Jump to content

Nytro

Administrators
  • Posts

    18772
  • Joined

  • Last visited

  • Days Won

    729

Everything posted by Nytro

  1. 10 Cool Nmap Tricks and Techniques Nmap (“Network Mapper”) is a free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. In addition to my list you can also check out this Comprehensive Guide to Nmap and of course the man pages Here are some really cool scanning techniques using Nmap. 1) Get info about remote host ports and OS detection nmap -sS -P0 -sV -O <target> Where < target > may be a single IP, a hostname or a subnet -sS TCP SYN scanning (also known as half-open, or stealth scanning) -P0 option allows you to switch off ICMP pings. -sV option enables version detection -O flag attempt to identify the remote operating system Other option: -A option enables both OS fingerprinting and version detection -v use -v twice for more verbosity. nmap -sS -P0 -A -v < target > 2) Get list of servers with a specific port open nmap -sT -p 80 -oG – 192.168.1.* | grep open Change the -p argument for the port number. See “man nmap” for different ways to specify address ranges. 3) Find all active IP addresses in a network nmap -sP 192.168.0.* There are several other options. This one is plain and simple. Another option is: nmap -sP 192.168.0.0/24 for specific subnets 4) Ping a range of IP addresses nmap -sP 192.168.1.100-254 nmap accepts a wide variety of addressing notation, multiple targets/ranges, etc. 5) Find unused IPs on a given subnet nmap -T4 -sP 192.168.2.0/24 && egrep “00:00:00:00:00:00? /proc/net/arp 6) Scan for the Conficker virus on your LAN ect. nmap -PN -T4 -p139,445 -n -v –script=smb-check-vulns –script-args safe=1 192.168.0.1-254 replace 192.168.0.1-256 with the IP’s you want to check. 7) Scan Network for Rogue APs. nmap -A -p1-85,113,443,8080-8100 -T4 –min-hostgroup 50 –max-rtt-timeout 2000 –initial-rtt-timeout 300 –max-retries 3 –host-timeout 20m –max-scan-delay 1000 -oA wapscan 10.0.0.0/8 I’ve used this scan to successfully find many rogue APs on a very, very large network. 8) Use a decoy while scanning ports to avoid getting caught by the sys admin sudo nmap -sS 192.168.0.10 -D 192.168.0.2 Scan for open ports on the target device/computer (192.168.0.10) while setting up a decoy address (192.168.0.2). This will show the decoy ip address instead of your ip in targets security logs. Decoy address needs to be alive. Check the targets security log at /var/log/secure to make sure it worked. 9) List of reverse DNS records for a subnet nmap -R -sL 209.85.229.99/27 | awk ‘{if($3==”not”)print”(“$2?) no PTR”;else print$3? is “$2}’ | grep ‘(‘ This command uses nmap to perform reverse DNS lookups on a subnet. It produces a list of IP addresses with the corresponding PTR record for a given subnet. You can enter the subnet in CDIR notation (i.e. /24 for a Class C)). You could add “–dns-servers x.x.x.x” after the “-sL” if you need the lookups to be performed on a specific DNS server. On some installations nmap needs sudo I believe. Also I hope awk is standard on most distros. 10) How Many Linux And Windows Devices Are On Your Network? sudo nmap -F -O 192.168.0.1-255 | grep "Running: " > /tmp/os; echo "$(cat /tmp/os | grep Linux | wc -l) Linux device(s)"; echo "$(cat /tmp/os | grep Windows | wc -l) Window(s) devices" Hope you have fun, and remember don’t practice these techniques on machines or networks that are not yours. Sursa: 10 Cool Ways to Use Nmap
  2. 25 Best SSH Commands / Tricks OpenSSH is a FREE version of the SSH connectivity tools that technical users of the Internet rely on. Users of telnet, rlogin, and ftp may not realize that their password is transmitted across the Internet unencrypted, but it is. OpenSSH encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other attacks. Additionally, OpenSSH provides secure tunneling capabilities and several authentication methods, and supports all SSH protocol versions. SSH is an awesome powerful tool, there are unlimited possibility when it comes to SSH. 1) Copy ssh keys to user@host to enable password-less ssh logins. ssh-copy-id user@host To generate the keys use the command ssh-keygen 2) Start a tunnel from some machine’s port 80 to your local post 2001 ssh -N -L2001:localhost:80 somemachine Now you can acces the website by going to http://localhost:2001/ 3) Output your microphone to a remote computer’s speaker dd if=/dev/dsp | ssh -c arcfour -C username@host dd of=/dev/dsp This will output the sound from your microphone port to the ssh target computer’s speaker port. The sound quality is very bad, so you will hear a lot of hissing. 4) Compare a remote file with a local file ssh user@host cat /path/to/remotefile | diff /path/to/localfile - Useful for checking if there are differences between local and remote files. 5) Mount folder/filesystem through SSH sshfs name@server:/path/to/folder /path/to/mount/point Install SSHFS from SSH Filesystem Will allow you to mount a folder security over a network. 6) SSH connection through host in the middle ssh -t reachable_host ssh unreachable_host Unreachable_host is unavailable from local network, but it’s available from reachable_host’s network. This command creates a connection to unreachable_host through “hidden” connection to reachable_host. 7) Copy from host1 to host2, through your host ssh root@host1 “cd /somedir/tocopy/ && tar -cf – .” | ssh root@host2 “cd /samedir/tocopyto/ && tar -xf -” Good if only you have access to host1 and host2, but they have no access to your host (so ncat won’t work) and they have no direct access to each other. 8) Run any GUI program remotely ssh -fX <user>@<host> <program> The SSH server configuration requires: X11Forwarding yes # this is default in Debian And it’s convenient too: Compression delayed 9) Create a persistent connection to a machine ssh -MNf <user>@<host> Create a persistent SSH connection to the host in the background. Combine this with settings in your ~/.ssh/config: Host host ControlPath ~/.ssh/master-%r@%h:%p ControlMaster no All the SSH connections to the machine will then go through the persisten SSH socket. This is very useful if you are using SSH to synchronize files (using rsync/sftp/cvs/svn) on a regular basis because it won’t create a new socket each time to open an ssh connection. 10) Attach screen over ssh ssh -t remote_host screen -r Directly attach a remote screen session (saves a useless parent bash process) 11) Port Knocking! knock <host> 3000 4000 5000 && ssh -p <port> user@host && knock <host> 5000 4000 3000 Knock on ports to open a port to a service (ssh for example) and knock again to close the port. You have to install knockd. See example config file below. [options] logfile = /var/log/knockd.log [openSSH] sequence = 3000,4000,5000 seq_timeout = 5 command = /sbin/iptables -A INPUT -i eth0 -s %IP% -p tcp –dport 22 -j ACCEPT tcpflags = syn [closeSSH] sequence = 5000,4000,3000 seq_timeout = 5 command = /sbin/iptables -D INPUT -i eth0 -s %IP% -p tcp –dport 22 -j ACCEPT tcpflags = syn 12) Remove a line in a text file. Useful to fix ssh-keygen -R <the_offending_host> In this case it’s better do to use the dedicated tool 13) Run complex remote shell cmds over ssh, without escaping quotes ssh host -l user $(<cmd.txt) Much simpler method. More portable version: ssh host -l user “`cat cmd.txt`” 14) Copy a MySQL Database to a new Server via SSH with one command mysqldump –add-drop-table –extended-insert –force –log-error=error.log -uUSER -pPASS OLD_DB_NAME | ssh -C user@newhost “mysql -uUSER -pPASS NEW_DB_NAME” Dumps a MySQL database over a compressed SSH tunnel and uses it as input to mysql – i think that is the fastest and best way to migrate a DB to a new server! 15) Remove a line in a text file. Useful to fix “ssh host key change” warnings sed -i 8d ~/.ssh/known_hosts 16) Copy your ssh public key to a server from a machine that doesn’t have ssh-copy-id cat ~/.ssh/id_rsa.pub | ssh user@machine “mkdir ~/.ssh; cat >> ~/.ssh/authorized_keys” If you use Mac OS X or some other *nix variant that doesn’t come with ssh-copy-id, this one-liner will allow you to add your public key to a remote machine so you can subsequently ssh to that machine without a password. 17) Live ssh network throughput test yes | pv | ssh $host “cat > /dev/null” connects to host via ssh and displays the live transfer speed, directing all transferred data to /dev/null needs pv installed Debian: ‘apt-get install pv’ Fedora: ‘yum install pv’ (may need the ‘extras’ repository enabled) 18) How to establish a remote Gnu screen session that you can re-connect to ssh -t user@some.domain.com /usr/bin/screen -xRR Long before tabbed terminals existed, people have been using Gnu screen to open many shells in a single text terminal. Combined with ssh, it gives you the ability to have many open shells with a single remote connection using the above options. If you detach with “Ctrl-a d” or if the ssh session is accidentally terminated, all processes running in your remote shells remain undisturbed, ready for you to reconnect. Other useful screen commands are “Ctrl-a c” (open new shell) and “Ctrl-a a” (alternate between shells). Read this quick reference for more screen commands: GNU screen [quick_reference] 19) Resume scp of a big file rsync –partial –progress –rsh=ssh $file_source $user@$host:$destination_file It can resume a failed secure copy ( usefull when you transfer big files like db dumps through vpn ) using rsync. It requires rsync installed in both hosts. rsync –partial –progress –rsh=ssh $file_source $user@$host:$destination_file local -> remote or rsync –partial –progress –rsh=ssh $user@$host:$remote_file $destination_file remote -> local 20) Analyze traffic remotely over ssh w/ wireshark ssh root@server.com ‘tshark -f “port !22? -w -’ | wireshark -k -i - This captures traffic on a remote machine with tshark, sends the raw pcap data over the ssh link, and displays it in wireshark. Hitting ctrl+C will stop the capture and unfortunately close your wireshark window. This can be worked-around by passing -c # to tshark to only capture a certain # of packets, or redirecting the data through a named pipe rather than piping directly from ssh to wireshark. I recommend filtering as much as you can in the tshark command to conserve bandwidth. tshark can be replaced with tcpdump thusly: ssh root@example.com tcpdump -w – ‘port !22? | wireshark -k -i - 21) Have an ssh session open forever autossh -M50000 -t server.example.com ‘screen -raAd mysession’ Open a ssh session opened forever, great on laptops losing Internet connectivity when switching WIFI spots. 22) Harder, Faster, Stronger SSH clients ssh -4 -C -c blowfish-cbc We force IPv4, compress the stream, specify the cypher stream to be Blowfish. I suppose you could use aes256-ctr as well for cypher spec. I’m of course leaving out things like master control sessions and such as that may not be available on your shell although that would speed things up as well. 23) Throttle bandwidth with cstream tar -cj /backup | cstream -t 777k | ssh host ‘tar -xj -C /backup’ this bzips a folder and transfers it over the network to “host” at 777k bit/s. cstream can do a lot more, have a look cstream - a general-purpose streaming tool for example: echo w00t, i’m 733+ | cstream -b1 -t2 24) Transfer SSH public key to another machine in one step ssh-keygen; ssh-copy-id user@host; ssh user@host This command sequence allows simple setup of (gasp!) password-less SSH logins. Be careful, as if you already have an SSH keypair in your ~/.ssh directory on the local machine, there is a possibility ssh-keygen may overwrite them. ssh-copy-id copies the public key to the remote host and appends it to the remote account’s ~/.ssh/authorized_keys file. When trying ssh, if you used no passphrase for your key, the remote shell appears soon after invoking ssh user@host. 25) Copy stdin to your X11 buffer ssh user@host cat /path/to/some/file | xclip Have you ever had to scp a file to your work machine in order to copy its contents to a mail? xclip can help you with that. It copies its stdin to the X11 buffer, so all you have to do is middle-click to paste the content of that looong file Have Fun Sursa: 25 Best SSH Commands / Tricks
  3. The Top 100 Most Violent Movies Of All Time! | Running With Scissors Official Website
  4. Lie Detection & Forensic Psychology Research, Links, Videos and Books
  5. Linux Shell Scripting Tutorial A Beginner's handbook Copyright © 1999-2002 by Vivek G. Gite <vivek@nixcraft.com> Table of Contents Chapter 1: Quick Introduction to Linux What Linux is? Who developed the Linux? How to get Linux? How to Install Linux Where I can use Linux? What Kernel Is? What is Linux Shell? How to use Shell What is Shell Script ? Why to Write Shell Script ? More on Shell... Chapter 2: Getting started with Shell Programming How to write shell script Variables in shell How to define User defined variables (UDV) Rules for Naming variable name (Both UDV and System Variable) How to print or access value of UDV (User defined variables) echo Command Shell Arithmetic More about Quotes Exit Status The read Statement Wild cards (Filename Shorthand or meta Characters) More commands on one command line Command Line Processing Why Command Line arguments required Redirection of Standard output/input i.e. Input - Output redirection Pipes Filter What is Processes Why Process required Linux Command(s) Related with Process Chapter 3: Shells (bash) structured Language Constructs Decision making in shell script ( i.e. if command) test command or [ expr ] if...else...fi Nested ifs Multilevel if-then-else Loops in Shell Scripts for loop Nested for loop while loop The case Statement How to de-bug the shell script? Chapter 4: Advanced Shell Scripting Commands /dev/null - to send unwanted output of program Local and Global Shell variable (export command) Conditional execution i.e. && and || I/O Redirection and file descriptors Functions User Interface and dialog utility-Part I User Interface and dialog utility-Part II Message Box (msgbox) using dialog utility Confirmation Box (yesno box) using dialog utility Input (inputbox) using dialog utility User Interface using dialog Utility - Putting it all together trap command The shift Command getopts command Chapter 5: Essential Utilities for Power User Preparing for Quick Tour of essential utilities Selecting portion of a file using cut utility Putting lines together using paste utility The join utility Translating range of characters using tr utility Data manipulation using awk utility sed utility - Editing file without using editor Removing duplicate lines from text database file using uniq utility Finding matching pattern using grep utility Chapter 6: Learning expressions with ex Getting started with ex Printing text on-screen Deleting lines Coping lines Searching the words Find and Replace (Substituting regular expression) Replacing word with confirmation from user Finding words Using range of characters in regular expressions Using & as Special replacement character Converting lowercase character to uppercase Chapter 7: awk Revisited Getting Starting with awk Predefined variables of awk Doing arithmetic with awk User Defined variables in awk Use of printf statement Use of Format Specification Code if condition in awk Loops in awk Real life examples in awk awk miscellaneous sed - Quick Introduction Redirecting the output of sed command How to write sed scripts? More examples of sed Chapter 8: Examples of Shell Scripts Logic Development: Shell script to print given numbers sum of all digit Shell script to print contains of file from given line number to next given number of lines Shell script to say Good morning/Afternoon/Evening as you log in to system Shell script to find whether entered year is Leap or not Sort the given five number in ascending order (use of array) Command line (args) handling: Adding 2 nos. suppiled as command line args Calculating average of given numbers on command line args Finding out biggest number from given three nos suppiled as command line args Shell script to implement getopts statement. Basic math Calculator (case statement) Loops using while & for loop: Print nos. as 5,4,3,2,1 using while loop Printing the patterns using for loop. Arithmetic in shell scripting: Performing real number calculation in shell script Converting decimal number to hexadecimal number Calculating factorial of given number File handling: Shell script to determine whether given file exist or not. Screen handling/echo command with escape sequence code: Shell script to print "Hello World" message, in Bold, Blink effect, and in different colors like red, brown etc. Background process implementation: Digital clock using shell script User interface and Functions in shell script: Shell script to implements menu based system. System Administration: Getting more information about your working environment through shell script Shell script to gathered useful system information such as CPU, disks, Ram and your environment etc. Shell script to add DNS Entery to BIND Database with default Nameservers, Mail Servers (MX) and host Integrating awk script with shell script: Script to convert file names from UPPERCASE to lowercase file names or vice versa. Chapter 9: Other Resources Appendix - A : Linux File Server Tutorial (LFST) version b0.1 Rev. 2 Appendix - B : Linux Command Reference (LCR) About the author About this Document Tutorial: http://freeos.com/guides/lsst/index.html
  6. An Overview of Cryptography Gary C. Kessler 21 April 2011 CONTENTS 1. INTRODUCTION 2. THE PURPOSE OF CRYPTOGRAPHY 3. TYPES OF CRYPTOGRAPHIC ALGORITHMS 3.1. Secret Key Cryptography 3.2. Public-Key Cryptography 3.3. Hash Functions 3.4. Why Three Encryption Techniques? 3.5. The Significance of Key Length 4. TRUST MODELS 4.1. PGP Web of Trust 4.2. Kerberos 4.3. Public Key Certificates and Certification Authorities 4.4. Summary 5. CRYPTOGRAPHIC ALGORITHMS IN ACTION 5.1. Password Protection 5.2. Some of the Finer Details of Diffie-Hellman Key Exchange 5.3. Some of the Finer Details of RSA Public-Key Cryptography 5.4. Some of the Finer Details of DES, Breaking DES, and DES Variants 5.5. Pretty Good Privacy (PGP) 5.6. IP Security (IPsec) Protocol 5.7. The SSL "Family" of Secure Transaction Protocols for the World Wide Web 5.8. Elliptic Curve Cryptography 5.9. The Advanced Encryption Standard and Rijndael 5.10. Cisco's Stream Cipher 5.11. TrueCrypt 6. CONCLUSION... OF SORTS 7. REFERENCES AND FURTHER READING A. SOME MATH NOTES A.1. The Exclusive-OR (XOR) Function A.2. The modulo Function ABOUT THE AUTHOR 1. INTRODUCTION Does increased security provide comfort to paranoid people? Or does security provide some very basic protections that we are naive to believe that we don't need? During this time when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for commerce, security becomes a tremendously important issue to deal with. There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography, which is the focus of this chapter. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient. The reader is advised, then, that the topics covered in this chapter only describe the first of many steps necessary for better security in any number of situations. This paper has two major purposes. The first is to define some of the terms and concepts behind basic cryptographic methods, and to offer a way to compare the myriad cryptographic schemes in use today. The second is to provide some real examples of cryptography in use today. I would like to say at the outset that this paper is very focused on terms, concepts, and schemes in current use and is not a treatise of the whole field. No mention is made here about pre-computerized crypto schemes, the difference between a substitution and transposition cipher, cryptanalysis, or other history. Interested readers should check out some of the books in the bibliography below for this detailed — and interesting! — background information. Tutorial: http://www.garykessler.net/library/crypto.html
  7. Building Dynamic Websites By David J. Malan - Harvard Curs al unui profesor de la Harvard. Cred ca invatati mai bine de aici decat din rahaturi de tutoriale scrise cu picioarele de Vasile de 12 ani din varful muntelui. Sunt lungi, cate o ora si ceva, dar decat sa va uitati la un serial mai bine invatati cate ceva. Course Description Today's websites are increasingly dynamic. Pages are no longer static HTML files but instead generated by scripts and database calls. User interfaces are more seamless, with technologies like Ajax replacing traditional page reloads. This course teaches students how to build dynamic websites with Ajax and with Linux, Apache, MySQL, and PHP (LAMP), one of today's most popular frameworks. Students learn how to set up domain names with DNS, how to structure pages with XHTML and CSS, how to program in JavaScript and PHP, how to configure Apache and MySQL, how to design and query databases with SQL, how to use Ajax with both XML and JSON, and how to build mashups. The course explores issues of security, scalability, and cross-browser support and also discusses enterprise-level deployments of websites, including third-party hosting, virtualization, colocation in data centers, firewalling, and load-balancing. Course Index HTTP PHP PHP (continued) XML XML (continued) SQL SQL (continued) JavaScript JavaScript (continued) Ajax Ajax (continued) Security Scalability Lista: http://academicearth.org/courses/building-dynamic-websites
  8. Operating Systems and System Programming By John Kubiatowicz - Berkeley Tutoriale video: prezentari de la Universitatea Berkeley, prezentari ale unor oameni sa spunem... calificati Sunt lungi, dar cred ca merita vazute. Course Description Basic concepts of operating systems and system programming. Utility programs, subsystems, multiple-program systems. Processes, interprocess communication, and synchronization. Memory allocation, segmentation, paging. Loading and linking, libraries. Resource allocation, scheduling, performance evaluation. File systems, storage devices, I/O systems. Protection, security, and privacy. Course Index Introduction, What is an Operating System Anyway??? Concurrency: Processes, Threads, and Address Spaces Thread Dispatching Cooperating Threads Synchronization Readers-Writers; Language Support for Synchronization Tips for working in a Project Team/ Cooperating Processes and Deadlock Deadlock (continued) - Thread Scheduling Scheduling (continued) - Protection: Kernel and Address Spaces Address Translation Address Translation 2, Caching and TLBs Caching and TLBs 2, Caching and Demand Paging Page Allocation and Replacement Page Allocation and Replacement 2, Survey of I/O Systems File Systems and Disk Management Queueing Theory, Filesystems Filesystems, Naming, and Directories Networks and Distributed Systems Network Protocols Network Protocols III Network Communication Abstractions/RPC Protection and Security in Distributed Systems II ManyCore OS and Peer-to-Peer Systems Lista: http://academicearth.org/courses/operating-systems-and-system-programming
  9. http://www.google.com/codesearch?hl=en&lr=&q=lang%3Aphp+%28eval|exec|system|passthru|shell_exec%29\%28.*\%24_GET.*\%29&sbtn=Search Via: http://rstcenter.com/forum/32277-hacking-cu-google-code-search.rst
  10. Nytro

    DriverZone

    DriverZone The place to find device drivers DriverZone.com is one of the longest-standing driver update websites on the internet. DriverZone.com has always been committed to helping users find the Windows drivers they need to keep their PCs running smoothly. The DriverZone.com website has recently been redesigned with over 40,000 drivers added to the database for our users to download. We have a new look and feel that makes it easier to find what you need. http://www.driverzone.com/
  11. Mda, niste ratati... Mai comunisti de fel.
  12. Apple Responds To iPhone Location Data-Gathering Apple answers 10 questions Apr 27, 2011 | 11:10 AM | 0 Comments Apple would like to respond to the questions we have recently received about the gathering and use of location information by our devices. 1. Why is Apple tracking the location of my iPhone? Apple is not tracking the location of your iPhone. Apple has never done so and has no plans to ever do so. 2. Then why is everyone so concerned about this? Providing mobile users with fast and accurate location information while preserving their security and privacy has raised some very complex technical issues which are hard to communicate in a soundbite. Users are confused, partly because the creators of this new technology (including Apple) have not provided enough education about these issues to date. 3. Why is my iPhone logging my location? The iPhone is not logging your location. Rather, it’s maintaining a database of Wi-Fi hotspots and cell towers around your current location, some of which may be located more than one hundred miles away from your iPhone, to help your iPhone rapidly and accurately calculate its location when requested. Calculating a phone’s location using just GPS satellite data can take up to several minutes. iPhone can reduce this time to just a few seconds by using Wi-Fi hotspot and cell tower data to quickly find GPS satellites, and even triangulate its location using just Wi-Fi hotspot and cell tower data when GPS is not available (such as indoors or in basements). These calculations are performed live on the iPhone using a crowd-sourced database of Wi-Fi hotspot and cell tower data that is generated by tens of millions of iPhones sending the geo-tagged locations of nearby Wi-Fi hotspots and cell towers in an anonymous and encrypted form to Apple. 4. Is this crowd-sourced database stored on the iPhone? The entire crowd-sourced database is too big to store on an iPhone, so we download an appropriate subset (cache) onto each iPhone. This cache is protected but not encrypted, and is backed up in iTunes whenever you back up your iPhone. The backup is encrypted or not, depending on the user settings in iTunes. The location data that researchers are seeing on the iPhone is not the past or present location of the iPhone, but rather the locations of Wi-Fi hotspots and cell towers surrounding the iPhone’s location, which can be more than one hundred miles away from the iPhone. We plan to cease backing up this cache in a software update coming soon (see Software Update section below). 5. Can Apple locate me based on my geo-tagged Wi-Fi hotspot and cell tower data? No. This data is sent to Apple in an anonymous and encrypted form. Apple cannot identify the source of this data. 6. People have identified up to a year’s worth of location data being stored on the iPhone. Why does my iPhone need so much data in order to assist it in finding my location today? This data is not the iPhone’s location data—it is a subset (cache) of the crowd-sourced Wi-Fi hotspot and cell tower database which is downloaded from Apple into the iPhone to assist the iPhone in rapidly and accurately calculating location. The reason the iPhone stores so much data is a bug we uncovered and plan to fix shortly (see Software Update section below). We don’t think the iPhone needs to store more than seven days of this data. 7. When I turn off Location Services, why does my iPhone sometimes continue updating its Wi-Fi and cell tower data from Apple’s crowd-sourced database? It shouldn’t. This is a bug, which we plan to fix shortly (see Software Update section below). 8. What other location data is Apple collecting from the iPhone besides crowd-sourced Wi-Fi hotspot and cell tower data? Apple is now collecting anonymous traffic data to build a crowd-sourced traffic database with the goal of providing iPhone users an improved traffic service in the next couple of years. 9. Does Apple currently provide any data collected from iPhones to third parties? We provide anonymous crash logs from users that have opted in to third-party developers to help them debug their apps. Our iAds advertising system can use location as a factor in targeting ads. Location is not shared with any third party or ad unless the user explicitly approves giving the current location to the current ad (for example, to request the ad locate the Target store nearest them). 10. Does Apple believe that personal information security and privacy are important? Yes, we strongly do. For example, iPhone was the first to ask users to give their permission for each and every app that wanted to use location. Apple will continue to be one of the leaders in strengthening personal information security and privacy. Software Update Sometime in the next few weeks Apple will release a free iOS software update that: * reduces the size of the crowd-sourced Wi-Fi hotspot and cell tower database cached on the iPhone, * ceases backing up this cache, and * deletes this cache entirely when Location Services is turned off. In the next major iOS software release the cache will also be encrypted on the iPhone. Sursa: http://www.darkreading.com/insider-threat/167801100/security/application-security/229402333/apple-responds-to-iphone-location-data-gathering.html
  13. Microsoft Baseline Security Analyzer Microsoft Baseline Security Analyzer (MBSA) is an easy-to-use tool designed for the IT professional that helps small- and medium-sized businesses determine their security state in accordance with Microsoft security recommendations and offers specific remediation guidance. Improve your security management process by using MBSA to detect common security misconfigurations and missing security updates on your computer systems. Screenshot: http://i51.tinypic.com/5ur4tz.png MBSA 2.2 MBSA 2.2 is the latest version of Microsoft’s free security and vulnerability assessment scan tool for administrators, security auditors, and IT professionals. MBSA 2.2 builds on the previous MBSA 2.1.1 version that supports Windows 7 and Windows Server 2008 R2 and corrects minor issues reported by customers. MBSA will work with all supported versions of Windows including Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7 and Windows Server 2008 R2. MBSA is also compatible with Microsoft Update, Windows Server Update Services 2.0 and 3.0, the SMS Inventory Tool for Microsoft Update (ITMU), and SCCM 2007. For a complete list of products supported by MBSA based on Microsoft Update (MU) and Windows Server Update Services (WSUS) technologies, visit the Products Supported by WSUS page. See the MBSA page for more information or to download the latest version. Unless specifically noted, all references to MBSA 2.0 in the MBSA TechNet pages also apply to all versions of MBSA. Download: http://www.microsoft.com/downloads/en/details.aspx?FamilyID=02BE8AEE-A3B6-4D94-B1C9-4B1989E0900C
  14. SQL Injection Cheat Sheet Ferruh Mavituna Logo SQL Injection Cheat Sheet Etiketler sql injection, security, web application security, web uygulamasi guvenligi, english, 15.03.2007 Find and exploit SQL Injections, Local File Inclusion, XSS and many other issues with Netsparker Web Application Security Scanner SQL Injection Cheat Sheet, Document Version 1.4 About SQL Injection Cheat Sheet Currently only for MySQL and Microsoft SQL Server, some ORACLE and some PostgreSQL. Most of samples are not correct for every single situation. Most of the real world environments may change because of parenthesis, different code bases and unexpected, strange SQL sentences. Samples are provided to allow reader to get basic idea of a potential attack and almost every section includes a brief information about itself. M : MySQL S : SQL Server P : PostgreSQL O : Oracle + : Possibly all other databases Examples; (MS) means : MySQL and SQL Server etc. (M*S) means : Only in some versions of MySQL or special conditions see related note and SQL Server Table Of Contents About SQL Injection Cheat Sheet Syntax Reference, Sample Attacks and Dirty SQL Injection Tricks Line Comments SQL Injection Attack Samples Inline Comments Classical Inline Comment SQL Injection Attack Samples MySQL Version Detection Sample Attacks Stacking Queries Language / Database Stacked Query Support Table About MySQL and PHP Stacked SQL Injection Attack Samples If Statements MySQL If Statement SQL Server If Statement If Statement SQL Injection Attack Samples Using Integers String Operations String Concatenation Strings without Quotes Hex based SQL Injection Samples String Modification & Related Union Injections UNION – Fixing Language Issues Bypassing Login Screens Enabling xp_cmdshell in SQL Server 2005 Other parts are not so well formatted but check out by yourself, drafts, notes and stuff, scroll down and see. Articol: http://ferruh.mavituna.com/sql-injection-cheatsheet-oku/ Cititi...
  15. Freeware Linux Reader for Windows Get access to any files from Windows! How to get safe and quick access to alternative file systems? DiskInternals Linux Reader is a new easy way to do this. This program plays the role of a bridge between your Windows and Ext2/Ext3/Ext4, HFS and ReiserFS file systems. This easy-to-use tool runs under Windows and allows you to browse Ext2/3/4, HFS and ReiserFS file systems There are a number of evident merits of the program, which you should know. First of all, DiskInternals Linux Reader is absolutely free. Secondly, the program provides for read-only access and does not allow you to make records in file system partitions. This guarantees that the interference in an alterative file system will not affect the work of Linux later. Apart from this, it is necessary to note, that it gives you an opportunity to use common Windows Explorer for extracting data. A preview option for pictures is one more pleasant point, which is worth mentioning. How to get safe and quick access to any file systems? DiskInternals Linux Reader is an easy and short way to solve the problem! While saving, it ignores file security policies. It means that it is possible to access absolutely any file on a Linux disk from Windows. The program can create and open disk images. Linux Reader is 100% FREE. Download: http://www.diskinternals.com/download/Linux_Reader.exe Testat pe Windows 7, merge perfect: http://i51.tinypic.com/2rm5qvo.png
  16. IBM Developerworks O gramada de articole interesante: Linux, PHP, JavaScript si multe altele. http://www.ibm.com/developerworks/
  17. V-a da-u ban dak may comentaty atit d gramatyca, ortografye s-au altceva-uri.
  18. Top 10 cele mai bune browsere din 2011 De-a lungul timpului au existat nenum?rate dezbateri privind cele mai eficiente browsere de pe pia??. Pentru c? de la an la an apar noi versiuni, dar ?i noi produse de navigat pe internet, iat? cel mai recent top al celor mai bune 10 browsere din 2011. Clasamentul este realizat de cei de la Axleration. 1. Mozilla Firefox Mozilla a lansat aceast? versiune pe data de 22 martie. Interfa?a îmbun?t??it?, viteza crescut?, dar ?i accelerarea hardware fac din cea mai nou? versiune a Firefox cel mai bun browser. Specifica?ii: Butonul Firefox – un substitut pentru meniuri Îmbun?t??ire serioas? a butonului Bookmark Navigare Offline Zoom De 3 ori mai rapid decât versiunea 3.6 Grafic? 3D Integrare Anti-virus Anti-phishing Update Automat Teme (Personas) 10.000 de modalitati de a-l personaliza Suport Multi touch Traducere în 75 de limbi Implementarea standardelor HTML5 Fonturi speciale Auto Complete îmbun?t??it Session restore 2. Google Chrome 11 Google Chrome este de altfel ?i al doilea cel mai utilizat browser. Dup? succesul variantei 10 , Google a decis lansarea versiunii beta a Google Chrome 11. De?i nu se ?tie pân? acum data de lansare a versiunii oficiale, Chrome 11 se bucura deja de un succes r?sun?tor. Specifica?ii: Sc?derea utilizarii CPU cu 80% Search box mai eficient Download mai u?or Crestere spectaculoa?a a vitezei Java Script Update-uri automate Session restore Cu 68% mai rapid decat varianta anterioara Implementarea standardelor HTML5 Anti malware Anti Phishing Grafica 3D Recuno?terea vocii Teme Auto Complete mult îmbun?t??it 3. Internet Explorer 9 Chiar dac? este cel mai bun browser de pân? acum al celor de la Microsoft, înc? nu poate concura cu cele dou? men?ionate mai sus. Specifica?ii: Integrare cu Windows 7 Interfa?? nou? Design nou pentru pagina New Tab Bara de notificare Integrare a barei de adrese ?i cea a c?utarilor Mult mai rapid decat variantele anterioare Implementare a standardelor HTML5 Update-uri automate Îmbun?t??ire a caracteristicilor Add-on Filtru smart screen Caracteristici de securitate ?i confiden?ialitate îmbun?t??ite 4. Opera 11 Opera 11 este un browser restilizat cu multe facilit??i ?i mult mai sigur chiar ?i decât Mozilla Firefox 4. Specifica?ii: Buton Opera Visual Mouse Gestures Standarde HTML 5 Caracteristici CSS3 Panou de mail ce poate fi drag-uit Skins si Layout uri Widget-uri Torrent download rapid Foarte bine securizat pentru download-uri Cel mai rapid motor JavaScript 5. Safari Apple a lansat cea mai recent? versiune a Safari, numit? de altfel Safari 5.0.4, acum câteva s?pt?mâni. Browser-ul americanilor de la Apple poate fi folosit atât pe Windows 7, cât ?i pe Mac 10. Specifica?ii: Suport HTML5 Safari Reader De 2 ori mai rapid decat Firefox 3.6 Casu?? de adrese inteligent? Accelerare Hardware Tastatura de navigare îmbun?t??it? Suport de îmbun?t??ire a clarit??ii imaginilor (ICC) Motorul de cautare WebKit Motoare Nitro ?i JavaScript mai rapide 6. Maxthon Acest browser este cunoscut datorit? setului bogat de caracteristici pe care îl de?ine. De asemenea, acesta face navigarea foarte placut? prin plug-in-urile speciale ?i prin solicitarea sc?zut? a memoriei. Specifica?ii: Butonul Maxthon Ad hunter-ul Dual Display Engine Visual Mouse Gesture Magic Fill Skin-uri Drag and drop foarte bun 7. Flock Flock este un web browser specializat în furnizarea de re?ele sociale ?i facilit??i Web 2.0. Este perfect pentru dependen?ii de MySpace, Facebook, YouTube, Twitter, Flickr, Blogger, Gmail ?i Yahoo! Mail. Specifica?ii: Schimbul nativ de text, link-uri, fotografii ?i clipuri video Media Bar-ul – previzualizare a clipurilor video online ?i a fotografiilor Feed Reader Blog Editor – permite postarea directa în orice blog desemnat 8. Avant 2011 alpha 1 Acesta este cunoscut si sub numele de Avant 11.7. Aspectul s?u profesional i-a adus numero?i utilizatori, îns? nu atât de mul?i încât s? poat? concura cu gigan?ii Mozilla ?i Chrome. Specifica?ii: Zoom de 500% Foarte simplu de folosit Blocheaz? doar Pop-up-urile Viteza asemanatoare cu IE8 9. Deepnet Explorer 1.5 Deepnet Explorer nu reu?e?te s? impresioneze prin nimic special, însa ofer? câteva facilit??i aparte. Se concentreaz? în principal pe fluxurile RSS si re?eaua P2P. Specifica?ii: Buton de securitate pe fiecare tab Sandbox Interfa?? customizabil? Suport online ?i email Vitez? destul de bun? 10. Phaseout 5 Este un browser bazat pe Flash si este foarte apeciat pentru skin-urile sale speciale. Specifica?ii: Navigare u?oar? Sandboxing Design futuristic Viteza slab? fa?? de toate celelalte brosere men?ionate Sursa: » Top 10 cele mai bune browsere din 2011 via money.ro
  19. Malware Analyser 3.0 Malware Analyser is freeware tool to perform static and dynamic analysis on malwares. This is a stepping release since for the first time the Dynamic Analysis has been included for file creations ( will be improved for other network/registry indicators sooner) along with process dumping feature. It can be useful for: 1. String based analysis for registry , API calls , IRC Commands , DLL's called and VM Aware. 2. Display detailed headers of PE with all its section details, import and export symbols etc. 3.On Distro , can perform an ascii dump of the PE along with other options ( check --help argument). 4. For windows , it can generate various section of a PE : DOS Header , DOS Stub, PE File Header , Image Optional Header , Section Table , Data Directories , Sections 5. ASCII dump on windows machine. 6. Code Analysis ( disassembling ) 7. Online malware checking ( VirusTotal - Free Online Virus, Malware and URL Scanner ) 8. Check for Packer from the Database. 9. Tracer functionality : Can be used to identify Anti-debugging Calls tricks , File system manipulations Calls, Rootkit Hooks, Keyboard Hooks , DEP Setting Change,Network Identification traces, Privilege escalation traces , Hardware Breakpoint traces 10. Signature Creation: Allows to create signature of malware 11. CRC and Timestamp verification. 12. Entropy based scan to identify malicious sections. 13. Dump a process memory 14. Dynamic Analysis (Still in beginning Stage ) for file creations. Download: https://sourceforge.net/projects/malwareanalyser/files/malware_analyser%203.0.zip/download http://dl.packetstormsecurity.net/forensics/malware_analyser-3.0.zip Sursa: http://www.malwareanalyser.com/home/index.php/2-uncategorised/1-malware-analyser
  20. Linux Hardening & Security (cP/WHM + Apache) ======================================= |-----------:[iNFO]:------------------| |-------------------------------------| | Title: "Linux Hardening & Security" | | Author: Krun!x | QK | | E-Mail: only4lul@gmail.com | | Home: madspot.org | ljuska.org | | Date: 2009-06-20 | ======================================= Content: 1) Intruduction 2) cP/WHM Installation and cP/WHM Configuration 3) The server and it's services | PHP Installation, Optimization & Security 4) Kernel Hardening | Linux Kernel + Grsecurity Patch 5) SSH 6) Firewall | DDoS Protection 7) Mod_Security 8) Anti-Virus - ClamAV 9) Rootkit 10) The Rest of Shits ======================================= |-----------:[INFO]:------------------| |-------------------------------------| | Title: "Linux Hardening & Security" | | Author: Krun!x | QK | | E-Mail: only4lul@gmail.com | | Home: madspot.org | ljuska.org | | Date: 2009-06-20 | ======================================= Content: 1) Intruduction 2) cP/WHM Installation and cP/WHM Configuration 3) The server and it's services | PHP Installation, Optimization & Security 4) Kernel Hardening | Linux Kernel + Grsecurity Patch 5) SSH 6) Firewall | DDoS Protection 7) Mod_Security 8) Anti-Virus - ClamAV 9) Rootkit 10) The Rest of Shits =================== | 1) Intruduction | =================== I wrote a step by step paper how to secure linux server with cP/WHM and Apache installed. By default, linux is not secured enough but you have to understand there is no such thing as "totally secured server/system". The purpose of this paper is to understand how to at least provide some kind of security to the server. I prefer lsws web-server without any Control Panel at all but for this paper I have used CentOS 5 with cP/WHM and Apache web-server installed since a lot of hosting companies and individuals out there are using it. Let's start So, you bought the server with CentOS 5 installed. If you ordered cP/WHM together with the server you can skip 2.1 step ============================================ | 2) cP/WHM installation and configuration | ============================================ 2.1) cP/WHM Installation To begin your installation, use the following commands into SSH: root@server [~]# cd /home root@server [/home]# wget http://layer1.cpanel.net/latest root@server [/home]# ./latest ----------------------------------------------------------------------------------------------------- cd /home - Opens /home directory wget http://layer1.cpanel.net/latest - Fetches the latest installation file from the cPanel servers. ./latest - Opens and runs the installation files. ------------------------------------------------------------------------------------------------------ cP/WHM should be installed now. You should be able to access cP via http://serverip:2082(SSL-2083) or http://serverip/cpanel and WHM via http://serverip:2086(SSL-2087) or http://serverip/whm. Let's configure it now. 2.2) cP/WHM Configuration Login to WHM using root username/passwd http://serverip:2086 or http://serverip/whm WHM - Server setup - Tweak Security: ------------------------------------- Enable open_basedir protection Disable Compilers for all accounts(except root) Enable Shell Bomb/memory Protection Enable cPHulk Brute Force Protection WHM - Account Functions: ------------------------- Disable cPanel Demo Mode Disable shell access for all accounts(except root) WHM - Service Configuration - FTP Configuration: ------------------------------------------------- Disable anonymous FTP access WHM - MySQL: ------------- Set some MySQL password(Don't set the same password like for the root access) -If you didn't set MySQL password someone will be able to login into the DB with username "root" without password and delete/edit/download any db on the server. WHM - Service Configuration - Apache Configuration - PHP and SuExec Configuration -------------------- Enable suEXEC - suEXEC = On When PHP runs as an Apache Module it executes as the user/group of the webserver which is usually "nobody" or "apache". suEXEC changes this so scripts are run as a CGI. Than means scripts are executed as the user that created them. With suEXEC script permissions can't be set to 777(read/write/execute at user/group/world level) =============================================================================== | 3) The server and it's services | PHP Installation, Optimization & Security | =============================================================================== 3.1) Keep all services and scripts up to date and make sure that you running the latest secured version. On CentOS type this into SSH to upgrade/update services on the server. [root@server ~]# yum upgrade or [root@server ~]# yum update 3.2) PHP installation/update, configuration and optimization + Suhosin patch First download what you need, type the following into SSH: root@server [~]# cd /root root@server [~]# wget http://www.php.net/get/php-5.2.9.tar.bz2/from/this/mirror root@server [~]# wget http://download.suhosin.org/suhosin-patch-5.2.8-0.9.6.3.patch.gz root@server [~]# wget http://download.suhosin.org/suhosin-0.9.27.tgz Untar PHP: root@server [~]# tar xvjf php-5.2.9.tar.bz2 Patch the source: root@server [~]# gunzip < suhosin-patch-5.2.8-0.9.6.3.patch.gz | patch -p0 Configure the source. If you want to use the same config as you used for the last php build it's not a problem but you will have to add: enable-suhosin to old config. To get an old config type this into SSH: root@server [~]# php -i | grep ./configure root@server [~]# cd php-5.2.9 root@server [~/php-5.2.9]# ./configure --enable-suhosin + old config(add old config you got from "php -i | grep ./configure" here) root@server [~/php-5.2.9]# make root@server [~/php-5.2.9]# make install Note: If you get an error like make: command not found or patch: Command not found, you will have to install "make" and "patch". It can be done easly. Just type this into SSH: root@server [~]# yum install make root@server [~]# yum install patch Now check is everything as you want. Upload php script like this on the server: <?php phpinfo(); ?> And open it via your browser and you will see your PHP configuration there. 3.3) Suhosin We will install Suhosin now, it's an advanced protection system for PHP. root@server [~]# tar zxvf suhosin-0.9.27.tgz root@server [~]# cd suhosin-0.9.27 root@server [~/suhosin-0.9.27]# phpize root@server [~/suhosin-0.9.27]# ./configure root@server [~/suhosin-0.9.27]# make root@server [~/suhosin-0.9.27]# make install After you installed suhosin you will get something like this: It's installed to /usr/local/lib/php/extensions/no-debug-non-zts-20060613/ Now edit your php.ini. If you don't know where php.ini located is, type this into SSH. root@server [~]# php -i | grep php.ini Configuration File (php.ini) Path => /usr/local/lib Loaded Configuration File => /usr/local/lib/php.ini It means you have to edit /usr/local/lib/php.ini Type into SHH: root@server [~]# nano /usr/local/lib/php.ini If you get an error, nano: Command not found, then: root@server [~]# yum install nano Find "extension_dir =" and add: extension_dir = /usr/local/lib/php/extensions/no-debug-non-zts-20060613/ To save it, CTRL + O and press the enter button on your keyboard. 3.4) Zend Optimizer: Download Zend Optimizer from http://www.zend.com/store/products/zend-optimizer.php root@server [~]# tar -zxvf ZendOptimizer-3.3.3-linux-glibc23-i386.tar.gz root@server [~]# cd ZendOptimizer-3.3.3-linux-glibc23-i386 root@server [~/ZendOptimizer-3.3.3-linux-glibc23-i386]# ./install.sh Welcome to Zend Optimizer installation..... - Press Enter button Zend licence agreement... - Press Enter button Do you accept the terms of this licence... - Yes, press Enter button Location of Zend Optimizer... - /usr/local/Zend, press Enter button Confirm the location of your php.ini file...- /usr/local/lib, press Enter button Are you using Apache web-server.. - Yes, press Enter button Specify the full path to the Apache control utility(apachectl)...-/usr/local/apache/bin/apachectl, press Enter button The installation has completed seccessfully...- Press Enter button Now restart apache, type this into SSH: root@server [~]# service httpd restart 3.5) php.ini & disabled functions Edit php.ini like this: root@server [~]# nano /usr/local/lib/php.ini ------------------------------------------------------------ safe_mode = On expose_php = Off Enable_dl= Off magic_quotes = On register_globals = off display errors = off disable_functions = system, show_source, symlink, exec, dl, shell_exec, passthru, phpinfo, escapeshellarg,escapeshellcmd ------------------------------------------------------------- root@server [~]# service httpd restart Or you can edit php.ini via WHM: WHM - Service Configuration - PHP Configuration Editor ========================================================= | 4) Kernel Hardening | Linux Kernel + Grsecurity Patch | ========================================================= Description : grsecurity is an innovative approach to security utilizing a multi-layered detection, prevention, and containment model. It is licensed under the GPL. It offers among many other features: -An intelligent and robust Role-Based Access Control (RBAC) system that can generate least privilege policies for your entire system with no configuration -Change root (chroot) hardening -/tmp race prevention -Extensive auditing -Prevention of arbitrary code execution, regardless of the technique used (stack smashing, heap corruption, etc) -Prevention of arbitrary code execution in the kernel -Randomization of the stack, library, and heap bases -Kernel stack base randomization -Protection against exploitable null-pointer dereference bugs in the kernel -Reduction of the risk of sensitive information being leaked by arbitrary-read kernel bugs -A restriction that allows a user to only view his/her processes -Security alerts and audits that contain the IP address of the person causing the alert Downloading and patching kernel with grsecurity root@server [~]# cd /root root@server [~]# wget http://www.kernel.org/pub/linux/kernel/v2.6/linux-2.6.26.5.tar.gz root@server [~]# wget http://www.grsecurity.com/test/grsecurity-2.1.12-2.6.26.5-200809141715.patch root@server [~]# tar xzvf linux-2.6.26.5.tar.gz root@server [~]# patch -p0 < grsecurity-2.1.12-2.6.26.5-200809141715.patch root@server [~]# mv linux-2.6.26.5 linux-2.6.26.5-grsec root@server [~]# ln -s linux-2.6.26.5-grsec/ linux root@server [~/linux]# cd linux root@server [~/linux]# cp /boot/config-`uname -r` .config root@server [~/linux]# make oldconfig Compile the Kernel: root@server [~/linux]# make bzImage root@server [~/linux]# make modules root@server [~/linux]# make modules_install root@server [~/linux]# make install Check your grub loader config, and make sure default is 0 root@server [~/linux]# nano /boot/grub/grub.conf Reboot the server root@server [~/linux]# reboot ========== | 5) SSH | ========== In order to change SSH port and protocol you will have to edit sshd_config root@server [~]# nano /etc/ssh/sshd_config Change Protocol 2,1 to Protocol 2 Change #Port 22 to some other port and uncomment it Like, Port 1337 There is a lot of script kiddiez with brute forcers and they will try to crack our ssh pass because they know username is root, port is 22 But we were smarter, we have changed SSH port Also, their "brute forcing" can increase server load, which means our sites(hosted on that server) will be slower. SSH Legal Message edit /etc/motd, write in motd something like this: "ALERT! That is a secured area. Your IP is logged. Administrator has been notified" When someone logins into SSH he will see that message: ALERT! That is a secured area. Your IP is logged. Administrator has been notified If you want to recieve an email every time when someone logins into SSH as root, edit .bash_profile(It's located in /root directory) and put this at the end of file: echo 'ALERT - Root Shell Access on:' `date` `who` | mail -s "Alert: Root Access from `who | awk '{print $6}'`" mail@something.com And at the end restart SSH, type "service sshd restart" into SSH ================================= | 6) Firewall | DDoS Protection | ================================= 6.1) Firewall, CSF Installation root@server [~]# wget http://www.configserver.com/free/csf.tgz root@server [~]# tar -xzf csf.tgz root@server [~]# cd csf In order to install csf your server needs to have some ipt modules enabled. csftest is a perl script and it comes with csf. You can check those mudules with it. root@server [~/csf]# ./csftest.pl The output should be like this: root@server [~/csf]# ./csftest.pl Testing ip_tables/iptable_filter...OK Testing ipt_LOG...OK Testing ipt_multiport/xt_multiport...OK Testing ipt_REJECT...OK Testing ipt_state/xt_state...OK Testing ipt_limit/xt_limit...OK Testing ipt_recent...OK Testing ipt_owner...OK Testing iptable_nat/ipt_REDIRECT...OK Don't worry if you don't have all those mudules enabled, csf will work if you didn't get any FATAL errors at the end of the output. Now, get to installation root@server [~/csf]# ./install.sh You will have to edit csf.conf file. It's located here: /etc/csf/csf.conf You need to edit it like this: Testing = "0" And you need to configure open ports in csf.conf or you won't be able to access these ports. In most cases it should be configured like this if you are using cP/WHM. If you are running something on some other port you will have to enable it here. If you changed SSH port you will have to add a new port here: # Allow incoming TCP ports TCP_IN = "20,21,22,25,53,80,110,143,443,465,587,993,995,2077,2078,2082,2083,2086,2087,2095,2096" # Allow outgoing TCP ports TCP_OUT = "20,21,22,25,37,43,53,80,110,113,443,587,873,2087,2089,2703" 6.2) CSF Connection Limit There is in csf.conf CT option, configure it like this CT_LIMIT = "200" It means every IP with more than 200 connections is going to be blocked. CT_PERMANENT = "1" IP will blocked permanenty CT_BLOCK_TIME = "1800" IP will be blocked 1800 secs(1800 secs = 30 mins) CT_INTERVAL = "60" Set this to the the number of seconds between connection tracking scans. After csf.conf editing you need to restart csf root@server [~# service csf restart 6.3) SYN Cookies Edit the /etc/sysctl.conf file and add the following line in order to enable SYN cookies protection: ----------------------------------- # Enable TCP SYN Cookie Protection net.ipv4.tcp_syncookies = 1 ----------------------------------- root@server [~/]# service network restart 6.4) CSF as security testing tool CSF has an option "Server Security Check". Go to WHM - Plugins - CSF - Test Server Security. You will see additional steps how to secure the server even more. I'm writing only about most important things here and I covered most of them in the paper but if you want you can follow steps provided by CSF to get the server even more secured. 6.5) Mod_Evasive ModEvasive module for apache offers protection against DDoS (denial of service attacks) on your server. To install it login into SSH and type: --------------------------------------------------------------------------------- root@server [~]# cd /root/ root@server [~]# wget http://www.zdziarski.com/projects/mod_evasive/mod_evasive_1.10.1.tar.gz root@server [~]# tar zxf mode_evasive-1.10.1.tar.gz root@server [~]# cd mod_evasive then type... root@server [~/mod_evasive]# /usr/sbin/apxs -cia mod_evasive20.c --------------------------------------------------------------------------------- When mod_evasive is installed, place the following lines in your httpd.conf (/etc/httpd/conf/httpd.conf) -------------------------------- <IfModule mod_evasive20.c> DOSHashTableSize 3097 DOSPageCount 2 DOSSiteCount 50 DOSPageInterval 1 DOSSiteInterval 1 DOSBlockingPeriod 10 </IfModule> -------------------------------- 6.6) Random things: csf -d IP - Block an IP with CSF csf -dr IP - Unblock an IP with CSF csf -s - Start firewall rules csf -f - Flush/stop firewall rules csf -r - Restart firewall rules csf -x - Disable CSF csf -e - Enable CSF csf -c - Check for updates csf -h - Show help screen -Block an IP via iptables iptables -A INPUT -s IP -j DROP -Unblock an IP via iptables iptables -A INPUT -s IP -j ACCEPT -See how many IP addresses are connected to the server and how many connections has each of them. netstat -ntu | awk '{print $5}' | cut -d: -f1 | sort | uniq -c | sort -n =================== | 7) Mod_Security | =================== Mod_Security is a web application firewall and he can help us to secure our sites against RFI, LFI, XSS, SQL Injection etc If you use cP/WHM you can easly enable Mod_security in WHM - Plugins - Enable Mod_Security and save Now I will explain how to install Mod_security from source. You can't install Mod_Security if you don't have libxml2 and http-devel libraries. Also, you need to enable mod_unique_id in apache modules, but don't worry, I will explain how to do it Login into SSH and type... root@server [~]# yum install libxml2 libxml2-devel httpd-devel libxml2 libxml2-devel httpd-devel should be installed now then you need to edit httpd.conf file, you can find it here: root@server [~]# nano /etc/httpd/conf/httpd.conf You need to add this in your httpd.conf file LoadModule unique_id_module modules/mod_unique_id.so Now download the latest version of mod_security for apache2 from http://www.modsecurity.org login into SSH and type... root@server [~]# cd /root/ root@server [~]# wget http://www.modsecurity.org/download/modsecurity-apache_2.5.6.tar.gz root@server [~]# tar zxf modsecurity-apache_2.5.6.tar.gz root@server [~]# cd modsecurity-apache_2.5.6 root@server [~/modsecurity-apache_2.5.6]# cd apache2 then type: root@server [~/modsecurity-apache_2.5.6/apache2]# ./configure root@server [~/modsecurity-apache_2.5.6/apache2]# make root@server [~/modsecurity-apache_2.5.6/apache2]# make install Go at the end of httpd.conf and place an include for our config/rules file... Include /etc/httpd/conf/modsecurity.conf --------------------------------------------------------- # /etc/httpd/conf/httpd.conf LoadModule unique_id_module modules/mod_unique_id.so LoadFile /usr/lib/libxml2.so LoadModule security2_module modules/mod_security2.so Include /etc/httpd/conf/modsecurity.conf --------------------------------------------------------- You need to find a good rules for Mod_Security. You can find them at official Mod_Security site. Also, give a try to gotroot.com rules. When you find a good rules, just put them in /etc/httpd/conf/modsecurity.conf And restart httpd at the end, type "service httpd restart" into SSH. ========================== | 8) Anti-Virus - ClamAV | ========================== You need AV protection to protect the server against worms and trojans invading your mailbox and files! Just install clamav (a free open source antivirus software for linux). More information can be found on clamav. website - http://www.clamav.net In order to install CLamAV login into SSH and type root@server [~]# yum install clamav Once you have installed clamav for your CentOS, here are some basic commands you will need: Update the antivirus database root@server [~]# freshclam Run antivirus root@server [~]# clamscan -r /home Running as Cron Daily Job To run antivirus as a cron job (automatically scan daily) just run crontab -e from your command line. Then add the following line and save the file. @daily root clamscan -R /home It means clamav will be scanning /home directory every day. You can change the folder to whatever you want to scan. ============== | 9) Rootkit | ============== Rootkit scanner is scanning tool to ensure you for about 99.9%* you're clean of nasty tools. This tool scans for rootkits, backdoors and local exploits by running tests like: -MD5 hash compare -Look for default files used by rootkits -Wrong file permissions for binaries -Look for suspected strings in LKM and KLD modules -Look for hidden files -Optional scan within plaintext and binary files Instalation: Login into SSH and type root@server [~]# cd /root/ root@server [~]# wget http://downloads.rootkit.nl/rkhunter-1.2.7.tar.gz root@server [~]# tar -zxvf rkhunter-1.2.7.tar.gz root@server [~]# cd rkhunter root@server [~rkhunter]# ./installer.sh Scan the server with rkhunter root@server [~]# rkhunter -c ========================= | 10) The Rest of Shits | ========================= 10.1) Random suggestions If you use bind DNS server then we need to edit named.conf file named.conf is located here: /etc/named.conf and add recursion no; under Options ---------------------------- Options{ recursion no; ---------------------------- Now restart bind, type into SSH root@server [~]# service named restart This will prevent lookups from dnstools.com and similar services and reduce server load In order to prevent IP spoofing, you need to edit host.conf file like this: This file is located here: /etc/host.conf Add that in host.conf ------------------ order bind,hosts nospoof on ------------------ Hide the Apache version number: edit httpd.conf (/etc/httpd/conf/httpd.conf) ----------------------- ServerSignature Off ----------------------- 10.2) Passwords Don't use the same password you are using for the server on some other places. When the Datacenter contacts you via e-mail or phone, always request more informations. Remember, someone alse could contact you to get some information or even root passwords. 10.3) Random thoughts No matter what you need to secure the server, don't think you are safe only because you are not personally involved in any shits with "hackers". When you are hosting hacking/warez related sites you are the target. There is no such thing as totally secured server. Most important things are backups, make sure you will always have an "up-to-date" offsite backups ^^ Anyhow, this is the end of my paper, I hope it will help you to get some kind of security to your server. -Krun!x
  21. phpDesigner 7 phpDesigner 7 is an all-in-one solution for your web-development. It is a rapid fast full-featured PHP editor and PHP IDE with built-in HTML-, CSS- and JavaScript editors and FTP! ~Create, edit, debug, analyze and publish PHP, HTML, CSS and JavaScript ~Speed up your coding with tons of time-saving features ~Support all PHP frameworks e.g. Zend, CodeIgniter, Yii, Symfony and Prado ~JavaScript frameworks jQuery, Ext JS, YUI, Dojo, MooTools and Prototype Perfect for professional developers, novices and anyone, who wants to code great websites and improve their coding skills. Download: http://www.mpsoftware.dk/downloads.php Informatii: http://www.mpsoftware.dk/phpdesigner.php
  22. Pe de-o parte e bine, ca vezi reclame care iti arata ceva util, ce ti-ar putea fi de folos, pe de alta parte ar trebui sa ai o oarecare intimitate...
  23. Stiu si eu unul, dar nu am reusit sa il exploatez, e ciudat de tot, nici nu cred ca poate fi exploatat. Nu e gasit de mine, e gasit de... altcineva. Dar nu am reusit nimic, e posibil sa nu se poata nimic. Gaseste versiunea bazei de date macar, si probabil vei primi ceva. Asta daca reusesti sa o gasesti. Cu Havij sau alte programele nu ai nici cea mea mica sansa.
  24. Major New DNS Vulnerability Discovered Posted by Mathew J. Schwartz, InformationWeek February 25, 2011 The Internet Systems Consortium has issued a warning that certain versions of BIND are vulnerable to a denial of service attack. BIND is the most widely used domain name system protocol implementation. The latest version of BIND, 9.7.3, is not affected, but versions 9.7.1 through 9.7.2-P3 are vulnerable. Attackers could exploit the vulnerability to create a denial of service attack because of the way that BIND handles incremental zone transfers (IXFR), which is a technique for transferring data on top of the Transmission Control Protocol (TCP). "When an authoritative server processes a successful IXFR transfer or a dynamic update, there is a small window of time during which the IXFR/update--coupled with a query--may cause a deadlock to occur," according to the ISC's security advisory issued on Tuesday. "This deadlock will cause the server to stop processing all requests. A high query rate and/or a high update rate will increase the probability of this condition." According to the ISC, this severe vulnerability can be remotely exploited, although no related attacks have been seen in the wild. DNS is the technique used to resolve domain names into IP addresses. Accordingly, security experts are urging any organizations running a vulnerable version of BIND to upgrade immediately. "IXFRs between authoritative name servers are a vital part of keeping DNS both alive and correct," said Paul Ducklin head of technology for antivirus firm Sophos in the Asia-Pacific region, in a blog post. With 300,000 new computers being connected to the Internet every day, as well as the role of DNS in supporting cloud computing, its importance continues to increase. "DNS servers are at the heart of many cloud-style security services, providing the mechanism by which up-to-date blocklist data is published," said Ducklin. He also noted that Apple OS X includes a copy of BIND, though most people don't run it. Even if they do, however, the latest Mac operating system, OS X 10.6.6, includes the older BIND 9.6, which is not vulnerable to the above exploit. "Sometimes, being behind the curve is a good thing," he said. Sursa: Major New DNS Vulnerability Discovered - Network Computing
×
×
  • Create New...