can perform Man-In-The-Middle (MITM) type attacks on clients automatically and without any internet access or other external connectivity or influence. Once running, the device will attempt to solicit connections from nearby wireless devices using airbase-ng. The software runs on a Raspberry Pi (or any sane Linux distribution) and is described for testing and research purposes.

Tundeep: Tunnelling through networks under pen testing

  • IODigitalSec; By Adam Palmer (Posted by npn on Sep 12, 2014 6:31 PM EDT)
  • Story Type: Security, Tutorial
Tundeep is a layer 2 VPN/injection tool that resides [almost] entirely in user space on the victim aside from the pcap requirement. This can be handled via a silent install however. The tool will build on Linux and Windows victims. Windows compilation is achieved using Cygwin. The attacker must be a Linux machine however as kernel TUN/TAP support is required.