Welcome, Guest |
You have to register before you can post on our site.
|
Online Users |
There are currently 175 online users. » 0 Member(s) | 172 Guest(s) Bing, DuckDuckGo, Google
|
Latest Threads |
How to install Archboot i...
Forum: Network Problems
Last Post: Meup
2025-05-13, 01:41 PM
» Replies: 0
» Views: 511
|
clear logs in smoothwall
Forum: Security and Firewalls
Last Post: amanda63
2024-03-10, 03:27 PM
» Replies: 8
» Views: 89,160
|
I cannot install RedHat 8...
Forum: Redhat
Last Post: hybrid
2023-11-11, 01:01 PM
» Replies: 1
» Views: 42,517
|
How things are done, usin...
Forum: Xorg Problems
Last Post: ross
2023-09-04, 09:03 AM
» Replies: 0
» Views: 1,922
|
Im back.....
Forum: Hello
Last Post: anyweb
2021-01-17, 11:36 AM
» Replies: 1
» Views: 5,415
|
add mp3 plugin to xmms in...
Forum: Fedora
Last Post: anyweb
2021-01-17, 11:30 AM
» Replies: 11
» Views: 41,531
|
Configuring VSFTPd Server
Forum: FTP Server
Last Post: Johnbaca
2020-10-14, 10:25 AM
» Replies: 32
» Views: 118,522
|
Wolf won't play sound!
Forum: Game Problems
Last Post: Guest
2020-10-03, 05:51 PM
» Replies: 1
» Views: 56,306
|
Using git + python
Forum: How Do I?
Last Post: Clueless puppy
2020-08-21, 04:37 PM
» Replies: 0
» Views: 46,204
|
what does your nick mean ...
Forum: Hello
Last Post: volt
2020-08-06, 03:25 PM
» Replies: 28
» Views: 42,186
|
|
|
Port scan detection |
Posted by: xDamox - 2005-07-10, 07:45 PM - Forum: Security and Firewalls
- Replies (8)
|
 |
Well, it's another one of my security articles :) before I start I would like to thank the man znx ;)
for getting PortSentry working due to a little programming error.
The piece of software you will need to install is "PortSentry" which can be downloaded from here.
Once you have downloaded the source file you can decompress it by issue the following command:
Code: tar zvxf portsentry-1.2.tar.gz
Once this has been decompressed you should see a directory called: "portsentry_beta" change
into that directory this can be do by issue the cd command as shown below:
Once you are in this directory you should be able to see a file called portsentry.c open this with
your favorte editor (mine is vim as it counts the lines) and scroll down to line 1584 and it will look
like:
Code: printf ("PortSentry - Port Scan Detector.\n");
printf ("Copyright 1997-2003 Craig H. Rowland <craigrowland at users dot
sourceforget dot net>\n");
printf ("Licensing restrictions apply. Please see documentation\n");
printf ("Version: %s\n\n", VERSION);
You need to change the line that wraps so the above should now look like:
Code: printf ("PortSentry - Port Scan Detector.\n");
printf ("Copyright 1997-2003 Craig H. Rowland <craigrowland at users dot sourceforget dot net>\n");
printf ("Licensing restrictions apply. Please see documentation\n");
printf ("Version: %s\n\n", VERSION);
Now that the file is fixed issue the following commands
Code: make linux
make install
Now portsentry is installed :) you can edit the configuration file portsentry.conf this file is well
commented so I wont go into detail. Once you have edited the config file open the portsentry.ignore
file and you should see the following:
Code: # Put hosts in here you never want blocked. This includes the IP addresses
# of all local interfaces on the protected host (i.e virtual host, mult-home)
# Keep 127.0.0.1 and 0.0.0.0 to keep people from playing games.
#
# PortSentry can support full netmasks for networks as well. Format is:
#
# <IP Address>/<Netmask>
#
# Example:
#
# 192.168.2.0/24
# 192.168.0.0/16
# 192.168.2.1/32
# Etc.
#
# If you don't supply a netmask it is assumed to be 32 bits.
#
#
127.0.0.1/32
0.0.0.0
Because we are going to test portsentry comment out 127.0.0.1/32 with a hash # so it will look like:
Code: # Put hosts in here you never want blocked. This includes the IP addresses
# of all local interfaces on the protected host (i.e virtual host, mult-home)
# Keep 127.0.0.1 and 0.0.0.0 to keep people from playing games.
#
# PortSentry can support full netmasks for networks as well. Format is:
#
# <IP Address>/<Netmask>
#
# Example:
#
# 192.168.2.0/24
# 192.168.0.0/16
# 192.168.2.1/32
# Etc.
#
# If you don't supply a netmask it is assumed to be 32 bits.
#
#
#127.0.0.1/32
0.0.0.0
Once that is done its time to start portsentry. PortSentry can be started with a -tcp or a -udp these
are for basic stealth scans but you can also issue -atcp and -audp which mean advanced monitoring.
To start portsentry issue the following:
Code: ./portsentry -atcp
./portsentry -audp
Once these two have started check they are running fine by issuing the following command:
Code: tail /var/log/messages
you should have similar output to mine as shown below:
Code: Jul 10 20:23:13 localhost portsentry[9918]: adminalert: Advanced mode will manually exclude port: 520
Jul 10 20:23:13 localhost portsentry[9918]: adminalert: Advanced mode will manually exclude port: 138
Jul 10 20:23:13 localhost portsentry[9918]: adminalert: Advanced mode will manually exclude port: 137
Jul 10 20:23:13 localhost portsentry[9918]: adminalert: Advanced mode will manually exclude port: 67
Jul 10 20:23:13 localhost portsentry[9918]: adminalert: Advanced Stealth scan detection mode activated. Ignored UDP port: 68
Jul 10 20:23:13 localhost portsentry[9918]: adminalert: Advanced Stealth scan detection mode activated. Ignored UDP port: 520
Jul 10 20:23:13 localhost portsentry[9918]: adminalert: Advanced Stealth scan detection mode activated. Ignored UDP port: 138
Jul 10 20:23:13 localhost portsentry[9918]: adminalert: Advanced Stealth scan detection mode activated. Ignored UDP port: 137
Jul 10 20:23:13 localhost portsentry[9918]: adminalert: Advanced Stealth scan detection mode activated. Ignored UDP port: 67
Jul 10 20:23:13 localhost portsentry[9918]: adminalert: PortSentry is now active and listening.
Now to run the test, issue the following nmap command:
Code: nmap -sS -O 127.0.0.1
if you check the /var/log/messages again you should see the following or similar:
Code: Jul 10 20:02:20 localhost portsentry[9667]: attackalert: Host: localhost.localdomain/127.0.0.1 is already blocked Ignoring
Jul 10 20:02:20 localhost portsentry[9667]: attackalert: TCP SYN/Normal scan from host: localhost.localdomain/127.0.0.1 to TCP port: 487
Jul 10 20:02:20 localhost portsentry[9667]: attackalert: Host: localhost.localdomain/127.0.0.1 is already blocked Ignoring
Jul 10 20:02:20 localhost portsentry[9667]: attackalert: TCP SYN/Normal scan from host: localhost.localdomain/127.0.0.1 to TCP port: 617
:)portsentry works now if you check the /etc/hosts.deny you will notice a new entry in there
which is 127.0.0.1 which portsentry blacklisted. Now finally delete the entry in the /etc/hosts.deny
and in the portsentry.ignore uncomment out 127.0.0.1/32 and you are ready to go.
Well thats it another tutorial finished :)
|
|
|
UAE - Compiling for network access |
Posted by: Memphisartguy - 2005-07-09, 02:11 AM - Forum: Compiling
- Replies (6)
|
 |
So I used WinUAE to set up a nice Amiga OS 3.9, with a Cnet Pro BBS, debugged the telser.deviced and telnetd.device to work with the CnEt Pro. Every thing runs great.
So when moving to the Linux platform I have to compile the configure file with the bsddevice-=new uncommented.
How do I Compile this? Nothing has yet to make a binary I can use.
I am using the latest version of E-UAE
|
|
|
Webmin & Virtualmin & Fedora |
Posted by: Memphisartguy - 2005-07-09, 01:15 AM - Forum: Fedora
- Replies (4)
|
 |
Been trying to follow these instructions in Fedora Core 4
Every things cool unitl step three. Sense these instructions are 1 year old, i have adapted it a little. Main issue is part 3
rpm -ivh ~/httpd-2.0.40-21.16.legacy.src.rpm
Does this.
warning: ./httpd-2.0.50-1.0.src.rpm: Header V3 DSA signature: NOKEY, key ID 4f2a6fd2
1:httpd ########################################### [100%]
No files are created as the guide below says should happen.
-------------------------- missing how to -----------------------------
Here's how to rebuild Apache from SRPM, including the change you want to make.
1. Grab the httpd SRPM from the FC1 updates:
% wget [/url][url=http://download.fedora.us/fedora/fe....48-1.2.src.rpm]http://download.fedora.us/fedora/fe....48-1.2.src.rpm
2. Set up your RPM build area:
% echo "%_topdir /home/yourname/src/rpm" >> ~/.rpmmacros
% mkdir -p ~/src/rpm/
% cd ~/src/rpm
% mkdir BUILD RPMS RPMS/i386 SOURCES SPECS SRPMS
3. Install the SRPM:
% rpm -ivh ~/httpd-2.0.48-1.2.src.rpm
This will put the source tarball and patches in SOURCES, and a specfile (metadata and instructions for building) in SPECS.
4. Edit the specfile, bumping up the release number, changing the suexec docroot, and noting this in the changelog:
% vi SPECS/httpd.spec
line 8:
< Release: 1.2
> Release: 1.3
line 202:
< --with-suexec-docroot=%{contentdir} \
> --with-suexec-docroot=/home \
line 510:
%changelog
* Tue May 18 2004 Your Name <you@yours> 2.0.48-1.3
- Rebuilt with suexec-docroot set to /home instead of %{contentdir}
5. Rebuild httpd, creating both a binary RPM and a source SRPM:
% rpmbuild -ba SPECS/httpd.spec
You may have to install some additional packages to satisfy build dependencies here. When it's done, you'll have binary packages in RPMS/i386/, and a source package including your modified specfile in SRPMS/.
6. You can now either upgrade to the httpd you just compiled...
% sudo rpm -Fvh RPMS/i386/httpd*.rpm RPMS/i386/mod_ssl*.rpm
7. ...or simply extract the suexec binary and copy it over the original one:
% rpm2cpio RPMS/i386/httpd-2.0.48-1.3.i386.rpm | cpio -imVd ./usr/sbin/suexec
% sudo cp -p /usr/sbin/suexec /usr/sbin/suexec.orig
% sudo cp ./usr/sbin/suexec /usr/sbin/suexec
% sudo chown root:apache /usr/sbin/suexec
% sudo chmod 4510 /usr/sbin/suexec
Personally, I haven't yet had any problems with just keeping the suexec binary I compiled months ago and reusing it with later updates of Apache (i.e., repeat step 7 after installing an httpd update), YMMV. Obviously if there is ever a security update involving suexec itself, though, you should rebuild again.
________________________________________
Last edited by bradthemad : 2004-05-18 at 07:14 AM PDT.
------------------how to that was missing --------------------------
|
|
|
Installing Samba 3.0.14a-2 under Fedora Core 4 |
Posted by: ASrael - 2005-07-08, 07:31 PM - Forum: Samba and NFS
- Replies (5)
|
 |
This Tutorial is free and may be distributed with reference to this website
It is for people running Fedora Core 4 wanting to setup a working Samba
Server to access the Shares on a Linux machine from a Windows machine
Commands are written in green
Everything else are things you might edit / write / add
Get my Tutorials from [/url][url=http://www.bildunxxluecke.de/usr/fedora]http://www.bildunxxluecke.de/usr/fedora
1.
--------------------------------------------------------------------------------
Prepare your Enviroment:
- samba-common-3.0.14a-2.i386.rpm
- samba-3.0.14a-2.i386.rpm
- samba-client-3.0.14a-2.i386.rpm
- samba-swat-3.0.14a-2.i386.rpm (install only if you want have samba-webinterface)
2.
--------------------------------------------------------------------------------
Now its time to configure SAMBA:
rpm -i samba-common-3.0.14a-2.i386.rpm
rpm -i samba-3.0.14a-2.i386.rpm
rpm -i samba-client-3.0.14a-2.i386.rpm
rpm -i samba-swat-3.0.14a-2.i386.rpm
3.
--------------------------------------------------------------------------------
Everything should be installed now, its time to configure Samba:
- cd /etc/samba/
- vi smb.conf
You can safely edit this file (in fact you must) necessary is :
workgroup = < your windows network workgroup > e.g.: WORKGROUP
server string = < Information about your Samba Server >
netbios name = < Hostname of Sambaserver > e.g.: SMBSERV01
You dont need to touch the shares so far, if you want to share
other directorys keep and eye on the examples in the smb.conf
4.
--------------------------------------------------------------------------------
Now everything is done and you can start:
[root@test] smbd -D
[root@test] nmbd -D
Now you should be able to access your Sambaserver from your
Windowsmachine via \\< smb machine ip >
(5.)
--------------------------------------------------------------------------------
For those who want to use swat with samba :
- cd /etc/xinetd.d/
- vi swat
change disable = yes to => disable = no
- cd /etc/
- vi services
make sure the following line is in it : swat 901/tcp # Samba Web Administration Tool
to test do 'grep 901 /etc/services' , if not in insert it
now do : service xinetd restart
Swat should be running now !
(6.)
--------------------------------------------------------------------------------
To access Swat Webinterface from Lan :
- cd /etc/xinetd.d/
- vi swat
change 'only_from = 127.0.0.1' to 'only_from = 'your.netmask.0.0' e.g.: '192.168.0.0'
the 0 stands for wildcards (e.g. 192.168.0.0 to 192.168.255.255)
--------------------------------------------------------------------------------
Everything is fine .. enjoy now just do http:// SAMBAIP : 901 and login as root
|
|
|
Easily save embeded media in Firefox |
Posted by: hijinks - 2005-07-08, 11:58 AM - Forum: Web Browsers
- Replies (3)
|
 |
I just found out this nice little feature in firefox. If you like to save those funny video clips you see on some websites and hate searching through the page source for the link to the media then this is for you.. So lets go to this funny video for example
[/url][url=http://www.ebaumsworld.com/videos/signfun.html]http://www.ebaumsworld.com/videos/signfun.html
Ok so when viewing that page in firefox right click anywhere on the page and goto "View Page Info" and then click the tab "Media"
Now the embeded movie should be listed as embeded in type.. just click on that and then the save as button and your saving it without looking at the source and then using wget.. NICE!
|
|
|
Audio on IBM 600X |
Posted by: brodyj - 2005-07-07, 11:07 PM - Forum: Xorg Problems
- Replies (1)
|
 |
Ok, so I just installed Core 4 on my IBM Thinkpad 600X, everything went smooth, except for the audio.
When I go to "soundcard detection", i'm presented with the nifty little screen, and it says it found a
Cirrus
Logic CS 4614/22/24 [CrystalClear SoundFusion Audio Accelerator
snd-cs46xx
But when I click "Play test sound", nothing seems to happen, and yes the volume is up and on.
Any ideas?
|
|
|
dns/dhcp using dnsmasq |
Posted by: mechtn - 2005-07-07, 09:31 PM - Forum: DNS and DHCP
- Replies (1)
|
 |
/etc/dnsmasq.conf
---------------------------------
domain-needed
bogus-priv
interface=eth0
local=/rkbrb.local/
expand-hosts
domain=rkbrb.local
dhcp-range=10.10.23.105,10.10.23.240,255.255.255.0,192h
dhcp-option=44,10.10.23.99 # WINS server(s)
---------------------------------
Currently working on getting dhcp/dns running using dnsmasq!
|
|
|
Internet Access |
Posted by: xDamox - 2005-07-05, 08:42 PM - Forum: Security and Firewalls
- Replies (6)
|
 |
Hi,
I was curious on how you could limit users surfing the Internet, I found KobrAs's guide useful :)
I setup a group called Internet and assigned users to it and apply this to my iptable
Code: iptables -t filter -A OUTPUT -p tcp -dport 80 --match owner --gid-owner 501 -j DROP
This worked great, but I was wondering if you had your users logging in all over your network
using LDAP, How could you make these rules apply still?
|
|
|
Linux-Noob uptime league |
Posted by: magikman - 2005-07-05, 05:08 PM - Forum: General Chat
- Replies (3)
|
 |
I thought that it would be fun for us all to have an uptime-league, so i have created one. All you have to do is go to uptime-project, create an account, join the Linux-Noob team and download the proper client for your platform - linux only please. Then install the client and edit the /etc/yasuc.conf to reflect the proper values for the account that you created. It might also be a good idea to use cron to update the time. While you are there go into your profile and get an uptime image and place it in your signature for the linux-noob forums.
Please, no jokes about my uptime. I just installed this yesterday. :)
|
|
|
|