The Adaptec Storage Manager is also working very well on Ubuntu 10.10. The current version of the Adaptec Storage Manager is v6.5-18579 which is dated August 25, 2010.
Dradis is an effective information sharing tool. It is pre-installed in Back|Track 4 R2.
Step 1 :
Setting up Dradis server.
cd /pentest/misc/dradis/server
ruby ./script/server
Open your browser and the address is "https://localhost:3004". Accepted the certificate. Enter your password twice. Then, login to the system with your desired username and the previous password.
Or, you can use the default username and password, they are "etd" and "dradis" respectively.
Lenovo ThinkPad X100e (Type 3508-65B) is equipped with AMD Athlon Neo MV-40 CPU and Realtek RTL8191SEvB wireless LAN Controller. It is working perfectly on Ubuntu 10.04 and 10.10. However, the wirelss card does not work on Back|Track 4 R2 (which is believed to be Ubuntu 8.04 with newer kernel). In additon, Back|Track 4 R2 is installed with Wicd as network manager.
This tutorial is going to show you how to install the r8191se_pci wireless driver on Back|Track 4 R2.
Step 1 :
Download the official Linux driver from Realtek. The current version is 0018 dated 2010-Oct-25 at the time of this writing.
Go to "Menu" -- "Internet" -- "Wicd Network Manager".
Select "Preference". Add "wlan0" to "Wireless interface".
Then click the "Refresh" button. Now, you should see the Access Points in the air. Select your desired Access Point, entered password and surf the internet.
Remarks :
RTL8191SE wireless card does not support aircrack-ng's injection mode. You may consider to buy USB wireless adapter, such as TP-Link TL-WN321G, TP-Link TL-WN821N and TL-WN822N. Or, changes the RTL8192SE to Intel 5100 as they all support monitor and injection modes.
If you are setting up a mail server at home, you will wonder why the recipient cannot receive your email which is sent by your mail server. The reason is that your IP is blacklisted.
How to overcome this problem? It is quiet easy and just send a request to the Spamhaus.org to cancel your IP from the blacklist. For example, your IP is 218.191.114.234.
http://spamhaus.org/query/bl?ip=218.191.114.234
If you find any item is in red colour (e.g. PBL), your IP is blacklisted. You just click on the link under the red coloured item. Then, select "Remove an IP from PBL" button. Usually, SBL and XBL are in green colour.
Accepted the agreement and click "Remove IP address" button. Finally, fill in the blanks and wait for the confirmation email for the confirmation code to fill into the screen provided after you sent the request.
Make sure your email address is not a web based free account, such as gmail, hotmail, or yahoo and etc.
*** This tutorial is written on July 16, 2007 by me. I repost it here for reference. The origianl tutorial is here. ***
I have a wired and a wireless routers. I connect them together to make them looking as one router. Then, I can access all the computers within the same intranet.
Router A (connect to the internet)
Step 1 :
I assigned the wired router to be router A which is connected to the internet directly. I did nothing on the Router A. The LAN IP is 192.168.0.1.
Router B (connect to the Router A)
Step 2 :
I assigned the wireless router to be Router B and I should change the settings of it.
WAN -
Set the WAN IP to be static 192.168.111.2, subnet mask is 255.255.255.0 and gateway is 192.168.111.1, no matter your Router B is wired or wireless. For me, Router B is a wireless. (You can change the WAN IP and gateway to meet your requirement, here is only an example)
LAN :
Disabled DHCP and set the LAN IP to 192.168.0.200, subnet mask is 255.255.255.0, no matter your Router B is wired or wireless. (You can change the LAN IP to meet your requirement, here is only an example)
Step 3 :
Connect Router A and Router B via a cable on LAN ports only. WAN port will not be used at the Router B. Connect Router A to the internet as normal. Now, you can access Router A by 192.168.0.1 and Router B by 192.168.0.200 via your browser. Any computer or laptop will be assigned an IP of 192.168.0.XXX.
Proxmox Virtual Environment (Proxmox VE) works with virtualization featured CPU (such as Intel VT and AMD-V CPU) and non-virtualization featured CPU. Virtualization featured CPU is working on full virtualization by KVM technology. Non-virtualization featured CPU is working on container virtualization by OpenVZ.
This tutorial is mainly on setting up the Proxmox VE with Virtualization featured CPU only.
Proxmox VE does not work on fake RAID or software RAID (RAID on motherboard may consider as fake or software RAID). Make sure you are using Hardware RAID when necessary.
Remarks : Proxmox VE is working fine on Intel Xeon E5420 Quad Core X 2, 16GB ECC DDR2 RAM and 1TB X 6 Hard Drive on Adaptec RAID 6 with 2 Hot Spare (1.8TB for usage).
Step 1 :
Download the latest Proxmox VE at here. The current version is 1.6-5261-4 (with 2.6.32-4 kernel) at the time of this writing. The ISO image is 64-bit version. The ISO image has a hard drive space limitation to 2TB.
If you want to have larger than 2TB hard drive size, you should follow the procedure at here.
Step 2 :
You should have 3 network interfaces at least where eth0 (vmbr0) is for the Proxmox VE, eth1 (vmbr1) is for connecting to the internet and eth2 (vmbr2) is for the virtual machines. Where the vmbrX is the virtual network interface for the virtual machines that binded to the physical network interfaces.
Step 3 :
Install Proxmox VE and follow the instructions on the screen (a mouse is required). For example, the IP address is 192.68.100.2 and the hostname is proxmox.samiux.com. The primary DNS and gateway are 192.168.100.1.
Step 4 :
After the installation, the system will be rebooted. If you do not have a router connected to the Proxmox box, connect the Proxmox VE to a laptop which is set to the IP address 192.168.100.5 manually. You may require a switch to do so. (I used to install software based router/UTM, so this procedure is necessary, please see Step 9 for details).
On the browser, type http://192.168.100.2 and then you are directed to the Proxmox VE control panel. Username is "root" and password is the password that you created during the installation.
Step 5 :
Go to "Configuration" -- "System". Bind the phyiscal network interfaces to virtual interfaces. vmbr0 is binded to eth0 (IP : 192.168.100.2, subnet mask : 255.255.255.0, Gateway : 192.168.100.1). vmbr1 is binded to eth1 and vmbr2 is binded to eth2. You are required to reboot your system after the network interfaces binding.
Step 6 :
Go to "VM Manger" -- "ISO Images". Upload the Ubuntu 10.10 Server ISO file (for example) to the Proxmox. Assumed that we are using KVM for the virtualization.
Step 7 :
Go to "VM Manager" -- "Virtual Machines". Create a virtual machine by selecting "Create" tab.
Type : Fully virtualized (KVM)
Disk space (GB) : enter your desired size, e.g. 80
Name : any name, e.g. Ubuntu_server
Memory (MB) : at least 512MB
Start at boot : enabled
Disk type : IDE or SCSI (I perfer to SCSI)
Guest type : Linux 2.6
CPU Sockets : 1 (sockets but not cores)
Bridge : vmbr2
Network Card : e1000
Then, press "Create" button.
Step 8 :
The "VMD 101" is created. Select it and you will direct to the details of "KVM 101". Change the value of CPU Sockets and Cores/Socket when necessary.
Go to "Hardware" tab and add the Ubuntu server ISO image to the "CD-ROM drives".
Press "Start" button. Then click on the red coloured "Open VNC console". Java is required for this operation.
Then, install the Ubuntu 10.10 server accordingly.
Step 9 (Optional) :
You can also create a software based router and/or Unified Threat Management (UTM), such as Untangle. You need to blind vmbr1 to eth0 (internet connection) and vmbr2 to eth1 (for connecting to other virtual machines). Where eth0 and eth1 are the interface name of Untangle.
If you are going to install Untangle inside Proxmox VE, you should install Untangle first and then the Ubuntu server and etc.
Step 10 :
Go the the Proxmox box. Login and execute the following commands in order to update the Proxmox as well as the kernel. The most updated kernel is 2.6.35-1 at the time of this writing.
*** CAUTION : This tutorial is written for Penetration Test only. Otherwise, you may be arrested if you attack/intrude any other network/computer without authorization. ***
Hardware :
Lenovo ThinkPad X200 with 4GB RAM and 80GB SSD
Lenovo ThinkPad X200 is installed Ubuntu 10.10 Desktop edition. On which, installs VirtualBox.
Go to the Oracle VM VirtualBox site to download the VirtualBox : http://dlc.sun.com/virtualbox/vboxdownload.html#linux
(A) Create Back|Track virtual machine :
Select at least 8GB virtual hard drive place and 512MB RAM for the Back|Track. The first network adapter is set to "NAT" while the second is set to "Host-Only".
Boot up Back|Track from the VirtualBox and click on "install.sh" to install Back|Track.
Login for further setting. The username is "root" and the password is "toor".
Step 1 :
After the installation, you may execute the following command to fix the screen size to 800x600.
fix-splash800
Then, change the password of the root when necessary. Otherwise, the username is "root" while the password is "toor".
Execute the following command to make Back|Track to start network interface and X.org when bootup each time.
kate /root/.bash_profile
Append the following lines :
start-network
startx
Step 2 :
To install VirtualBox Additions when necessary via "Konqueror" -- "Storage Media" -- "media:/hdc".
bash VBoxLinuxAdditions-x86.run
Step 3 :
apt-get -y update
apt-get -y upgrade
Step 4 :
Go to "Menu" -- "BackTrack" -- "Penetration" -- "Fast Track". Select "Fast-Track Interactive" and choose "1".
Step 4a :
Go to "Menu" -- "BackTrack" -- "Penetration" -- "ExploitDB". Select "Update Exploitdb".
Step 4b :
Go to "Menu" -- "BackTrack" -- "Penetration" -- "Social Engineering Toolkit". Select "S.E.T-Update".
Step 5 :
At the terminal, execute the following command :
airodump-ng-oui-update
Step 6 :
Go to "Menu" -- "BackTrack" -- "Vulnerability Identification" -- "OpenVAS" -- "OpenVAS NVT Sync".
Set the downloaded Metasploitable as virtual hard drive at VirtualBox. The network adapter is set to "Host-Only". The virtual hard disk space is at least 8GB and 512MB RAM for the Metasploitable.
(C) The final
Now, the IP address of eth0 of Metasploitable is similar to 192.168.56.101. The IP address of eth0 and eth1 of Back|Track are similar to 10.0.2.15 and 192.168.56.102 respectively.
You may require to execute the following command at Back|Track in order to see the two network interfaces and their IPs.
/etc/init.d/networking restart
Back|Track can access (or ping) Metasploitable via IP address. Back|Track can surf the internet but Metasploitable cannot.
Gigabyte TouchNote T1028X equipped with Intel Atom N280 and eGalax touch screen. It runs Ubuntu 10.10 flawlessly except touchpad and touchscreen. This tutorial is telling you how to overcome these problems.
"lsusb" shows the following :
Bus 005 Device 002: ID 0eef:0001 D-WAV Scientific Co., Ltd eGalax TouchScreen
Step 1 :
Boot up the system and press "Ctrl+Alt+F2" to go to command prompt.
sudo nano /etc/default/grub
Append "i8042.noloop=1 usbhid.quirks=0xeef:0x1:0x40" to "GRUB_CMDLINE_LINUX_DEFAULT".
The value of calibration is "2 4100 11 4099" is perfect on my Gigabyte TouchNote T1028X (resolution 1366 x 768). However, you can change the value after doing Step 6 when necessary.
Step 4 :
The current version of xinput-calibrator is 0.7.5 at the time of this writing.