Archivo de la categoría: Security

nmap postfix

sshuttle: A Poor man’s VPN Over SSH

Do you ever wanted to use SSH as a VPN? There is little piece of useful utility called “sshuttle” is available to completely turn your SSH connection as VPN. sshuttle is a transparent proxy server that works as a poor man’s VPN over ssh. You don’t need any admin account on your remote system. It… Leer más »

If you interrupt john you can resume

  Obtain a target file for this assignment I have prepared such an “unshadowed” file representing 50 accounts and their passwords. It is named crack-these-please. Obtain it from by anonymous ftp. It’s in the pub subdirectory. Put it in your john- directory. Then cd into that directory and run ./john  crack-these-please Try to crack as… Leer más »

Securing OpenSSH

Securing OpenSSH Contents Use Strong Passwords/Usernames Disable Root Logins Limit User Logins Disable Protocol 1 Use a Non-Standard Port Filter SSH at the Firewall Use Public/Private Keys for Authentication Frequently Asked Question (FAQ) Links OpenSSH (or Secure SHell) has become a de facto standard for remote access replacing the telnet protocol. SSH has made protocols… Leer más »

How to remove malware belonging to the family Rootkit.Win32.TDSS (aka Tidserv, TDL4, TDSServ, Alureon

Run the latest version of GMER. To remove it, you need to run a series of three scanners in this order: TDSSkiller Combofix and Malwarebytes’ Antimalware;1 Note that TDL4 is often a blended threat, and has other secondary infections that can cause issues. One of the most common does search redirection… Leer más »

How secure is the TOR network for everyday internet browsing? April 2nd, 2011 by George Notaras I recently read that the Free Software Foundation has given the Award for Projects of Social Benefit to the TOR Project. Congratulations! There are indeed some cases that the TOR network can be extremely useful to the societies. On the other hand, the fact that an organization like… Leer más »