WikiCFP is a useful wiki site that collates CFP.
However am a bit disappointed that it does not automatically track to the following year for the same events, e.g. once a conference is over and the dates for the following year announced, it should link to the following years conference details, instead of manually searching for it.
There is also an iPhone Application called WikiCFP that links to the site. Although functional, the application is not very intuitive, for the relatively high price of the application I was expecting more out of it, e.g. calendar integration, etc.
Welcome to my blog, For more information about me, visit my website at https://www.kush.com.fj. This blog is mostly just a journal.
8/27/2011
Runtime on notebooks
Got an Apple MacBook Pro towards the start of the year. Issue was that closing the lid only puts the machine in stand by mode which still consumes power, so I wasn't getting as long a runtime as I would on my old HP nx6120 with a travel battery.
A Google search led me to Todd Huss's[2] page below. This identified the pmset[1] command as being quite useful. I followed the instructions and now have the MacBook hibernating when I close the lid. Since then I have been asked by a number of colleagues about this, so thought I better document it here.
I rebuilt the old HP nx6120 to run Ubuntu 10.04 LTS. Again noticed that I wasn't getting reasonable runtime, instead of the usual 8-10 hrs, I only got around 3-4hrs. A discussion with a colleague led me to Linux Laptop Tools. Again some "Googling" led to the Ubuntu power management[3] which seemed to increase the runtime.
References
A Google search led me to Todd Huss's[2] page below. This identified the pmset[1] command as being quite useful. I followed the instructions and now have the MacBook hibernating when I close the lid. Since then I have been asked by a number of colleagues about this, so thought I better document it here.
I rebuilt the old HP nx6120 to run Ubuntu 10.04 LTS. Again noticed that I wasn't getting reasonable runtime, instead of the usual 8-10 hrs, I only got around 3-4hrs. A discussion with a colleague led me to Linux Laptop Tools. Again some "Googling" led to the Ubuntu power management[3] which seemed to increase the runtime.
References
8/26/2011
securingSCADA.info
The securingSCADA.info site was launched earlier this year, it now boasts the wiki, that is slowly being populated with resource information on penetration testing, security compliance, etc.
It's targeted towards individuals and organisations from academia and industry working in relation to SCADA, smart grid and related security areas. Of course everyone is welcome to sign up and contribute as the site is driven to providing security through collaboration.
The site is located at http://www.securingscada.info
It's targeted towards individuals and organisations from academia and industry working in relation to SCADA, smart grid and related security areas. Of course everyone is welcome to sign up and contribute as the site is driven to providing security through collaboration.
The site is located at http://www.securingscada.info
8/24/2011
Installing joomscan on Ubuntu 10.04 LTS
OWASP Joomla! Security Scanner that "detects file inclusion, sql injection, command execution vulnerabilities of a target Joomla! web site." However it appears to have been neglected, but is promised to be updated soon.
- cd /opt
- sudo apt-get install -y libtest-www-mechanize-perl
- svn co https://joomscan.svn.sourceforge.net/svnroot/joomscan joomscan
- cd joomscan
- chmod 755 trunk/joomscan.pl
- trunk/joomscan.pl update
8/23/2011
Installing Metasploit 4.0.0 on Ubuntu 10.04 LTS
Installing metasploit is quite easy. I have documented the installation instructions that I used below, however its just as simple to follow the more comprehensive instructions from the Rapid7/Metasploit site[1] (https://community.rapid7.com/docs/DOC-1296).
References:
- sudo apt-get install -y ruby libopenssl-ruby libyaml-ruby libdl-ruby libiconv-ruby libreadline-ruby irb ri rubygems
- wget http://updates.metasploit.com/data/releases/framework-4.0.0.tar.bz2
- sudo mkdir /opt/metasploit4
- sudo bunzip framework-4.0.0.tar.bz2
- sudo tar xvf framework-4.0.0.tar
- sudo mv msf3 /opt/metasploit4
- sudo chown -R root:root /opt/metasploit4/msf3
- sudo ln -s /opt/metasploit4/msf3/msf* /usr/local/bin
- cd /opt/metasploit4/msf3
- sudo svn update
- sudo crontab -e -u root # Enter "1 * * * * * /usr/bin/svn update /opt/metasploit4/msf3/ >> /var/log/msf3update.log 2>&1"
- sudo apt-get install -y mysql-server
- sudo apt-get install -y rubygems libmysqlclient-dev
- sudo apt-get install -y ruby-dev
- sudo gem install mysql
References:
7/09/2011
Ubuntu apt-get error
When performing an "apt-get update" I got the following error
Am unsure why this is happening, but suspect it has something to do with the cache size allocated for the repositories. A quick Google search revealed a debian bug1 that helped.
Seems to have fixed the problem, a quick sudo apt-get update and sudo apt-get upgrade had me happily hacking away again.
References:
Reading package lists... Error!
E: Dynamic MMap ran out of room. Please increase the size of APT::Cache-Limit. Current value: 25165824. (man 5 apt.conf)
E: Error occurred while processing xxx
E: Problem with MergeList /var/lib/apt/lists/xxx
W: Unable to munmap
E: The package lists or status file could not be parsed or opened.
Am unsure why this is happening, but suspect it has something to do with the cache size allocated for the repositories. A quick Google search revealed a debian bug1 that helped.
sudo echo 'APT::Cache-Limit "125829120";' > /etc/apt/apt.conf.d/30cache
Seems to have fixed the problem, a quick sudo apt-get update and sudo apt-get upgrade had me happily hacking away again.
References:
- https://bugs.launchpad.net/debian/+source/apt/+bug/24626
4/03/2011
Ramblings...
I cannot speak for other students, but I find feedback and constructive criticism very useful to my education and overall performance. Unfortunately I am finding the latter increasingly absent from the current academic environment, esp. when it comes to submitting official forms to QUT. It seems like a black hole at times
Oh well, “Such is life”. I seem to be quoting this a lot recently. Perhaps as a subconscious resignation to my lot in life. Just realised I have the same initials as Ned Kelly, but unfortunately his proper name was Edward Kelly, so I guess not...
3/06/2011
Cisco 857W Router - Upgrade ADSL Firmware
To upgrade the ADSL firmware you need to get the latest .bin firmware file from Cisco. You will need a CCO and a valid contract to download the file.
One you have this, copy the file to flash using a TFTP server. Then rename the file to remove the version number, then make a backup of the configuration file just in case and reboot the router. The reboot should force the new firmware to be loaded. Once rebooted verify the version of the firmware
Check the version of the firmware current running
show dsl interface ATM 0
Init FW: init_xxx-x.x.xxx.bin
Operation FW: xxx-x.x.x.bin
FW Source: xxxxxxxx
FW Version: x.x.x
Check the amount of space available on flash for the firmware, ensure that the bytes free is greater than the size of the firmware .bin file
show flash
19353600 bytes total (5369856 bytes free)
Copy the firmware .bin file to flash
copy tftp://xxx.xxx.xxx.xxx/adsl_alc_20190.x.x.x.bin
Rename the file on flash to adsl_alc_20190.bin
rename flash:adsl_alc_20190.x.x.x.bin adsl_alc_20190.bin
Reboot the router
reload
One you have this, copy the file to flash using a TFTP server. Then rename the file to remove the version number, then make a backup of the configuration file just in case and reboot the router. The reboot should force the new firmware to be loaded. Once rebooted verify the version of the firmware
Check the version of the firmware current running
show dsl interface ATM 0
Init FW: init_xxx-x.x.xxx.bin
Operation FW: xxx-x.x.x.bin
FW Source: xxxxxxxx
FW Version: x.x.x
Check the amount of space available on flash for the firmware, ensure that the bytes free is greater than the size of the firmware .bin file
show flash
19353600 bytes total (5369856 bytes free)
Copy the firmware .bin file to flash
copy tftp://xxx.xxx.xxx.xxx/adsl_alc_20190.x.x.x.bin
Rename the file on flash to adsl_alc_20190.bin
rename flash:adsl_alc_20190.x.x.x.bin adsl_alc_20190.bin
Reboot the router
reload
2/11/2011
kush.id.au
Got the kush.id.au domain and parked it over the kush.com.fj domain. So all subdomains and e-mail addresses should resolve for the id.au domain.Need to make some changes to the website to allow for this. Also need to upload some new Python scripts that I wrote.
12/03/2010
iCTF - UCSB International Capture The Flag
I was fortunate enough to be invited to join the QUT iCTF team. The objective of the contest is to ensure that a set of required services remain available and un-compromised. In preparation for this task, I decided to setup a dedicated laptop for the contest. I would have been far easier to install a distribution such as BackTrack, but I decided to take the painful path.
First, a friend sold me his old laptop, which was far better than my current notebook. It was a Sony VAIO SZ34GP. I installed CentOS 5.5 on this notebook, just a base install with development libraries and tools. The instructions below provide a brief list of tools and their associated configurations.
Repositories
There's a need to set-up some additional repositories for CentOS to enable the installation of additional thir party applications. For more information refer to References 3Section.
Install tools to be used for the competition. Most of the tools are penetration testing tools I have used in the past. I made a point of installing the development libraries and tools during the CentOS installation. This would be useful for developing and testing possible exploits.
First, a friend sold me his old laptop, which was far better than my current notebook. It was a Sony VAIO SZ34GP. I installed CentOS 5.5 on this notebook, just a base install with development libraries and tools. The instructions below provide a brief list of tools and their associated configurations.
Repositories
There's a need to set-up some additional repositories for CentOS to enable the installation of additional thir party applications. For more information refer to References 3Section.
- sudo bash
- cd /etc/yum.repos.d/
- wget -q -O - http://www.atomicorp.com/installers/atomic |sh
- wget http://dries.eu/pub/dries-el.repo
- wget http://packages.sw.be/rpmforge-release/rpmforge-release-0.5.1-1.el5.rf.i386.rpm
- rpm -ivh rpmforge-release-0.5.1-1.el5.rf.i386.rpm
- yum update
Installation
Install tools to be used for the competition. Most of the tools are penetration testing tools I have used in the past. I made a point of installing the development libraries and tools during the CentOS installation. This would be useful for developing and testing possible exploits.
- sudo yum -y install nmap
- sudo yum -y install amap
- sudo yum -y install hydra
- sudo yum -y install aide
- sudo yum -y install snort
- sudo yum -y install nikto
- sudo yum -y install ntop
- sudo yum -y install fail2ban
- sudo yum -y install tcptrack
- sudo yum -y install dsniff
- sudo yum -y install ngrep
- sudo yum -y install fragroute
- sudo yum -y install hping
- sudo yum -y install scapy
- sudo yum -y install tcptraceroute
- sudo yum -y install firewalk
- sudo yum -y install iptraf
- sudo yum -y install kismet
- sudo yum -y install ettercap
ChaosReader
- Download latest version from source forge (http://chaosreader.sourceforge.net)
- sudo mkdir -p /opt/chaosreader
- sudo cp chaoreader0.94 /opt/chaosreader/
- sudo chmod 755 /opt/chaosreader/chaoreader0.94
- sudo ln -s /opt/chaosreader/chaoreader0.94 /usr/local/bin/
John the Ripper
- wget http://www.openwall.com/john/g/john-1.7.6.tar.gz
- tar zxvf john-1.7.6.tar.gz
- cd john-1.7.6
- cd src
- make
- clean linux-x86-any
- sudo mv ../run /opt/john-1.7.6
- sudo chown -R root:root opt/john-1.7.6
- mv /opt/john-1.7.6/john.conf /opt/john-1.7.6/john.ini
- sudo ln -s /opt/john-1.7.6/john /usr/local/sbin/
- sudo ln -s /opt/john-1.7.6/john.ini /usr/local/sbin/
OpenVAS
- sudo yum -y install openvas-server openvas-client openvas-scanner
- sudo openvas-mkcert
- sudo /usr/sbin/openvas-nvt-syn # Add as a cron job - refer to OpenVAS documentation
- sudo /etc/rc.d/init.d/openvas-scanner restart
- sudo /usr/sbin/openvas-adduser # Add rules "default accept" if unsure
Skipfish
- wget http://skipfish.googlecode.com/files/skipfish-1.81b.tgz
- tar zxvf skipfish-1.81b.tgz
- sudo mv skipfish-1.81b /opt/
- sudo ln -s /opt/skipfish-1.81b/skipfish /usr/local/sbin/
- sudo ln -s /opt/skipfish-1.81b/sfscandiff /usr/local/sbin/
- sudo chown -R root:root /opt/skipfish-1.81b
VMWare Server
- Download the latest VMWare Server, at the time of this blog it was version 2.0.2
- tar zxvf VMware-server-2.0.2-203138.i386.tar.gz
- cd vmware-server-distrib
- sudo ./vmware-install.pl
References:
Subscribe to:
Posts (Atom)