ok ... go to this point... :D
• AutoRPM on Red Hat and apt-get on Debian can be used to download and install
any packages on your system for which there are updates. Use care when
automatically updating production servers.
• IP Masquerading enables a Linux box with multiple interfaces to act as a gateway to
remote networks for hosts connected to the Linux box on the internal network
interface. See the IP Masquerading HOWTO for implementation information.
• Install nmap to determine potential communication channels. Can determine remote
OS version, perform “stealth” scans by manipulating ICMP, TCP and UDP, and even
potentially determine the remote username running the service. Start with something
simple like:
# nmap 192.168.1.1
• Password-protect LILO for servers in public environments to require authorization
when passing LILO command-line kernel parameters at boot time. Add the password
and restricted arguments to /etc/lilo.conf, then be sure to re-run
/sbin/lilo:
image = /boot/vmlinuz-2.2.17
label = Linux
read-only
restricted
password = your-password
• The OpenWall kernel patch is a useful set of kernel security improvements that
helps to prevent buffer overflows, restrict information in /proc available to normal
users, and other changes. Requires compiling the kernel, and not for newbies.
• Ensure system clocks are accurate. The time stamps on log files must be accurate
so security events can be correlated with remote systems. Inaccurate records make it
impossible to build a timeline. For workstations, it is enough to add a crontab entry:
0-59/30 * * * * root /usr/sbin/ntpdate -su time.timehost.com
• Install and execute the Bastille Linux hardening tool. Bastille is a suite of shell
scripts that eliminates many of the vulnerabilities that are common on default Linux
installations. It enables users to make educated choices to improve security by asking
questions as it interactively steps through securing the host. Features include basic
packet filtering, deactivating unnecessary network services, auditing file permissions,
and more. Try the non-intrusive test mode first.
• Configure sudo (superuser do) to execute privileged commands as a normal user
instead of using su. The administrator supplies his own password to execute specific
commands that would otherwise require root access. The file /etc/sudoers file
controls which users may execute which programs. To permit Dave to only manipulate
the printer on magneto:
Cmnd_Alias LPCMDS = /usr/sbin/lpc, /usr/bin/lprm
dave magneto = LPCMDS
Dave executes sudo with the authorized command and enters his own password
when prompted:
dave$ sudo /usr/sbin/lpc
Password:
lpc>
• Password security is the most basic means of authentication, yet the most critical
means to protect your system from compromise. It is also one of the most overlooked
means. Without an effective well-chosen password, your system is sure to be
compromised. Obtaining access to any user account on the system is the tough part.
From there, root access is only a step away. Run password-cracking programs such as
John the Ripper or Crack regularly on systems for which you’re responsible to ensure
password security is maintained. Disable unused accounts using /usr/bin/passwd
-l. Use the MD5 password during install if your distribution supports it.
• Packet filtering isn’t just for firewalls. Using ipchains, you can provide a significant
amount of protection from external threats on any Linux box. Blocking access to a
particular service from connecting outside of your local network you might try:
# ipchains -I input -p TCP -s 192.168.1.11 telnet -j DENY -l
This will prevent incoming access to the telnet port on your local machine if the
connection originates from 192.168.1.11. This is a very simple example. Be sure
to read the IP Chains HOWTO before implementing any firewalling.
General Security Tips
Security Glossary
Buffer Overflow: A condition that occurs when a user or process attempts to place
more data into a program’s storage buffer in memory and then overwrites the actual
program data with instructions that typically provide a shell owned by root on the
server. Accounted for more than 50 percent of all major security bugs leading to
security advisories published by CERT. Typically associated with set-user-ID root
binaries.
Cryptography: The mathematical science that deals with transforming data to render
its meaning unintelligible, prevent its undetected alteration, or prevent its unauthorized
use.
Denial of Service: Occurs when a resource is targeted by an intruder to prevent
legitimate users from using that resource. They are a threat to the availability of data
to all others trying to use that resource. Range from unplugging the network connection
to consuming all the available network bandwidth.
IP Spoofing: An attack in which one host masquerades as another. This can be
used to route data destined for one host to antoher, thereby allowing attackers to
intercept data not originally intended for them. It is typically a one-way attack.
Port Scanning: The process of determining which ports are active on a machine. By
probing as many hosts as possible, means to exploit the ones that respond can be
developed. It is typically the precursor to an attack.
Packet Filtering: A method of filtering network traffic as it passes between the
firewall’s interfaces at the network level. The network data is then analyzed according
to the information available in the data packet, and access is granted or denied based
on the firewall security policy. Usually requires an intimate knowledge of how network
protocols work.
Proxy Gateway: Also called Application Gateways, act on behalf of another
program. A host with a proxy server installed becomes both a server and a client, and
acts as a choke between the final destination and the client. Proxy servers are typically
small, carefully-written single-purpose programs that only permit specific services to
pass through it. Typically combined with packet filters.
Set User-ID (setuid) / Set Group-ID (setgid): Files that everyone can execute as
either it's owner or group privileges. Typically, you'll find root-owned setuid files, which
means that regardless of who executes them, they obtain root permission for the
period of time the program is running (or until that program intentionally relinquishes
these privileges). These are the types of files that are most often attacked by intruders,
because of the potential for obtaining root privileges. Commonly associated with
buffer overflows.
Trojan Horse: A program that masquerades itself as a benign program, when in fact
it is not. A program can be modified by a malicious programmer that purports to do
something useful, but in fact contains a malicious program containing hidden functions,
exploiting the privileges of the user executing it. A modified version of /bin/ps, for
example, may be used to hide the presence of other programs running on the system.
Vulnerability: A condition that has the potential for allowing security to be
compromised. Many different types of network and local vulnerabilities exist and are
widely known, and frequently occur on computers regardless of their level of network
connectivity, processing speed, or profile
Kernel Security
Several kernel configuration options are available to improve security through the
/proc pseudo-filesystem. Quite a few of the files in /proc/sys are directly related to
security. Enabled if contains a 1 and disabled if it contains a 0. Many of the options
available in /proc/sys/net/ipv4 include:
• icmp_echo_ignore_all: Ignore all ICMP ECHO requests. Enabling this option will
prevent this host from responding to ping requests.
• icmp_echo_ignore_broadcasts: Ignore ICMP echo requests with a broadcast/
multicast destination address. Your network may be used as an exploder for denial of
service packet flooding attacks to other hosts.
• ip_forward: Enable or disable the forwarding of IP packets between interfaces.
Default value is dependent on whether the kernel is configured as host or router.
• ip_masq_debug: Enable or disable debugging of IP masquerading.
• tcp_syncookies: Protection from the “SYN Attack”. Send syncookies when the SYN
backlog queue of a socket overflows.
• rp_filter: Determines if source address verification is enabled. Enable this option on
all routers to prevent IP spoofing attacks against the internal network.
• secure_redirects: Accept ICMP redirect messages only for gateways listed in default
gateway list.
• log_martians: Log packets with impossible addresses to kernel log.
• accept_source_route: Determines whether source routed packets are accepted or
declined. Should be disabled unless specific reason requires it.
The file /etc/sysctl.conf on recent Red Hat contains a few default settings and is
processed at system startup. The /sbin/sysctl program can be used to control these
parameters. It is also possible to configure their values using /bin/echo. For example,
to disable IP forwarding, as root run:
echo “0” > /proc/sys/net/ipv4/ip_forward
This must written to a system startup file or /etc/sysctl.conf on Red Hat to occur
after each reboot. More information is available in proc.txt file in the kernel
Documentation/ directory.
Controlling File Permissions & Attributes
Monitoring the permissions on system files is crucial to maintain host integrity.
• Regularly audit your systems for any unauthorized and unnecessary use of the setuid or setgid
permissions. “Set-user-ID root” programs run as the root user, regardless of who is executing them,
and are a frequent cause of buffer overflows. Many programs are setuid and setgid to enable a
normal user to perform operations that would otherwise require root, and can be removed if your
users do not need such permission. Find all setuid and setgid programs on your host and
descriminately remove the setuid or setgid permissions on a suspicious program with chmod:
root# find / -type f -perm +6000 -ls
59520 30 -rwsr-xr-x 1 root root 30560 Apr 15 1999 /usr/bin/chage
59560 16 -r-sr-sr-x 1 root lp 15816 Jan 6 2000 /usr/bin/lpq
root# chmod -s /usr/bin/chage /usr/bin/lpq
root# ls -l /usr/bin/lpq /usr/bin/chage
-rwxr-xr-x 1 root root 30560 Apr 15 1999 /usr/bin/chage
-r-xr-xr-x 1 root lp 15816 Jan 6 2000 /usr/bin/lpq
World-writable files are easily altered or removed. Locate all world-writable files on your system:
root# find / -perm -2 ! -type l -ls
In the normal course of operation, several files will be world-writable, including some from /dev and
the /tmp directory itself.
• Locate and identify all files that do not have an owner or belong to a group. Unowned files may also
be an indication an intruder has accessed your system.
root# find / -nouser -o -nogroup
• Using the lsattr and chattr commands, administrators can modify characteristics of files and
directories, including the ability to control deletion and modification above what normal chmod
provides. The use of “append-only” and “immutable” attributes can be particularly effective in
preventing log files from being deleted, or Trojan Horses from being placed on top of trusted
binaries. While not a guarantee a system file or log won’t be modified, only root has the ability to
remove this protection. The chattr command is used to add or remove these properties, while the
lsattr can be used to list them.
Log files can be protected by only permitting appending to them. Once the data has been written, it
cannot be removed. While this will require modifications to your log rotation scripts, this can provide
additional protection from a cracker attempting to remove his tracks. Once rotated, they should be
changed to immutable. Files suitable for these modifications include /bin/login, /bin/rpm,
/etc/shadow, and others that should not change frequently.
# chattr +i /bin/login
# chattr +a /var/log/messages
# lsattr /bin/login /var/log/messages
----i--- /bin/login
-----a-- /var/log/messages
• There should never be a reason for user’s to be able to run setuid programs from their home
directories. Use the nosuid option in /etc/fstab for partitions that are writable by others than
root. You may also wish to use the nodev and noexec on user’s home partitions, as well as /var,
which prohibits execution of programs, and creation of character or block devices, which should
never be necessary anyway. See the mount man page for more information.
Bash Shell Programming in Linux
Bash what?
Okay, I grant that this page might represent a leap from the familiar to the alien without much warning. Here are some explananatory notes:
* Under Linux, there are some powerful tools that for all practical purposes are unavailable under Windows (I can imagine all the old Linux hands saying "Duh!").
* One of these tools is something called "shell programming". This means writing code that a command shell executes.
* There is something like this under Windows, but as usual, the Windows version is a weak imitation.
* The most common Linux shell is named "Bash". The name comes from "Bourne Again SHell," which, in turn ... (imagine a lengthy recursion terminating in a caveman's grunt).
* There are many other shells available. Unless there is a compelling reason not to, I recommend that people stick to the Bash shell, because this increases the chance that your scripts will be portable between machines, distributions, even operating systems.
* I'll be showing some very basic examples of Bash shell programming on this page, and I want to say at the outset that shell programming is an art, not a science. That means there is always some other way to do the same thing.
* Because shell programming is an art, please don't write to say, "Wow, that was a really inefficient way to do such-and-such." Please do write (message page) to report actual errors.
* If this page seems too sketchy and elementary for your taste, you can choose from among the more advanced resources in this list.
Introduction
# Early computers had a teletype machine with a keyboard for I/O. Later, glass terminals became the norm, but the behavior was much the same — a keyboard, a screen, a text display. A program was responsible for mediating the transaction between the operator and the machine, and as the years passed this program (the command interpreter or shell) became more sophisticated.
# At this stage the command shell has become rather too sophisticated, typically having a dozen ways to do any particular thing. In this page I will try to limit myself to describing a handful of useful operations, based not on listing everything that can be done, but on solving specific problems. There are some links at the bottom of this page for those wanting more depth.
Preliminaries
* There are two primary ways to use the shell: interactively and by writing shell scripts.
o In the interactive mode, the user types a single command (or a short string of commands) and the result is printed out.
o In shell scripting, the user types anything from a few lines to an entire program into a text editor, then executes the resulting text file as a shell script.
o It is often the case that an interactive session becomes a shell scripting session, once things get too complicated for simple interactive line entries, or because a specific sequence of commands appears to be generally useful and worth preserving.
* In a modern Linux environment the user can have more than one shell open at a time, either by moving between a sequence of independent "virtual terminals" in a text-only environment, or by opening any number of shell windows in the X Windows environment.
* The advantage of having more than one shell available is that one shell can be used for testing one command at a time, while another might provide a text editor for assembling single commands into a shell program.
* I don't want to get too distribution-specific, but if you are not hosting X Windows and want more than one simultaneous shell session, with many current distributions you can switch between "virtual terminals" by pressing Ctrl+Alt+F(n), n typically between 1 and 6.
* In an environment that supports X Windows, simply open any desired number of command shell windows and move between them.
to see more programming Bash
Backtrack Recursion and the Mysterious Maze
Recursion
Backtracking is a simple, yet elegant, recursive technique which can be put to a variety of uses. In this article, we will explore this technique in detail, and analyze its usefulness in tree spanning. We will also take an inside look into a sample game 'Mysterious Maze', which uses a depth-first algorithm to span a decision tree in order to dynamically generate mazes. First of all, however, let us discuss the basic principles of recursion, on which backtracking, as well as the more sophisticated algorithms we will be covering later, depend on.
Understanding Recursion
The factorial of an integer N (written as N!), is defined as N multiplied by all the integers lower than N. Thus 5! is calculated as 5 x 4 x 3 x 2 x 1 = 120. Let us examine a simple function that takes a single integer parameter and returns the factorial of that integer.
function fact(N){
var retval=1;
for(i=N;i>0;i--){
retval=retval*i;
}
return retval;
}
The loop is pretty straightforward. retval starts off with the value 1, is then multiplied by N, then N-1, and similarly all the integers between N and 1, inclusive. Now, let us write the same function in a slightly different way.
function fact(N){
if(N==1)
return 1
else
return N*fact(N-1)
}
Elegant, is it not? The algorithm takes advantage of the fact that the factorial of any integer N can be defined as the product of N and the factorial of N-1. For example 5! = 5 x 4!. The function above is an example of a recursive function, because, as you can see in the second 'return' statement, the function calls itself.
Recursive functions are closely related to inductive definitions of functions in mathematics. In order to evaluate whether an algorithm is a candidate for recursion, we must first try to deduce an inductive definition of the algorithm. For example, the factorial function can be defined inductively in this way :
1 if N=1
N! =
N x (N-1)! if N>1
Algorithms that are by nature recursive, like the factorial example above, can be coded either as a loop, as in the first example, or as a recursive function, as in the second example. However recursive functions are generally smaller and more efficient than their looping equivalents.
The Stack
The Stack is an special area of memory in which temporary variables are stored. The Stack acts on the LIFO (Last In First Out) principle, which is the same principle involved in, say, the stacking of cardboard boxes one atop the other, where the topmost box, which was the last box stacked (Last In), will the the first to be removed (First Out). Thus, if the values 9,3,2,4 are stored (Pushed) on the Stack, they will be retrieved (Popped) in the order 4,2,3,9.
In order to understand how recursive functions use the Stack, we will walk through how the second algorithm above works. For your convenience, it is reproduced below.
if(N==1) return 1
else return N*fact(N-1)
Let us assume we want to find the value of 3!, which is 3 x 2 x 1 = 6. The first time the function is called, N holds the value 3, so the else statement is executed. The function knows the value of N, but not of fact(N-1), so it pushes N (value=3) on the stack, and calls itself for the second time with the value 2. This time round too the else statement is executed, and N (value=2) is pushed on the stack as the function calls itself for the third time with the value 1. Now the if statement is executed as n==1, so the function returns 1. Since the value of fact(1) is now known, it reverts back to it's second execution by popping the last value (2) from the stack and multiplying it by 1. This operation gives the value of fact(2), so the function reverts to it's first execution by popping the next value (3) from the stack, and multiplying it with fact(2), giving the value 6, which is what the function finally returns.
From the above example, we see that
* The function runs 3 times, out of which it calls itself 2 times. The number of times that a function calls itself is known as the recursive depth of that function.
* Each time the function calls itself, it stores one or more variables on the Stack. Since the Stack holds a limited amount of memory, functions with a high recursive depth may crash because of non-availability of memory. Such a condition is known as Stack Overflow.
* Recursive functions usually have a terminating condition. In the above example the function stops calling itself when n==1. If this condition were not present, the function would keep calling itself with the values 3,2,1,0,-1,-2... and so on for infinity. This condition is known as Endless Recursion.
* All recursive functions go through 2 distinct phases. The first phase, Winding, occurs when the function is calling itself and pushing values on the Stack. The second phase, Unwinding, occurs when the function is popping values from the stack.
Download
Category Distro Linux
- Slax v 6.1.2 For USB
- Download PHLAK 0.3
- Download Backtrack 4 pre Final
- Fedora 12 LiveCd
- Solaris DVD full [free]
Category Standard Software
BackTrack 4 – The Definitive Guide
Introduction
BackTrack is the world’s leading penetration testing and information security
auditing distribution. With hundreds of tools preinstalled and configured to run out
of the box, BackTrack 4 provides a solid Penetration testing platform ‐ from Web
application Hacking to RFID auditing – its all working in once place.
Behind the curtains
BackTrack Base
There have been many changes introduced into BackTrack 4 ‐ most notably, our
move to an Ubuntu Intrepid base. We now maintain our own full repositories with
modified Ubuntu packages in addition to our own penetration testing tools.
Another significant change is the updated kernel version, currently at 2.6.29.4. This
new kernel brought an onset of internal changes, which have greatly changed the
structure of BackTrack.
BackTrack Kernel
We no longer use lzma enabled squashfs as our live filesystem, which on one hand
results in larger ISO size, but on the other hand, frees us from having to maintain
our own kernel patches. This is especially painful these days, as squashfs is slowly
moving into the mainstream kernel (at the time of this writing).
BackTrack 4 uses squashfs‐tools version 4.0 (which is not backward compatible
with previous versions), and the inbuilt squashfs kernel module, which is present in
2.6.29.4. AUFS is used as the unification filesystem (aufs2.x).
Several wireless driver injection/optimization patches have been applied to the
kernel, as well as a bootsplash patch. These patches can be found in the kernel
sources package (/usr/src/linux/patches).
These changes mean that much of what you were used to in BackTrack 2/3 has
changed in terms of boot cheatcodes and such, as this kernel shift also means we no
longer use the livelinux
scripts to create our images (we use casper now).
Packages and Repositories
One of the most significant changes introduced in BackTrack 4 are the Debian like
repositories available, which are frequently updated with security fixes and new
tools. This means that if you choose to install BackTrack to disk, you will be able to
get package maintenance and updates by using aptget
commands.
Our BackTrack tools are arranged by parent categories. These are the categories
that currently exist:
• BackTrack ‐ Enumeration
• BackTrack ‐ Tunneling
• BackTrack ‐ Bruteforce
• BackTrack ‐ Spoofing
• BackTrack ‐ Passwords
• BackTrack ‐ Wireless
• BackTrack ‐ Discovery
• BackTrack ‐ Cisco
• BackTrack – Web Applications
• BackTrack ‐ Forensics
• BackTrack ‐ Fuzzers
• BackTrack ‐ Bluetooth
• BackTrack ‐ Misc
• BackTrack ‐ Sniffers
• BackTrack ‐ VOIP
• BackTrack ‐ Debuggers
• BackTrack ‐ Penetration
• BackTrack ‐ Database
• BackTrack ‐ RFID
• BackTrack – Python
• BackTrack – Drivers
• BackTrack ‐ GPU
Meta packages
A nice feature that arises from the tool categorization, is that we can now support
“BackTrack meta packages”. A meta package is a dummy package which includes
several other packages. For example, the meta package “backtrackweb”
would
include all the Web Application penetration testing tools BackTrack has to offer.
Meta Meta Packages
We have two “meta meta packages” – backtrackworld
and backtrackdesktop.
backtrackworld
contains all the BackTrack meta packages, while backtrackdesktop
contains backtrackworld,
backtracknetworking
and backtrackmultimedia.
The latter two meta packages are select applications imported from
Ubuntu repositories.
Up and running with BackTrack
We’ve made a short movie called “up and running with BackTrack” – showing some
common and not so common features. A good place to start in order to grasp the
new changes in BackTrack 4.
http://www.offensive‐security.com/videos/backtrack‐security‐training‐video/upand‐
running‐backtrack.html
Installing BackTrack to Disk
BackTrack 4 (both barebones and full version) now contains a modified Ubiquity
installer. The install should be straight and simple. For a video tutorial, check
http://www.offensive‐security.com/videos/install‐backtrack‐hard‐disk/installbacktrack‐
hard‐disk.html
Updating Backtrack
Keeping BackTrack up to date is relatively simple by using the apt‐get commands.
apt-get update synchronizes your package list with our repository.
apt-get upgrade downloads and installs all the updates available.
apt-get distupgrade
downloads and installs all new upgrades.
Customizing BackTrack
Creating your own Live CD – Method 1
Creating your own flavor of BackTrack is easy.
1. Download and install the bare bones version of BackTrack
2. Use apt‐get to install required packages or meta packages.
3. Use remastersys to repackage your installation.
Creating your own Live CD – Method 2
Download the BackTrack 4 iso. Use the customization script to update and modify
your build as show here:
http://www.offensive‐security.com/blog/backtrack/customising‐backtrack‐live‐cdthe‐
easy‐way/
Installing BackTrack to USB
The easiest method of getting BackTrack4 installed to a USB key is by using the
unetbootin utility (resent in BackTrack in /opt/).
Installing BackTrack to USB ‐ Persistent changes
A Video tutorial can be found here:
http://www.offensive‐security.com/videos/backtrack‐usb‐install‐video/backtrackusb‐
install.html
Working with BackTrack
KDE3 Quirks
BackTrack 4 contains an “imposed” KDE3 repository, alongside the KDE4 Ubuntu
Intrepid repositories. Since BackTrack uses KDE3, it’s important to remember that
KDE3 packages contain a “kde3” postfix, which makes them easily identifiable.
For example, if you wanted to install the program KDE program “kate”, you should
aptget
install katekde3
(install the KDE3 version of kate) rather than aptget
install kate. (install the KDE4 version of kate).
Updating tools manually
Our BackTrack repositories will always strive to keep updated with the latest
versions of tools, with the exception of a select few. These “special” tools get
updated by their authors very frequently, and often include significant updates. We
felt that creating static binaries for these types of tools would not be beneficial and
users were better of keeping these tools synched with the SVN versions
respectively. The tools include MSF, W3AF, Nikto, etc.
FAQs
‐ The Ubiquity Installer gives me a “Language failed with exit code 10”
error. What the heck ?
‐ Ignore it. Have faith.
‐ Why is the ISO so big? It used to be half the size!
‐ For a long time we struggled to keep BT under the 700 MB limit. This was
always a challenge and a pain in the backside. We decided to bust this barrier
for a couple of reasons:
o We no longer use squashfs with LZMA compression – which makes
the image size significantly larger.
o A CD is not the ideal media for running BT4 in a live environment. A
USB key is much faster and reliable.
‐ Why is this build called a “prerelease”?
Isn’t it stable enough ?
‐ This is probably the sturdiest version of BackTrack we’ve ever come up with.
Saying this, some bugs can be really obscure. Only after running an atheros
card for 40 straight hours did we notice wireless frame corruptions – which
resulted from a faulty patch we applied. It’s impossible for us to test every
driver and every hardware combination. That why we NEED YOUR INPUT (in
the forums).
‐ Why oh why did you use Ubuntu as your base?
‐ Check this blog post:
http://backtrack4.blogspot.com/2009/01/philosophical‐thoughts‐aboutbacktrack.
html
‐ I’ve installed Backtrack 4 to Hard Disk. How do I log in ??
‐ Use the user / pas cmbination for the user you created during the install.
Once logged in, type sudo su, and change the root password to your liking.
Check this video for more information:
http://www.offensive‐security.com/videos/backtrack‐security‐trainingvideo/
up‐and‐running‐backtrack.html
Outro
You can find our forums at http://forums.remote‐exploit.org.
Feel free to post bugfixes, suggestions, tool requests, etc.
We hope you enjoy this fine release!
Remote Exploit Team
User Management in Backtrack
Backtrack is a derivative of the Slax distro, and can say as a grandson of the Slackware distribution, for those who have been or are familiar with these older distros (Slackware.Red), must not be too long to make it user, so this tutorial aimed at the linux newbie like me hehhehehee :D
For example we create a user named anonymous. the following steps:
Check your first login as now what? of course as root ))
# whoami
root
Before proceeding to the stage of the user, I will make first public_html folder
in the directory / etc / skel in order to finish creating the user, automatically public_html folder
also be made on the user's home directory (/ home / anonymous / public_html):
# mkdir /etc/skel/public_html
Now we are entering the stage of user:
# adduser anonymous
Login name for new user: anonymous
User ID (’UID’) [ defaults to next available ]:
Initial group [ users ]:
Additional groups (comma separated) []:
Home directory [ /home/anonymous ]
Shell [ /bin/bash ]
Expiry date (YYYY-MM-DD) []:
New account will be created as follows:
—————————————
Login name…….: anonymous
UID…………..: [ Next available ]
Initial group….: users
Additional groups: [ None ]
Home directory…: /home/anonymous
Shell…………: /bin/bash
Expiry date……: [ Never ]
This is it… if you want to bail out, hit Control-C. Otherwise, press
ENTER to go ahead and make the account.
Creating new account…
Changing the user information for anonymous
Enter the new value, or press ENTER for the default
Full Name []: anonymous
Room Number []:
Work Phone []:
Home Phone []:
Other []: atoz@bungker.org
Changing password for anonymous
Enter the new password (minimum of 5, maximum of 127 characters)
Please use a combination of upper and lower case letters and numbers.
New password: ***********
Re-enter new password: ***********
Password changed.
Account setup complete.
Note :
Enter the user name, no id useeer, first name or initial, home directories, the shell is used,
date account of kadaluarssa made.
Each user having an individual group, useful when working in a network. All users who are in the same group have the same access rights too, well ... to add a group. use the command:
To delete a user, run the command:
# userdel anonymous
Each user having an individual group, useful when working in a network. All users who are in the same group have the same access rights too, well ... to add a group. use the command:
# groupadd [nama_group]
Untuk menghapusnya, gunakan perintah :
# groupdel [nama_group]
If you want to modify user accounts you have, use usermod perntah. Suppose you want to modify the
anonymous user group, the group wheel.
# usermod -G wheel anonymous
# id anonymous
uid=1001(anonymous) gid=100(users) groups=100(users),10(wheel)
To view the manual commands using telash mentioned above, use the command man [command_name]. Example:
# man usermod
Until our discussion here first. Good luck
Backtrack 4 Final Based on ubuntu
Follow This Instruction
======================================================
install backtrack 4:
DVD BT4 enter pre-finals n then the boot
type "startx" to enter the GUI.
no icon on the Desktop "install.sh" please on click
trus ada tulisan "crashed language" wrote terusin biarin aka "continue anyway"
jakarta location plih
select keyboard U.S.
select "Manual" time prepare hdd
pointing to the linux partition ex: / dev/sda1 linux
select "edit" select "ext3 with journaling file system"
check "format the partition"
contents of his mount point "/"
trus select "/ dev/sda2" as the swap file more ...
would proceed only after this is understood to include only
======================================================
when you finish to install will connect to the network for updates, etc.
ip planting his way to what static dhcp via cable
root @ hacker-laptop: / etc / network # vi / etc / network / interfaces
this content:
auto lo
iface lo inet loopback
auto eth0
iface eth0 inet static
address 192.168.2.172
network 192.168.2.0
netmask 255.255.255.0
broadcast 192.168.2.255
gateway 192.168.2.234
auto eth1
iface eth1 inet dhcp
auto eth2
iface eth2 inet dhcp
auto ath0
iface ath0 inet dhcp
auto wlan0
iface wlan0 inet dhcp
======================================================
for the DNS:
root@Hacker-laptop:nano /etc/resolv.conf
isinya ini:
nameserver 192.168.1.1
nameserver 202.134.0.155
======================================================
Hostname setting:
root@Hacker-laptop:/# hostname
kurtkabayan
root@Hacker-laptop:/# hostname Hacker-Laptop
root@Hacker-laptop:/# hostname
Hacker-Laptop
root@Hacker-laptop:/#
======================================================
to restart the network:
root@Hacker-laptop:/etc/init.d/networking restart
======================================================
Now update kernel:
apt-get update
apt-get install -d linux-image
cd /var/cache/apt/archives/
dpkg -i –force all linux-image-2.6.30.5_2.6.30.5-10.00.Custom_i386.deb
apt-get dist-upgrade
apt-get install madwifi-drivers
apt-get install r8187-drivers
after reboot select the new kernel and then type it first so good
fix-splash
=======================================================
flv to avi/mpeg
apt-get install ffmpeg
ffmpeg -i jokes.flv -ab 56 -ar 22050 -b 500 -s 320×240 jokes.mpg
ffmpeg -i film.flv film.avi
=======================================================
make wicd autostart:
nano /root/.bash_profile
the content is:
start-network
save and exit.
or there are other ways of making a shortcut in kde
cd /root/.kde/Autostart
ln -s /usr/bin/wicd
=======================================================
install openoffice akh......
apt-get install openoffice.org
apt-get install openoffice.org-style-andromeda
=======================================================