Wednesday, December 22, 2010

HOWTO : and Google Apps (Email) with your Domain

You can use GMail web mail service with your domain name, such as on

Follow this link to set up Postfix to use GMail as your SMTP server.

Step 0 :

Apply of free Google Apps (Free) Email :

Google Apps (Free) Email

Step 1 :

Create the MX record at your domain automatically.

Create the MX record at your domain manually.

The MX record are :

Step 1a :

Create a SPF record

Step 2 :

You will receive a email from Google and ask you to create a adminstrator account with your domain name. Your domain name needs to be authorized to use Google Apps. You should follow the instructions to complete the process.

After that, you can you GMail as your domain's email.

Step 3 (Optional) :

If you are using Untangle as gateway and IPS, you should do the following :

Open a browser and point to Untangle web page as well as login.


Change the following settings :

From -
Hostname :

To -
Hostname : untangle.mydomain.local

Step 3a (Optional) :

Config/Email/Outging Email Server (SMTP)

Change the following settings :

Send Email using the specified SMTP Server
- Server Address or Hostname : <postifx server IP address>
- Server Port : 25

Known issue

Cannot send to yourself with your domain, e.g. via Untangle.

That's all! See you.

HOWTO : Send Mail to GMail by Postfix on Ubuntu Server 10.10

You cannot send any mail to GMail from you mail server, unless you set GMail server as your SMTP server.

Step 0 :

Install the Ubuntu Server 10.10 and select Mail Server when install.

Step 1 :

sudo nano /etc/postfix/transport

Append the following line.

*     smtp:[]:587

Step 2 :

sudo nano /etc/postfix/sasl/sasl_passwd

Append the following line.


Step 3 :

sudo nano /etc/postfix/

Add or make the change of the following lines.

relayhost = []:587
smtp_sasl_auth_enable = yes
smtp_sasl_password_maps = hash:/etc/postfix/sasl/sasl_passwd
smtp_sasl_security_options = noanonymous
smtp_tls_CAfile = /etc/postfix/cacert.pem
smtp_use_tls = yes
mynetworks = [::ffff:]/104 [::1]/128

Step 4 :

cat /etc/ssl/certs/Thawte_Premium_Server_CA.pem | sudo tee -a /etc/postfix/cacert.pem

Step 5 :

sudo postmap /etc/postfix/transport
sudo postmap /etc/postfix/sasl/sasl_passwd

Step 6 :

sudo /etc/init.d/postfix restart

That's all! See you.

Thursday, December 16, 2010

HOWTO : Faster Firefox

The following steps are for broadband users who are using Firefox and wish it is running more faster.

Step 0 :

Open Firefox and type the following at the address field.


Step 1 :

Change the following value from "false" to "true" :


Step 2 :

Change the following value from "4" to "30" :


Step 3 :

At any browsing area of the browser, add the following string with a value of "0" :


Step 4 :

Restart Firefox. Now, you can browse the web pages more faster.

That's all! See you.

HOWTO : No skill hacking with Armitage on Back|Track 4 R2

*** WARNING : This tutorial is for education purpose only. It alert you to update your system once there is any patch or update available. Please do not hack any website, computer and/or network without authorization. Otherwise, you will be put into the jail. ***


In order to complete this tutorial, you should have an Ubuntu or Windows system as host. Back|Track 4 R2 and Metasploitable as clients on VirtualBox 3.2.

You can download Back|Track 4 R2 at here and Metasploitable at here. Metasploitable is an Ubuntu Server 8.04 that installed some applications with flaws that can be exploited.

The installation of Back|Track 4 R2 is here.

The network interfaces of Back|Track 4 R2 on VirtualBox 3.2 are "NAT and "Host Only (vboxnet0)". The network interface of Metasploitable is "Host Only (vboxnet0)".

The Armitage should be installed on Back|Track 4 R2 and the tutorial is here.

Step 0 :

Run the Metasploitable on VirtualBox first. The IP address should be The run Back|Track 4 R2 on VirtualBox the next and the IP address should be 10.x.x.x of eth0.

Step 1 :

On the Back|Track 4 R2, run the following command to make sure eth0 and eth1 are up and have their IPs.

/etc/init.d/networking restart

Step 2 :

Run the following commands to launch Armitage.

/etc/init.d/mysql start
cd /pentest/exploits/armitage

Step 3 :

Select "Use SSL" and click "Start MSF".

Then, "Using database driver mysql" message box will be displayed. Click "OK".

Step 4 :

Select "Host" -- "Nmap Scan" -- "Intense Scan, all TCP ports"

Wait for the scanning complete.

Step 5 :

Select "Attacks" -- "Find Attacks" -- "by port".

Wait for the scanning complete.

Step 6 :

Select "Attacks" -- "Hail Mary" -- "by port".

Wait for the "Monitor" image to change to red colour. If so, the target is exploited. Then, right click on the "Monitor" image and select "Shell". To check if the target is privilege escalated by issuing "whoami" on the Shell. If it shows "root", you are successfully owned the target.

That's all! See you.

Wednesday, December 08, 2010

HOWTO : The Onion Router (Tor) on Ubuntu 10.10 Desktop

Tor Overview

Step 1 :

sudo nano /etc/apt/sources.list

Append the following line to the file :

deb lucid main

Save and exit. Then add the key :

gpg --keyserver --recv 886DDD89
gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add -

Install tor.

sudo apt-get install tor

Step 2 :

Install Privoxy.

sudo apt-get install privoxy

Edit the configure file of privoxy.

sudo nano /etc/privoxy/config

Append the following line.

forward-socks4a / localhost:9050 .

Step 2a (Optional) :

If you are behind firewall or NAT as well as router, you should append the following line at the configure file.

forward 192.168.*.*/ .

Step 3 :

Made sure Tor is working.

sudo /etc/init.d/privoxy start
sudo /etc/init.d/tor start

netstat -a | grep 9050

If the output is similar to the following line, your Tor is working.

tcp 0 0 localhost:9050 *:* LISTEN

Step 4 :

Get "TorButton" addon for Firefox. Then enable/disable it by Ctrl+2.

Step 5 :

You can confirm the Tor is working on the remote side by visiting the following site.

Step 6 (Optional) :

If the System start/stop links do not exist, please issue the following commands :

sudo update-rc.d privoxy defaults
sudo update-rc.d tor defaults


Tor Project
WiKi of Tor

That's all! See you.