<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-8629796283235435780</atom:id><lastBuildDate>Fri, 25 Oct 2024 12:22:43 +0000</lastBuildDate><category>BT</category><category>Back Track4</category><category>Back Track</category><category>IP address</category><category>BT4</category><category>dns</category><category>nmap</category><category>VOIP</category><category>Voice Over IP</category><category>port scanning</category><category>ports</category><category>Null scans</category><category>Security</category><category>network mapper</category><category>SIPVicious</category><category>dns records</category><category>install</category><category>reconnaissance</category><category>tcp/ip</category><category>ubuntu</category><category>FIN</category><category>FIN scan</category><category>Metasploit</category><category>footprinting</category><category>iptables</category><category>scanning</category><category>tcp</category><category>Digital Forensics</category><category>Forensics</category><category>NVT</category><category>NeXpose</category><category>OpenVAS</category><category>Thumbs.db extraction</category><category>Voip Fuzzers</category><category>apt</category><category>apt-get</category><category>domain name system</category><category>firefox</category><category>linux</category><category>open vas</category><category>python</category><category>rapid7</category><category>scan</category><category>vinetto</category><category>ACK scan</category><category>Airdrop-ng</category><category>BT4 R1</category><category>Back Track 4</category><category>Back Track 4 Final</category><category>Confiker worm</category><category>DHCP</category><category>DMITRY</category><category>DNS-PTR</category><category>Data Capture</category><category>Deep Magic Information Gathering</category><category>Docks</category><category>Docky</category><category>Encryption</category><category>Enumeration</category><category>Flux</category><category>Fuzzers</category><category>Gnome-do</category><category>Google</category><category>Google Chromium</category><category>H.323</category><category>HTTPrint</category><category>Help</category><category>Hex codes</category><category>IAX</category><category>Informer</category><category>Internet Telephony</category><category>Launcher</category><category>List-urls</category><category>MAC Address</category><category>Metasploitable</category><category>MySQL</category><category>NetDiscover</category><category>R1</category><category>SIPBomber</category><category>SMART</category><category>SMART disk monitoring</category><category>Secure Sockets Layer</category><category>Status Update</category><category>TCPDump</category><category>TTLS</category><category>Terminal</category><category>Terminal Emulator</category><category>Trixbox</category><category>UFW</category><category>Ultimate Firewall</category><category>VLANS</category><category>Virtualbox</category><category>Vmware player</category><category>Voiper</category><category>Web Scanners</category><category>Whatweb 0.4.2</category><category>XMAS scan</category><category>aircrack-ng</category><category>apt-cache</category><category>apt-cacher</category><category>awk</category><category>back track. trace route</category><category>backtrack-dragon</category><category>blog</category><category>browser</category><category>brute-force</category><category>bruteforce</category><category>bruteforcessh</category><category>bt4-customise.sh</category><category>commands</category><category>confiker</category><category>confiker detector</category><category>convert vdmk to vdmi</category><category>convert virtual machine</category><category>customise bt4</category><category>delete panel</category><category>dnsmap</category><category>dpkg</category><category>dsnbf.py</category><category>duplicate</category><category>ecryptfs</category><category>exiftool</category><category>file carving</category><category>firewall security</category><category>fluxbox</category><category>getting started in Back Track</category><category>gnome</category><category>gnome-terminal</category><category>hackers for charity</category><category>hddtemp</category><category>hfc</category><category>honeynet.org</category><category>hostmap</category><category>hostnames</category><category>install software backtrack</category><category>isp.py</category><category>konsole</category><category>links</category><category>linunx</category><category>lookup</category><category>lxterm</category><category>man</category><category>man watch</category><category>manual</category><category>mapping</category><category>meta data</category><category>metasploitable.vdi</category><category>mtr</category><category>news</category><category>panels</category><category>photo metadata</category><category>restore panel</category><category>ruby</category><category>scanning  for SSL</category><category>smartmontools</category><category>sort</category><category>sort text file</category><category>ssh</category><category>ssl</category><category>sslscan</category><category>svcrack</category><category>svmap</category><category>svreport</category><category>svwar</category><category>swiftfox</category><category>trace  IP</category><category>traceroute</category><category>update firefox in back track 4</category><category>uxterm</category><category>vga</category><category>vga codes</category><category>virtualization</category><category>vmware</category><category>voiphopper</category><category>watch command</category><category>what&#39;s happening</category><category>whois</category><category>xfce4-terminal</category><category>xterm</category><title>Archangel Amael&#39;s Blog</title><description>Probably a bit late to the party, but I will attempt to share things of interest to me (that are over the 140 character twitter limit) via this space.</description><link>http://archangelamael.blogspot.com/</link><managingEditor>noreply@blogger.com (Anonymous)</managingEditor><generator>Blogger</generator><openSearch:totalResults>75</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8629796283235435780.post-6465698277937897212</guid><pubDate>Sat, 26 Jan 2013 20:40:00 +0000</pubDate><atom:updated>2013-01-26T12:53:03.417-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Status Update</category><title>Thoughts, and updates. </title><description>&lt;div&gt;
Been along time since I have blogged about anything. Not that I am all to serious about it to begin with. I don&#39;t have a lot of time to devote to such things anymore. With a wife and two demanding children it&#39;s not always on the top of my do-to list.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
Having said that, I just noticed that my blog on shell.tor.hu was taken down. &lt;br /&gt;
Although (for me at least) tor.hu was a pay service. Others can have their site hosted there for free. While it is a bit upsetting to see my work was taken down, I can&#39;t really complain as I didn&#39;t actually re-new my membership with them.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
I just got caught up (as many do) in life and of course forgot about doing it.&lt;/div&gt;
&lt;div&gt;
I guess I could have gotten a &quot;real website&quot; or whatever, but the free ones have always filled my needs. Plus why pay of it, when I can let google or some other site host if for me for free, in return for some silly adverts which I block any way?&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
I have been messing around in the world of Tea and learning all about Gong-Fu Cha. &amp;nbsp;As such I have amassed some photos of my teas, and experiences, that I may share here as well, Or I might even dedicate tea to it&#39;s own blog. Not sure yet though. &amp;nbsp;&lt;/div&gt;
&lt;div&gt;
I have also been thinking about doing some more tutorials on BackTrack. Of course I would need to revive my testing labs and actually update some things.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
So if anyone actually reads this then feel free to let me know what you would like to see a tutorial on.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
</description><link>http://archangelamael.blogspot.com/2013/01/thoughts-and-updates.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>6</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8629796283235435780.post-1577747251341357455</guid><pubDate>Sat, 28 Apr 2012 20:36:00 +0000</pubDate><atom:updated>2012-04-28T13:36:43.440-07:00</atom:updated><title></title><description>Just noticed that is has been over a year since I last posted on this blog. Well not counting the earlier post from this morning.
 I still look at the thing, once in a while, when I need some info on a tool. Or to make sure it didn&#39;t get swallowed by the internet monsters. Not to mention I do have many posts that are set to draft that contain links to useful information or resources for me. Perhaps I need to start adding more info on either this one, or my blog at http://archangelamael.shell.tor.hu/  I know there is at least one other person in the world who looks at this thing, besides me. Suggestions?</description><link>http://archangelamael.blogspot.com/2012/04/just-noticed-that-is-has-been-over-year.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>4</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8629796283235435780.post-2734951487945499777</guid><pubDate>Sat, 28 Apr 2012 11:18:00 +0000</pubDate><atom:updated>2012-04-28T04:18:43.060-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">news</category><category domain="http://www.blogger.com/atom/ns#">what&#39;s happening</category><title>What&#39;s going on?</title><description>Looks like my other blog over at tor.hu is down. Matter of fact like the entire site has been down the last few days.</description><link>http://archangelamael.blogspot.com/2012/04/whats-going-on.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8629796283235435780.post-7727464745922699661</guid><pubDate>Wed, 09 Feb 2011 16:06:00 +0000</pubDate><atom:updated>2011-02-09T08:14:38.999-08:00</atom:updated><title>New home.</title><description>I have started another blog at &lt;a href=&quot;http://archangelamael.shell.tor.hu/&quot;&gt;http://archangelamael.shell.tor.hu/&lt;/a&gt;  I really like the freedom that using a wordpress blog gives me. &lt;div&gt;I have plans to migrate the guides from here over to there, time will be a big factor in that. &lt;/div&gt;&lt;div&gt;I also want to  update/redo some of them.  Also plans to do posts on different topics related to computer security that interest me. &lt;/div&gt;&lt;div&gt;If you have a project or want to learn to better use a shell or just want some privacy while using the internet, then sign up for the services at &lt;a href=&quot;http://tor.hu&quot;&gt;http://tor.hu&lt;/a&gt;  So far I have been really impressed with the services they have to offer. &lt;/div&gt;&lt;div&gt;Getting a blog up and going was a bit rough but @sickness416  &lt;a href=&quot;http://sickness.tor.hu/&quot;&gt;http://sickness.tor.hu/&lt;/a&gt; helped me troubleshoot things. So thanks to him. &lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;meta equiv=&quot;content-type&quot; content=&quot;text/html; charset=utf-8&quot;&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</description><link>http://archangelamael.blogspot.com/2011/02/new-home.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8629796283235435780.post-1188043914853801549</guid><pubDate>Thu, 12 Aug 2010 14:28:00 +0000</pubDate><atom:updated>2010-08-12T07:47:20.399-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">exiftool</category><category domain="http://www.blogger.com/atom/ns#">meta data</category><category domain="http://www.blogger.com/atom/ns#">photo metadata</category><title>Extracting MetaData from photos using exiftool in BT4</title><description>This guide is about using exiftool, this tool is used to strip Meta data from photos. This can be used from both a Forensics standpoint as well as for doing reconnaissance work on a given target. Especially if this target is very generous when it comes to giving away too much information, in it&#39;s photos.&lt;br /&gt;As a warning, it&#39;s not cool to stalk people so don&#39;t be doing it.&lt;br /&gt;I mean really if you have to stalk someone you probably will never have a relationship with them anyway loser!&lt;br /&gt;&lt;br /&gt;So the tools is located in the menu structure under Digital Forensics, or through the&lt;br /&gt; /pentest/misc/exiftool/ directory.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;This screen shot shows the default output when calling the command. &lt;/span&gt;&lt;br /&gt;--------------------CODE-----------------------------------&lt;br /&gt;root@bt:/pentest/misc/exiftool# ./exiftool&lt;br /&gt;--------------------CODE-----------------------------------&lt;br /&gt;&lt;br /&gt;&lt;table style=&quot;width:auto;&quot;&gt;&lt;tr&gt;&lt;td&gt;&lt;a href=&quot;http://picasaweb.google.com/lh/photo/V8aLmkffTg_IaTSJbImn8A?feat=embedwebsite&quot;&gt;&lt;img src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh67ptb1fB6PqP6WthWmPYOhuyRLlhF3ReYZfMtyo5m5F4qppjlTHCqVf-UsEXkfDvNzz6z8NqnjebK2JSlZHe5OHxNAV9ZtZPRvQIjkgyGsQvItB3PIxZqgtaNO5v-5eJXc0anbpcdoIw/s800/exiftool1.png&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style=&quot;font-family:arial,sans-serif; font-size:11px; text-align:right&quot;&gt;From &lt;a href=&quot;http://picasaweb.google.com/Archangel.Amael/Exiftool?feat=embedwebsite&quot;&gt;exiftool&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;You will need to read the README in order to learn more information.&lt;br /&gt;&lt;br /&gt;If you want to just test the tool out, you can use the provided .jpg to do so.&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;The command would be &lt;/span&gt;&lt;br /&gt;--------------------CODE-----------------------------------&lt;br /&gt;root@bt:/pentest/misc/exiftool# ./exiftool t/images/ExifTool.jpg&lt;br /&gt;--------------------CODE-----------------------------------&lt;br /&gt;&lt;br /&gt;&lt;table style=&quot;width:auto;&quot;&gt;&lt;tr&gt;&lt;td&gt;&lt;a href=&quot;http://picasaweb.google.com/lh/photo/TuzUlMTlzYrEY5vsqvtDpg?feat=embedwebsite&quot;&gt;&lt;img src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgh2-HHOHtZunLGt0VvX79hlB2KG_9AKHLkm2pUSeLxSTV-3E028r4sB7nLIWOiUDeBMgpFZeYJSRM08dGfgRIzsXs8glGloBm6dmlIuPuuchAyE8k5lpBIpJA-QO8wAA1qd3jHD-lc1K4/s800/exiftool2.png&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style=&quot;font-family:arial,sans-serif; font-size:11px; text-align:right&quot;&gt;From &lt;a href=&quot;http://picasaweb.google.com/Archangel.Amael/Exiftool?feat=embedwebsite&quot;&gt;exiftool&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;&lt;br /&gt;The above photos only shows a portion of the output. To see the rest you will need to run the tools yourself.&lt;br /&gt;There is a lot of information that could be gained from this test, but in reality the tool author has already sanitized anything of value.&lt;br /&gt;The only thing that is really left is camera information. Boring at best. So let&#39;s grab a few photos from the web and see what they can give us.&lt;br /&gt;&lt;br /&gt;Ok so to help keep the innocent that way, I won&#39;t be linking or giving away too much on the actual photos, I downloaded.&lt;br /&gt;But they are easy to find thanks to social media 2.0.&lt;br /&gt;From the next photo we can parse quite a lot of data out of it.&lt;br /&gt;&lt;br /&gt;--------------------CODE-----------------------------------&lt;br /&gt;root@bt:/pentest/misc/exiftool# ./exiftool /tmp/1444432405-37422182c96b551a67f534ead5532.4c63f758-scaled.jpg&lt;br /&gt;--------------------CODE-----------------------------------&lt;br /&gt;&lt;br /&gt;&lt;table style=&quot;width:auto;&quot;&gt;&lt;tr&gt;&lt;td&gt;&lt;a href=&quot;http://picasaweb.google.com/lh/photo/xTrBdHat6oD6N8qq3KvThw?feat=embedwebsite&quot;&gt;&lt;img src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEif2DBjKXuRVYjes4EhjAv4wFIL7lcKTHWt3pN7vAqJJC1HzMraEqppmPxfUx_hUqzvuLyCLN8c8TgcjhyoE-r8bF41Ro5XL8uNgVUMO0RuVPMZM7WhsJ34NMAa0W_00a2MbsVJFgKV3PY/s800/exiftool3.png&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style=&quot;font-family:arial,sans-serif; font-size:11px; text-align:right&quot;&gt;From &lt;a href=&quot;http://picasaweb.google.com/Archangel.Amael/Exiftool?feat=embedwebsite&quot;&gt;exiftool&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;&lt;br /&gt;&lt;br /&gt;So photos 3 shows some generic information on from the camera, we can determine roughly the type of phone in this case a Motorola Droid X&lt;br /&gt;&lt;br /&gt;&lt;table style=&quot;width:auto;&quot;&gt;&lt;tr&gt;&lt;td&gt;&lt;a href=&quot;http://picasaweb.google.com/lh/photo/tx1YhJIGdjX-SxpM3lMfzg?feat=embedwebsite&quot;&gt;&lt;img src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQ0dVkndI_MyK6ifWYbOYZ2J7ugm5Ps-7mdqN-4cM6KspGFGPXlc46jicj-hw60_iuf3orRAhidXNtkOxvJl1XGPsaiU6f7e6myTfocNqXVGPF0yBBn1wVhHNpsgOaAgcnNYXxRcVMdDI/s800/exiftool4.png&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style=&quot;font-family:arial,sans-serif; font-size:11px; text-align:right&quot;&gt;From &lt;a href=&quot;http://picasaweb.google.com/Archangel.Amael/Exiftool?feat=embedwebsite&quot;&gt;exiftool&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;&lt;br /&gt;&lt;br /&gt;But, in photo 4 bingo, we now have the information from the GPS. So we now know exactly where our target is located, at least at the time of the photo being taken. But by looking at the same information from several photos we maybe able to determine patterns in our targets behavior.&lt;br /&gt;So here is the pertinent data given up by our photograph.  28 degrees 26&#39; 26.00&quot; N 81 degrees 28&#39; 26.00&quot; West&lt;br /&gt;There are many websites to include Google maps to help you put this info into something more familiar, like addresses. Depending on the phone or camera being used this information can be turned off. Which is kind of a smart thing to do.&lt;br /&gt;&lt;br /&gt;So that&#39;s about it. There are several ways to gain this information from photos, and this is one of tools, that is included in BT to do it.</description><link>http://archangelamael.blogspot.com/2010/08/extracting-metadata-from-photos-using.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh67ptb1fB6PqP6WthWmPYOhuyRLlhF3ReYZfMtyo5m5F4qppjlTHCqVf-UsEXkfDvNzz6z8NqnjebK2JSlZHe5OHxNAV9ZtZPRvQIjkgyGsQvItB3PIxZqgtaNO5v-5eJXc0anbpcdoIw/s72-c/exiftool1.png" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8629796283235435780.post-3601233342954820393</guid><pubDate>Thu, 05 Aug 2010 20:33:00 +0000</pubDate><atom:updated>2010-08-05T14:25:25.333-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">backtrack-dragon</category><category domain="http://www.blogger.com/atom/ns#">BT4 R1</category><category domain="http://www.blogger.com/atom/ns#">Flux</category><category domain="http://www.blogger.com/atom/ns#">fluxbox</category><category domain="http://www.blogger.com/atom/ns#">R1</category><title>Setting up Fluxbox in BT4 R1</title><description>So this guide is for those that choose to upgrade from BackTrack 4 final to the R1.&lt;br /&gt;This does not really apply if you are downloading the R1.iso. Please keep in mind that this is this a new release and there may be bugs (please report them)! This post will also assume you have  backtrack-dragon installed. You can use this to setup the rest.&lt;br /&gt;---------------------------CODE----------------------------------------------------&lt;br /&gt;root@bt:~# apt-get install backrack-dragon&lt;br /&gt;---------------------------CODE----------------------------------------------------&lt;br /&gt;Once this finishes run dragon, select desktop and finally desktop fluxbox&lt;br /&gt;&lt;br /&gt;&lt;table style=&quot;width:auto;&quot;&gt;&lt;tr&gt;&lt;td&gt;&lt;a href=&quot;http://picasaweb.google.com/lh/photo/3xyZwHEPREDzINrWRitkQw?feat=embedwebsite&quot;&gt;&lt;img src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTvkZEtovHqGJwZ5WhEsc8nutLSz9QLKqbUFwSZvEK7ugSMpvaijTIYVL_cNr8hDCUFvkWfIZin20VeBoJsnYXZNK_5UiI8i1RU0gFeOF0VTCtSxIXgXV2L1-Sz4VrMIxFyy2aiA1i2RI/s800/dragon1.png&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style=&quot;font-family:arial,sans-serif; font-size:11px; text-align:right&quot;&gt;From &lt;a href=&quot;http://picasaweb.google.com/Archangel.Amael/FluxboxSetupBT4R1?feat=embedwebsite&quot;&gt;Fluxbox setup BT4 R1&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;&lt;br /&gt;&lt;br /&gt;Once this finishes then you need to run flux-for-back&lt;br /&gt;---------------------------CODE---------------------------------------------------&lt;br /&gt;root@bt:~# flux-for-back&lt;br /&gt;---------------------------CODE---------------------------------------------------&lt;br /&gt;&lt;table style=&quot;width:auto;&quot;&gt;&lt;tr&gt;&lt;td&gt;&lt;a href=&quot;http://picasaweb.google.com/lh/photo/7ToOhkUxom7Ty6-CuaP7Uw?feat=embedwebsite&quot;&gt;&lt;img src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEAJnmpMqdyLLl9owfHFnac-2TT4qew7T6h86L9zO5SzNwsbP0e93_0rcZeZVd1J_WfGwRbL5gzvMLyCnp_vRN-qdx3EdyBndlqRvdWXvLadI9uZn97k3Wo1sUhjP0rbkhmsq0UsDUmVU/s800/fluxboximage1.png&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style=&quot;font-family:arial,sans-serif; font-size:11px; text-align:right&quot;&gt;From &lt;a href=&quot;http://picasaweb.google.com/Archangel.Amael/FluxboxSetupBT4R1?feat=embedwebsite&quot;&gt;Fluxbox setup BT4 R1&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;&lt;br /&gt;&lt;br /&gt;You will see several options to choose from. We are concerned with the -s option so&lt;br /&gt;---------------------------CODE---------------------------------------------------&lt;br /&gt;root@bt:~# flux-for-back -s&lt;br /&gt;---------------------------CODE---------------------------------------------------&lt;br /&gt;&lt;table style=&quot;width:auto;&quot;&gt;&lt;tr&gt;&lt;td&gt;&lt;a href=&quot;http://picasaweb.google.com/lh/photo/6etzP9IViZ7WwivvBNfUzg?feat=embedwebsite&quot;&gt;&lt;img src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitSJG_MDHCGNInLkepu09DBCIUgEHWlhZ1giN33nK0hxKCGR0AS4XJugwvBi0NqBt1tF6Q1HCNZeFxXgI4YC-2X7tvlDi_c4vaBIcUzQJJfOLtsLTedg50VJjprbgjgePP5CoDK6KZ0vg/s800/fluxboximage2.png&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style=&quot;font-family:arial,sans-serif; font-size:11px; text-align:right&quot;&gt;From &lt;a href=&quot;http://picasaweb.google.com/Archangel.Amael/FluxboxSetupBT4R1?feat=embedwebsite&quot;&gt;Fluxbox setup BT4 R1&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;&lt;br /&gt;&lt;br /&gt;This will bring us a bunch of new choices. In order to build the menu choose either 1 or 2 based on if you want the icons.&lt;br /&gt;Depending on your setup this may take a bit of time. Mine took about 6 or 7 minutes.&lt;br /&gt;Once it is finished it will exit the script and return you to the prompt. At this point you can consider yourself done.&lt;br /&gt;So now you should have the pretty new menu setup for BT&lt;br /&gt;Looking like this.&lt;br /&gt;&lt;table style=&quot;width:auto;&quot;&gt;&lt;tr&gt;&lt;td&gt;&lt;a href=&quot;http://picasaweb.google.com/lh/photo/cF6-iVYL9dROPXmtstPSwQ?feat=embedwebsite&quot;&gt;&lt;img src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwx0jLnlz0jgzt2SlBUkUavh5xo9VxE1UiZWhLA2ULBQGR7Cby7TU1LihGO_Gi38sKFbtbhZaXfdh_niMDHyfBhiDl2Z2szlQ25XgmvdaU_cIJGPuMjUYd6X3LPkRhErUIsqb6JUwZ5dY/s800/fluxboximage4.png&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style=&quot;font-family:arial,sans-serif; font-size:11px; text-align:right&quot;&gt;From &lt;a href=&quot;http://picasaweb.google.com/Archangel.Amael/FluxboxSetupBT4R1?feat=embedwebsite&quot;&gt;Fluxbox setup BT4 R1&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;&lt;br /&gt;&lt;br /&gt;At this point you can exit the script. If you want to change the background then you can use the new menu right click by the way is how to access it. So right click and select &quot;flux menu&quot; at the bottom. Then &quot;Backgrounds&quot; &quot;Set BackTrack default Background&quot;.&lt;br /&gt;&lt;br /&gt;&lt;table style=&quot;width:auto;&quot;&gt;&lt;tr&gt;&lt;td&gt;&lt;a href=&quot;http://picasaweb.google.com/lh/photo/JjbomX86SgyrWo4AExaGwg?feat=embedwebsite&quot;&gt;&lt;img src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxziFH5yB35f35_vVHH3kWu_pyqmfFpyWQO3dz0p7ZZ0NZQgxyuiFvQ9y4_n6x7JwggoLmm9DB7_lIIF-M0Hc-DPA8EvaF-BZIy1bj1TXM1acF57cOPU2bo0mLWUCDrYIe-YISjREzw4Q/s800/fluxboximage5.png&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style=&quot;font-family:arial,sans-serif; font-size:11px; text-align:right&quot;&gt;From &lt;a href=&quot;http://picasaweb.google.com/Archangel.Amael/FluxboxSetupBT4R1?feat=embedwebsite&quot;&gt;Fluxbox setup BT4 R1&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;&lt;br /&gt;&lt;br /&gt;To change the style to a BT one select &quot;flux menu&quot; then &quot;Styles&quot; &quot;Fluxbox BackTrack Styles&quot;&lt;br /&gt;&lt;table style=&quot;width:auto;&quot;&gt;&lt;tr&gt;&lt;td&gt;&lt;a href=&quot;http://picasaweb.google.com/lh/photo/OYPTa-NqsL7HRvCFSf7jDg?feat=embedwebsite&quot;&gt;&lt;img src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlzB7FD4oX52kB_bmC-DNg5ccuWYKD2AwEOD3yD1_hOBlP5SO4pB4020ktRO0CG8AS2x79AcY38NRc5I9tqTDE6yOCZEOUnRO7mnFLOImW3I9_0l34p-71hA2j2ZShw8GlTuyhaqqvGYk/s800/fluxboximage6.png&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style=&quot;font-family:arial,sans-serif; font-size:11px; text-align:right&quot;&gt;From &lt;a href=&quot;http://picasaweb.google.com/Archangel.Amael/FluxboxSetupBT4R1?feat=embedwebsite&quot;&gt;Fluxbox setup BT4 R1&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;&lt;br /&gt;&lt;br /&gt;Then select one of the 3 choices from the following:&lt;br /&gt;&quot;Centurion_BackTrack_blue, Centurion_BackTrack_red, and flux_bactrack_eeepc&quot;&lt;br /&gt;&lt;br /&gt;This last image show the red theme.&lt;br /&gt;&lt;table style=&quot;width:auto;&quot;&gt;&lt;tr&gt;&lt;td&gt;&lt;a href=&quot;http://picasaweb.google.com/lh/photo/w6bBpjg1ws_j9looFh7QyA?feat=embedwebsite&quot;&gt;&lt;img src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiyuwrzHJM2QNI-sey22Rn0vNNnYlDm1-Ogrjrf5c60vCe3Cyhd2VofjKGaRfWO5ENOrxiXPYe9d32wIhorU2mJe4SdU0Kxtmb5FnVr-CaHK4YBER8NbCBZZaeVvC0SSZQzV5yfevMIT-8/s800/fluxboximage7.png&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style=&quot;font-family:arial,sans-serif; font-size:11px; text-align:right&quot;&gt;From &lt;a href=&quot;http://picasaweb.google.com/Archangel.Amael/FluxboxSetupBT4R1?feat=embedwebsite&quot;&gt;Fluxbox setup BT4 R1&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;So that&#39;s pretty much it.  Now you have a new light weight window manager.&lt;br /&gt;Remember that there may be bugs in these new tools so please be patient and report them if you do find them.&lt;br /&gt;&lt;br /&gt;Have fun.</description><link>http://archangelamael.blogspot.com/2010/08/setting-up-fluxbox-in-bt4-r1.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTvkZEtovHqGJwZ5WhEsc8nutLSz9QLKqbUFwSZvEK7ugSMpvaijTIYVL_cNr8hDCUFvkWfIZin20VeBoJsnYXZNK_5UiI8i1RU0gFeOF0VTCtSxIXgXV2L1-Sz4VrMIxFyy2aiA1i2RI/s72-c/dragon1.png" height="72" width="72"/><thr:total>8</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8629796283235435780.post-6676595582529605978</guid><pubDate>Sat, 24 Jul 2010 22:12:00 +0000</pubDate><atom:updated>2010-07-25T04:39:24.406-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">awk</category><category domain="http://www.blogger.com/atom/ns#">duplicate</category><category domain="http://www.blogger.com/atom/ns#">sort</category><category domain="http://www.blogger.com/atom/ns#">sort text file</category><title>Remove duplicate entries in a file W/O sorting.</title><description>&lt;div class=&quot;line&quot; title=&quot;Click to select this command&quot;&gt;                 &lt;div class=&quot;command&quot;&gt;This is mainly for my own reference, however you may find it useful as well. &lt;br /&gt;&lt;br /&gt;Remove duplicate entries in a file without sorting.&lt;br /&gt;&lt;br /&gt;$ awk &#39;!x[$0]++&#39; FILE  where FILE is the name of the file to run on.&lt;br /&gt;&lt;br /&gt;One can also use sort | uniq or sort -u  however this will sort the files into an order.&lt;br /&gt;With awk we are simply removing all the duplicates.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;&lt;/span&gt;&lt;/div&gt;             &lt;/div&gt;</description><link>http://archangelamael.blogspot.com/2010/07/remove-duplicate-entries-in-file-wo.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8629796283235435780.post-4952294454940415290</guid><pubDate>Sat, 24 Jul 2010 15:02:00 +0000</pubDate><atom:updated>2010-07-24T08:12:22.191-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">BT4</category><category domain="http://www.blogger.com/atom/ns#">MySQL</category><category domain="http://www.blogger.com/atom/ns#">Security</category><title>MySQL Security Assesment Script in BT4</title><description>So this is a short write up on using the MySQL security Assessment Script&lt;br /&gt;by&lt;a href=&quot;http://www.darkoperator.com/&quot;&gt; Carlos Perez&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Of course you will need a mysql database to target.&lt;br /&gt;If you want a pre-made setup then get the &lt;a href=&quot;http://blog.metasploit.com/2010/05/introducing-metasploitable.html&quot;&gt;metasploitable&lt;/a&gt; package.&lt;br /&gt;&lt;br /&gt;Grab some shell and navigate to the /pentest/database/mysqlaudit/ directory.&lt;br /&gt;Then just run the command with no options.&lt;br /&gt;&lt;br /&gt;-----------------------------CODE---------------------------------------&lt;br /&gt;&lt;br /&gt;root@bt:/pentest/database/mysqlaudit#./mysqlaudit.py&lt;br /&gt;&lt;br /&gt;MySQL Security Assesment Script Version 1.0&lt;br /&gt;   &lt;br /&gt;By: Carlos Perez, carlos_perez[at]darkoperator.com&lt;br /&gt;USAGE:&lt;br /&gt;python  ./mysqlaudit.py  Targer IP User Password Report&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Target : The system you whant to do the assement on, port 3306 should be open.&lt;br /&gt;User : User account with DBA privelages on the server to use for the assesment.&lt;br /&gt;Password : password for the user account.&lt;br /&gt;Report : Name of text file to wich to write the report.&lt;br /&gt;&lt;br /&gt;-----------------------------CODE--------------------------------------&lt;br /&gt;&lt;br /&gt;Simple enough the only thing you will need of course is the log-on credentials.&lt;br /&gt;This time we will run the scan against our metasploitable setup and see what happens.&lt;br /&gt;&lt;br /&gt;-----------------------------CODE--------------------------------------&lt;br /&gt;&lt;br /&gt;root@bt:/pentest/database/mysqlaudit# ./mysqlaudit.py 192.168.2.103 root root /tmp/msqlauditreport.txt&lt;br /&gt;root@bt:/pentest/database/mysqlaudit#&lt;br /&gt;&lt;br /&gt;-----------------------------CODE--------------------------------------&lt;br /&gt;&lt;br /&gt;So in order to see what our report shows we can either open it with a text editor or we can cat the output back to the screen.&lt;br /&gt;Since the report is quite long I will only show a little of it here.&lt;br /&gt;-----------------------------CODE--------------------------------------&lt;br /&gt;&lt;br /&gt;root@bt:/pentest/database/mysqlaudit# cat /tmp/msqlauditreport2.txt | less&lt;br /&gt;&lt;br /&gt;Severity: High&lt;br /&gt;&lt;br /&gt;Description:&lt;br /&gt;&lt;br /&gt;MySQL authentication is based on usernames and passwords stored in a table&lt;br /&gt;&lt;br /&gt;called mysql.user. To create a user, a row is added to this table. MySQL&lt;br /&gt;also supports wildcards and blank values in the USERNAME and HOST fields of&lt;br /&gt;the table. By indicating a blank username and a blank password, you allow&lt;br /&gt;anonymous access to the MySQL database.&lt;br /&gt;Solution:&lt;br /&gt;&lt;br /&gt;To remove the anonymous user, run the following commands:&lt;br /&gt;shell&gt; mysql -u root [password]&lt;br /&gt;mysql&gt; DELETE FROM mysql.user WHERE User = &#39;&#39;;&lt;br /&gt;&lt;br /&gt;Anonymous user was found&lt;br /&gt;&lt;br /&gt;   User       Connection Location&lt;br /&gt;anonymous ----&gt;localhost&lt;br /&gt;anonymous ----&gt;ubuntu804-base&lt;br /&gt;&lt;br /&gt;-----------------------------CODE-------------------------------------&lt;br /&gt;&lt;br /&gt;As you can tell there is a high level flaw in our setup.&lt;br /&gt;So this tool will allow the Penetration tester to target mysql databases and will determine some basics when it comes to the security of the system.&lt;br /&gt;&lt;br /&gt;Have fun.</description><link>http://archangelamael.blogspot.com/2010/07/mysql-security-assesment-script-in-bt4.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8629796283235435780.post-4480990489129281726</guid><pubDate>Fri, 23 Jul 2010 12:25:00 +0000</pubDate><atom:updated>2010-07-24T03:53:30.769-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">convert vdmk to vdmi</category><category domain="http://www.blogger.com/atom/ns#">convert virtual machine</category><category domain="http://www.blogger.com/atom/ns#">Metasploit</category><category domain="http://www.blogger.com/atom/ns#">Metasploitable</category><category domain="http://www.blogger.com/atom/ns#">metasploitable.vdi</category><category domain="http://www.blogger.com/atom/ns#">Virtualbox</category><title>Converting Metasploitable for Virtualbox</title><description>So this is not a typical Back Track post, but one on converting the &lt;a href=&quot;http://blog.metasploit.com/2010/05/introducing-metasploitable.html&quot;&gt;Metasploitable&lt;/a&gt; VMware image to one that will work with &lt;a href=&quot;http://www.virtualbox.org/&quot;&gt;Virtualbox. &lt;/a&gt;There are other ways of converting .vmdk files to .vdi ones but none of them seemed to work for me.  This was all done on an &lt;a href=&quot;http://www.ubuntu.com/&quot;&gt;Ubuntu&lt;/a&gt; machine. You could do the same on others though. If you don&#39;t have or know about metasploitable check the above link. So grab a copy &lt;a href=&quot;http://www.metasploit.com/express/community&quot;&gt; here&lt;/a&gt; and then extract the zip archive.&lt;br /&gt;&lt;br /&gt;Go to a shell and then grab &lt;a href=&quot;http://wiki.qemu.org/Main_Page&quot;&gt;qemu&lt;/a&gt;, this is another virtualization product but we don&#39;t care about it, once we are done you can remove it.&lt;br /&gt;&lt;br /&gt;-----------------------------------CODE---------------------------------------&lt;br /&gt;amael@ubuntudork:~$ sudo aptitude install qemu&lt;br /&gt;-----------------------------------CODE---------------------------------------&lt;br /&gt;&lt;br /&gt;Once this is done run the following commands.&lt;br /&gt;NOTE: This may take some time to complete.&lt;br /&gt;&lt;br /&gt;-----------------------------------CODE---------------------------------------&lt;br /&gt;amael@ubuntudork:/tmp/Metasploitable$ qemu-img convert /tmp/Metasploitable/metasploitable.vmdk metasploitable.bin&lt;br /&gt;-----------------------------------CODE-------------------------------------&lt;br /&gt;&lt;br /&gt;This will convert the .vmdk to a binary then we will convert the .bin to a Virtualbox .vdi file.&lt;br /&gt;&lt;br /&gt;-----------------------------------CODE-------------------------------------&lt;br /&gt;amael@ubuntudork:/tmp/Metasploitable$ VBoxManage convertdd metasploitable.bin metasploitable.vdi&lt;br /&gt;&lt;br /&gt;Sun VirtualBox Command Line Management Interface Version 3.0.14&lt;br /&gt;(C) 2005-2010 Sun Microsystems, Inc.&lt;br /&gt;All rights reserved.&lt;br /&gt;Converting from raw image file=&quot;Metasploitable.bin&quot; to file=&quot;Metasploitable.vdi&quot;...&lt;br /&gt;Creating dynamic image with size 8589934592 bytes (8192MB)...&lt;br /&gt;-----------------------------------CODE-------------------------------------&lt;br /&gt;&lt;br /&gt;Once this is finished you are now ready to use Metasploitable in Virtualbox.&lt;br /&gt;&lt;br /&gt;So go ahead and set up a new machine. You can find many guides on doing this on the net.&lt;br /&gt;But basically you just need to point Virtualbox to the newly created Metasploitable.vdi file.&lt;br /&gt;&lt;table style=&quot;width:auto;&quot;&gt;&lt;tr&gt;&lt;td&gt;&lt;a href=&quot;http://picasaweb.google.com/lh/photo/HtEMqP5h-eqaIqXFUaJskQ?feat=embedwebsite&quot;&gt;&lt;img src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhV7ES9xzFpgw-suS2dVWZKKGmffiMrjv6ZUKrDz6BrNDw29ZOerHjAhMHTWJ70v4Z91SzuLXpU-jE01bkEnrabZUC6tp4b-5FH5RLmgC2LKr4qqSzWM766im0Ji6CR0-_JEymsEneCCiY/s144/Screenshot.png&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style=&quot;font-family:arial,sans-serif; font-size:11px; text-align:right&quot;&gt;From &lt;a href=&quot;http://picasaweb.google.com/Archangel.Amael/VirtualBoxMetasploitable?feat=embedwebsite&quot;&gt;Virtual Box Metasploitable&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;&lt;br /&gt;You may want to edit some of the settings. For my setup I had to ensure that the Extended Features Enable PAE/NX box was checked. This is located under Settings&gt;System&gt;Processor. The first time I booted without this it did not work.&lt;br /&gt;&lt;table style=&quot;width:auto;&quot;&gt;&lt;tr&gt;&lt;td&gt;&lt;a href=&quot;http://picasaweb.google.com/lh/photo/_3956JvcYkZ-3K1uvM4lQQ?feat=embedwebsite&quot;&gt;&lt;img src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgubkjSJD22hW5Rkthtt-1K_Fsf9LqylntCNwlvSp_WNXZ-aDUIADL5csr9fCiw3oSMcX-lAxSWM2dWSFrcippughFPAnlEeXVwaJDNWCKJWe095h-mXkiacHC1PxF8IXi5IXgxPsjoh8/s144/Screenshot-1.png&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style=&quot;font-family:arial,sans-serif; font-size:11px; text-align:right&quot;&gt;From &lt;a href=&quot;http://picasaweb.google.com/Archangel.Amael/VirtualBoxMetasploitable?feat=embedwebsite&quot;&gt;Virtual Box Metasploitable&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;&lt;br /&gt;It might also be a good idea to ensure that this machine is configured for &quot;Host Only&quot; networking so that it is not facing the internet.&lt;br /&gt;&lt;br /&gt;So there you have it.&lt;br /&gt;&lt;table style=&quot;width:auto;&quot;&gt;&lt;tr&gt;&lt;td&gt;&lt;a href=&quot;http://picasaweb.google.com/lh/photo/nNuO7RsM6B3gk6-Dr-EiNQ?feat=embedwebsite&quot;&gt;&lt;img src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0QstXUG2RgOMtEX3it3o7tn8ptXq0UQJq9S0KseYTithvv691KkMD6I-pVqJQlYlkxu2ir5xkaI55W3uVMdBXECjGJm56GlzThICjhSLRywXO1xgP5KikVRiEix4KCFasbB6k6sIvA-s/s144/Screenshot-2.png&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style=&quot;font-family:arial,sans-serif; font-size:11px; text-align:right&quot;&gt;From &lt;a href=&quot;http://picasaweb.google.com/Archangel.Amael/VirtualBoxMetasploitable?feat=embedwebsite&quot;&gt;Virtual Box Metasploitable&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;&lt;br /&gt;That&#39;s pretty much it.  Have fun.</description><link>http://archangelamael.blogspot.com/2010/07/converting-metasploitable-for.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhV7ES9xzFpgw-suS2dVWZKKGmffiMrjv6ZUKrDz6BrNDw29ZOerHjAhMHTWJ70v4Z91SzuLXpU-jE01bkEnrabZUC6tp4b-5FH5RLmgC2LKr4qqSzWM766im0Ji6CR0-_JEymsEneCCiY/s72-c/Screenshot.png" height="72" width="72"/><thr:total>4</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8629796283235435780.post-894519626311063423</guid><pubDate>Wed, 21 Jul 2010 09:20:00 +0000</pubDate><atom:updated>2010-07-21T02:26:33.434-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">BT4</category><category domain="http://www.blogger.com/atom/ns#">bt4-customise.sh</category><category domain="http://www.blogger.com/atom/ns#">customise bt4</category><title>Update bt4-customise.sh script</title><description>So after someone noticed on the forums that the bt4-customise.sh script  needs to be edited in order to work with the new .iso, I decided to make this post with what needs to be changed.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;First grab the script and open it with your favorite editor.&lt;br /&gt;------------------------------CODE-------------------------------------&lt;br /&gt;# nano bt4-customise.sh&lt;br /&gt;------------------------------CODE------------------------------------&lt;br /&gt;Then at the top around line 3 change&lt;br /&gt;------------------------------CODE------------------------------------&lt;br /&gt;btisoname=bt4-pre-final.iso&lt;br /&gt;------------------------------CODE------------------------------------&lt;br /&gt;To the new .iso name.&lt;br /&gt;So for the BT4 final you will need bt4-final.iso&lt;br /&gt;------------------------------CODE------------------------------------&lt;br /&gt;So btisoname-bt4-final.iso&lt;br /&gt;------------------------------CODE------------------------------------&lt;br /&gt;&lt;br /&gt;Save, exit and that&#39;s it.&lt;br /&gt;&lt;br /&gt;Have fun.</description><link>http://archangelamael.blogspot.com/2010/07/update-bt4-customisesh-script.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8629796283235435780.post-541851888320407764</guid><pubDate>Mon, 19 Jul 2010 20:11:00 +0000</pubDate><atom:updated>2010-07-19T13:30:58.920-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">brute-force</category><category domain="http://www.blogger.com/atom/ns#">bruteforce</category><category domain="http://www.blogger.com/atom/ns#">bruteforcessh</category><category domain="http://www.blogger.com/atom/ns#">BT4</category><category domain="http://www.blogger.com/atom/ns#">ssh</category><title>how-to,  brutessh.py in BT4</title><description>Fast and simple guide to using brutessh.py in BT 4&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;Standard disclaimer applies, Don&#39;t be stupid and do things that will get you put in jail etc.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Ok as the name implies brutessh.py is a python based brute force tool for ssh&lt;br /&gt;So what it does is takes target data on the command line and uses a dictionary to try and brute ssh. Pretty simple.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Grab a shell&lt;/span&gt;&lt;br /&gt;-------------------------------------CODE------------------------------------------------------------------&lt;br /&gt;&lt;br /&gt;root@bt:/pentest/passwords/brutessh#&lt;br /&gt;&lt;br /&gt;-------------------------------------CODE----------------------------------------------------------------&lt;br /&gt;Check out the readme for more info.&lt;br /&gt;-------------------------------------CODE----------------------------------------------------------------&lt;br /&gt;&lt;br /&gt;root@bt:/pentest/passwords/brutessh# cat README&lt;br /&gt;&lt;br /&gt;-------------------------------------CODE----------------------------------------------------------------&lt;br /&gt;An easy and safe way to run the tool is to simply make a small dictionary in the same directory put a few words and your ssh password into the list.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Now run it. &lt;/span&gt;&lt;br /&gt;-------------------------------------CODE----------------------------------------------------------------&lt;br /&gt;root@bt:/pentest/passwords/brutessh# python brutessh.py -h localhost -u root -d dict&lt;br /&gt;&lt;br /&gt;*************************************&lt;br /&gt;*SSH Bruteforcer Ver. 0.2           *&lt;br /&gt;*Coded by Christian Martorella      *&lt;br /&gt;*Edge-Security Research             *&lt;br /&gt;*laramies@gmail.com                 *&lt;br /&gt;*************************************&lt;br /&gt;&lt;br /&gt;HOST: localhost Username: root Password file: dict&lt;br /&gt;===========================================================================&lt;br /&gt;Trying password...&lt;br /&gt;Times -- &gt; Init: 0.15 End: 3.35&lt;br /&gt;Auth OK ---&gt; Password Found: 123abc$$&lt;br /&gt;root@bt:/pentest/passwords/brutessh#&lt;br /&gt;-------------------------------------CODE----------------------------------------------------------------&lt;br /&gt;Of course that&#39;s not the real password!&lt;br /&gt;&lt;br /&gt;It obviously didn&#39;t take that long, 3.35 seconds.&lt;br /&gt;&lt;br /&gt;So there you have it. Quick, fast, and easy. Actually  I don&#39;t believe it gets easier than that.</description><link>http://archangelamael.blogspot.com/2010/07/how-to-brutesshpy-in-bt4.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8629796283235435780.post-919503270792858286</guid><pubDate>Mon, 28 Jun 2010 19:51:00 +0000</pubDate><atom:updated>2010-06-28T12:55:53.158-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">BT</category><category domain="http://www.blogger.com/atom/ns#">isp.py</category><category domain="http://www.blogger.com/atom/ns#">python</category><title>Bug and Fix in isp.py in BT4</title><description>While trying to learn more about BT and it&#39;s many tools, I discoverd a small bug in one of them&lt;br /&gt;This lead to trying to find a fix for it. I suppose that I was successful.&lt;br /&gt;&lt;br /&gt;The tool in question is &lt;span style=&quot;font-weight: bold;&quot;&gt;isp.py &lt;/span&gt; locate in &lt;span style=&quot;font-weight: bold;&quot;&gt;~./pentest/misc/&lt;/span&gt;&lt;br /&gt;Upon trying to run the default command one will get the following&lt;br /&gt;------------------code------------------------------&lt;br /&gt;root@bt:/pentest/misc/isp# python isp.py&lt;br /&gt;Traceback (most recent call last):&lt;br /&gt; File &quot;isp.py&quot;, line 10, in &lt;module&gt;&lt;br /&gt;   conf.verb = 0&lt;br /&gt;NameError: name &#39;conf&#39; is not defined&lt;br /&gt;root@bt:/pentest/misc/isp&lt;br /&gt;------------------code------------------------------&lt;br /&gt;&lt;br /&gt;So to fix open up the &lt;span style=&quot;font-weight: bold;&quot;&gt;isp.py&lt;/span&gt; in a text editor and locate the following line near the top &lt;span style=&quot;font-weight: bold;&quot;&gt;from scapy import *&lt;/span&gt;  and change it to &lt;span style=&quot;font-weight: bold;&quot;&gt;from scapy.all import* &lt;/span&gt;and exit.&lt;br /&gt;&lt;br /&gt;Now try running again.&lt;br /&gt;&lt;br /&gt;&lt;/module&gt;------------------code------------------------------&lt;br /&gt;&lt;module&gt;root@bt:/pentest/misc/isp# python isp.py&lt;br /&gt;WARNING: No route found for IPv6 destination :: (no default route?)&lt;br /&gt;isp.py: &quot;I Spoof Packets with my ISP&quot;, by Sebastien Raveau&lt;br /&gt;Usage: isp.py [alternate DNS server on the Internet]&lt;br /&gt;&lt;br /&gt;WARNING: this gives false-positives when run behind some NAT&lt;br /&gt;routers! If anybody has an idea of how to prevent that, please&lt;br /&gt;leave a comment under the blog post explaing how this tool works:&lt;br /&gt;http://blog.sebastien.raveau.name/2009_02_01_archive.html&lt;br /&gt;&lt;br /&gt;Failed to reach DNS server at resolver1.opendns.com&lt;br /&gt;Try again or try isp.py &lt;other-dns-server&gt;&lt;br /&gt;&lt;/module&gt;------------------code------------------------------&lt;br /&gt;&lt;br /&gt;&lt;module&gt;&lt;br /&gt;There you have it.&lt;br /&gt;&lt;/module&gt;</description><link>http://archangelamael.blogspot.com/2010/06/bug-and-fix-in-isppy-in-bt4.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8629796283235435780.post-8971063139016068597</guid><pubDate>Tue, 25 May 2010 20:23:00 +0000</pubDate><atom:updated>2010-05-25T13:48:18.540-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">dns</category><category domain="http://www.blogger.com/atom/ns#">dns records</category><category domain="http://www.blogger.com/atom/ns#">footprinting</category><category domain="http://www.blogger.com/atom/ns#">hostmap</category><category domain="http://www.blogger.com/atom/ns#">reconnaissance</category><category domain="http://www.blogger.com/atom/ns#">ruby</category><title>Adding and using hostmap.rb to BT4</title><description>The next is &lt;span style=&quot;font-style:italic;&quot;&gt;hostmap.rb&lt;/span&gt; a ruby script for DNS &lt;br /&gt;This tool is available at &lt;a href=&quot;http://hostmap.lonerunners.net/&quot;&gt;http://hostmap.lonerunners.net/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;So to get started visit the above link, download and save the &lt;span style=&quot;font-style:italic;&quot;&gt;tarball&lt;/span&gt;. &lt;br /&gt;&lt;br /&gt;&lt;blockquote&gt;root@dorkness:/tmp/# tar xvf hostmap-0.2.2.tar&lt;/blockquote&gt;&lt;br /&gt;Remove the &lt;span style=&quot;font-style:italic;&quot;&gt;tarball&lt;/span&gt;, move the directory to &lt;span style=&quot;font-style:italic;&quot;&gt;/pentest/enumeration/hostmap-0.2.2/&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;blockquote&gt;root@dorkness:/tmp/# rm -rf hostmap-0.2.2.tar* &lt;/blockquote&gt;&lt;br /&gt;&lt;br /&gt;&lt;blockquote&gt;root@dorkness:pentest/enumeration/hostmap-0.2.2# ruby hostmap.rb -h&lt;br /&gt;&lt;br /&gt;Usage: hostmap.rb [options] -t [target]&lt;br /&gt;Target options:&lt;br /&gt;    -t, --target [STRING]            set target domain&lt;br /&gt;Discovery options:&lt;br /&gt;        --with-zonetransfer&lt;br /&gt;                                     enable DNS zone transfer check&lt;br /&gt;        --without-bruteforce&lt;br /&gt;                                     disable DNS bruteforcing&lt;br /&gt;        --without-dnsexpansion&lt;br /&gt;                                     disable DNS TLD expansion&lt;br /&gt;        --bruteforce-level [STRING]&lt;br /&gt;                                     set bruteforce aggressivity, values are lite, custom or full (default is lite)&lt;br /&gt;        --without-be-paranoid&lt;br /&gt;                                     don&#39;t check the results consistency&lt;br /&gt;        --http-ports [STRING]&lt;br /&gt;                                     set a comma separated list of custom HTTP ports to check&lt;br /&gt;        --only-passive&lt;br /&gt;                                     passive discovery, don&#39;t make network activity to the target network&lt;br /&gt;        --timeout [STRING]&lt;br /&gt;                                     set plugin timeout&lt;br /&gt;        --threads [STRING]&lt;br /&gt;                                     set concurrent threads number&lt;br /&gt;Networking options:&lt;br /&gt;    -d, --dns [STRING]               set a comma separated list of DNS servers IP addresses to use instead of system defaults&lt;br /&gt;Output options:&lt;br /&gt;        --print-maltego&lt;br /&gt;                                     set output formatted for Maltego&lt;br /&gt;    -v, --verbose                    set verbose mode&lt;br /&gt;Misc options:&lt;br /&gt;        --without-update&lt;br /&gt;                                     skip update check&lt;br /&gt;    -h, --help                       show this help message&lt;br /&gt;&lt;br /&gt;root@dorkness:pentest/enumeration/hostmap-0.2.2#&lt;/blockquote&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Note:&lt;/span&gt; You will need to give an IP address, you can not use domain names. &lt;br /&gt;&lt;br /&gt;An example of usage is as follows: &lt;br /&gt;&lt;blockquote&gt;&lt;br /&gt;root@dorkness:/pentest/enumeration/hostmap-0.2.2# ruby hostmap.rb  --only-passive --without-update -t 80.65.162.250&lt;br /&gt;hostmap 0.2.2 codename truppola&lt;br /&gt;Coded by Alessandro `jekil` Tanasi &lt;alessandro@tanasi.it&gt;&lt;br /&gt;&lt;br /&gt;[2010-05-25 22:41] Skipping SSL because only passive checks are enabled&lt;br /&gt;[2010-05-25 22:41] Found new hostname queer.ba&lt;br /&gt;[2010-05-25 22:41] Found new domain queer.ba&lt;br /&gt;[2010-05-25 22:41] Found new hostname diocletian.httpool.ba&lt;br /&gt;[2010-05-25 22:41] Found new domain httpool.ba&lt;br /&gt;[2010-05-25 22:41] Found new nameserver ns.queer.ba&lt;br /&gt;[2010-05-25 22:41] Found new hostname www.queer.ba&lt;br /&gt;[2010-05-25 22:41] Found new hostname www.queer.ba&lt;br /&gt;[2010-05-25 22:41] Found new nameserver ns02.europronet.ba&lt;br /&gt;[2010-05-25 22:41] Skipping DNS Zone transfer because it is enabled only passive checks.&lt;br /&gt;[2010-05-25 22:41] Skipping DNS Zone transfer because it is enabled only passive checks.&lt;br /&gt;[2010-05-25 22:41] Skipping DNS bruteforce because it is enabled only passive checks&lt;br /&gt;[2010-05-25 22:41] Found new mail server mx2.europronet.ba&lt;br /&gt;[2010-05-25 22:41] Found new mail server mx3.europronet.ba&lt;br /&gt;[2010-05-25 22:41] Found new mail server mx1.europronet.ba&lt;br /&gt;[2010-05-25 22:41] Found new nameserver ns1.httpool.com&lt;br /&gt;[2010-05-25 22:41] Found new nameserver ns2.httpool.com&lt;br /&gt;[2010-05-25 22:41] Skipping DNS Zone transfer because it is enabled only passive checks.&lt;br /&gt;[2010-05-25 22:41] Skipping DNS bruteforce because it is enabled only passive checks&lt;br /&gt;&lt;br /&gt;Results for 80.65.162.250&lt;br /&gt;Served by name server (probably)&lt;br /&gt; ns2.httpool.com&lt;br /&gt; ns1.httpool.com&lt;br /&gt; ns.queer.ba&lt;br /&gt; ns02.europronet.ba&lt;br /&gt;Served by mail exchange (probably)&lt;br /&gt; mx1.europronet.ba&lt;br /&gt; mx3.europronet.ba&lt;br /&gt; mx2.europronet.ba&lt;br /&gt;Hostnames:&lt;br /&gt; www.queer.ba&lt;br /&gt; diocletian.httpool.ba&lt;br /&gt; queer.ba&lt;br /&gt;root@dorkness:/pentest/enumeration/hostmap-0.2.2# &lt;/blockquote&gt;&lt;br /&gt;&lt;br /&gt;Note: I used the &lt;span style=&quot;font-style:italic;&quot;&gt;--only-passive&lt;/span&gt; flag, the --&lt;span style=&quot;font-style:italic;&quot;&gt;without-update &lt;/span&gt;flags this should be self explanatory. &lt;span style=&quot;font-style:italic;&quot;&gt;-t&lt;/span&gt; is for target&lt;br /&gt;&lt;br /&gt;As you can see there are several other options to work with. Those I will leave up to you to work with. &lt;br /&gt;&lt;br /&gt;Enjoy</description><link>http://archangelamael.blogspot.com/2010/05/adding-and-using-hostmaprb-to-bt4.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8629796283235435780.post-3938308001118027984</guid><pubDate>Tue, 25 May 2010 20:09:00 +0000</pubDate><atom:updated>2010-05-25T13:16:03.231-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">dns</category><category domain="http://www.blogger.com/atom/ns#">dns records</category><category domain="http://www.blogger.com/atom/ns#">footprinting</category><category domain="http://www.blogger.com/atom/ns#">reconnaissance</category><title>Adding more DNS tools to BT4  part 3</title><description>The next tool  is subdomainer.py&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;To get it, download the&lt;/span&gt; &lt;span style=&quot;font-style:italic;&quot;&gt;.tar&lt;/span&gt; &lt;span style=&quot;font-weight:bold;&quot;&gt;here&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.edge-security.com/subdomainer.php&quot;&gt;http://www.edge-security.com/subdomainer.php&lt;/a&gt;&lt;br /&gt;Again you can save it wherever, I chose &lt;span style=&quot;font-style:italic;&quot;&gt;/pentest/enumeration/&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-style:italic;&quot;&gt;untar&lt;/span&gt; the package &lt;span style=&quot;font-style:italic;&quot;&gt;cd&lt;/span&gt; to the directory &lt;span style=&quot;font-style:italic;&quot;&gt;chmod +x the subdomainer.py&lt;/span&gt;and then you are set to go.&lt;br /&gt;To untar the package &lt;span style=&quot;font-style:italic;&quot;&gt;tar xvf subd*&lt;/span&gt;&lt;br /&gt;Deleted the tarball &lt;span style=&quot;font-style:italic;&quot;&gt;rm -rf subdomainer.tar&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;&lt;br /&gt;Generic usage is:&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;blockquote&gt;root@dorkness:/pentest/enumeration/subdomainer# python subdomainer.py&lt;br /&gt;&lt;br /&gt;*************************************&lt;br /&gt;*Subdomainer Ver. 1.3b              *&lt;br /&gt;*Coded by Christian Martorella      *&lt;br /&gt;*Edge-Security Research             *&lt;br /&gt;*laramies2k@yahoo.com.ar            *&lt;br /&gt;*************************************&lt;br /&gt;&lt;br /&gt;usage: subdomainer.py  options&lt;br /&gt;&lt;br /&gt;                -d: domain to search&lt;br /&gt;                -l: limit of results to work with. (msn and yahoo goes in 10 to 10&lt;br /&gt;                    google in 100&#39;s, and pgp does not need this option)&lt;br /&gt;                -m: data source (msn, yahoo, google, pgp-veridis, all)&lt;br /&gt;&lt;br /&gt;                -o: output to html file. (optional, good for long lists.)&lt;br /&gt;&lt;br /&gt;Example:&lt;br /&gt;                subdomainer.py -d microsoft.com -l 200 -m google&lt;br /&gt;&lt;br /&gt;                subdomainer.py -d microsoft.com -l 100 -m all -o microsoft.html&lt;br /&gt;&lt;br /&gt;root@dorkness:/pentest/enumeration/subdomainer#&lt;/blockquote&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Due to the length of the results I will leave it to you to run them.</description><link>http://archangelamael.blogspot.com/2010/05/adding-more-dns-tools-to-bt4-part-3.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8629796283235435780.post-5158050555000279000</guid><pubDate>Tue, 25 May 2010 19:58:00 +0000</pubDate><atom:updated>2010-07-19T01:41:01.629-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">dns</category><category domain="http://www.blogger.com/atom/ns#">dns records</category><category domain="http://www.blogger.com/atom/ns#">dsnbf.py</category><category domain="http://www.blogger.com/atom/ns#">hostnames</category><category domain="http://www.blogger.com/atom/ns#">reconnaissance</category><title>Adding more DNS tools to BT4  part 2</title><description>DNSbf.py&lt;br /&gt;Ok again this is a simple copy and paste.&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Get the source here:&lt;/span&gt;&lt;br /&gt;&lt;a href=&quot;https://docs.google.com/View?docid=dg23j87b_213fh46kgfp&quot;&gt;https://docs.google.com/View?docid=dg23j87b_213fh46kgfp&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;EDIT: Since the above google doc seems to no longer be valid, I will leave it to the user to find it by searching google. Frankly as I stated in the comments below if you can&#39;t find this or any other tool I write about then you probably shouldn&#39;t be using them since it&#39;s obvious you don&#39;t know what you are doing.&lt;br /&gt;&lt;br /&gt;Copy and paste to wherever you want. I used the same directory as before.&lt;br /&gt;The name is dnsbf.py The purpose of the tools is to use DNS and find hostnames in a subnet.&lt;br /&gt;save and give execute permissions.&lt;br /&gt;&lt;br /&gt;Generic usage with no flags set.&lt;br /&gt;&lt;br /&gt;&lt;blockquote&gt;root@dorkness:/pentest/enumeration/dnsenum# ./dnsbf.py&lt;br /&gt;&lt;br /&gt;*****************************************&lt;br /&gt;* program created by t0ka7a             *&lt;br /&gt;* http://infond.blogspot.com            *&lt;br /&gt;* under GNU 3.0 licence                 *&lt;br /&gt;* v0.2 02/13/2010                       *&lt;br /&gt;* using dns, find hostnames in a subnet *&lt;br /&gt;*****************************************&lt;br /&gt;&lt;br /&gt;begin search...&lt;br /&gt;&lt;br /&gt;wrong number of arguments&lt;br /&gt;&lt;br /&gt;exemple: ./dnsbf.py 192.168.1.0/24&lt;br /&gt;&lt;br /&gt;root@dorkness:/pentest/enumeration/dnsenum#&lt;/blockquote&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;This time we have some targets to scan. &lt;/span&gt;&lt;br /&gt;&lt;blockquote&gt;root@dorkness:/pentest/enumeration/dnsenum# ./dnsbf.py 80.65.162.0/24&lt;br /&gt;&lt;br /&gt;*****************************************&lt;br /&gt;* program created by t0ka7a             *&lt;br /&gt;* http://infond.blogspot.com            *&lt;br /&gt;* under GNU 3.0 licence                 *&lt;br /&gt;* v0.2 02/13/2010                       *&lt;br /&gt;* using dns, find hostnames in a subnet *&lt;br /&gt;*****************************************&lt;br /&gt;&lt;br /&gt;begin search...&lt;br /&gt;&lt;br /&gt;80.65.162.2 bbr-gtz.europronet.ba&lt;br /&gt;80.65.162.201 fa11_ssw-gadzo01.europronet.ba&lt;br /&gt;80.65.162.202 smtps.bihgap.ba&lt;br /&gt;80.65.162.205 fa05_ssw-sa02.europronet.ba&lt;br /&gt;80.65.162.206 hotcasino03.europronet.ba&lt;br /&gt;80.65.162.209 fa23_ssw-sa01.europronet.ba&lt;br /&gt;80.65.162.210 ulk-srv01.linux.org.ba&lt;br /&gt;80.65.162.213 fa15_ssw-sa01.europronet.ba&lt;br /&gt;80.65.162.214 voip-gw01.europronet.ba&lt;br /&gt;80.65.162.217 fa32_ssw-sa01.europronet.ba&lt;br /&gt;80.65.162.218 yellow.europronet.ba&lt;br /&gt;80.65.162.221 fa42_ssw-sa01.europronet.ba&lt;br /&gt;80.65.162.225 fa06_ssw-sa02.europronet.ba&lt;br /&gt;80.65.162.226 hotcasino2.europronet.ba&lt;br /&gt;80.65.162.250 queer.ba&lt;br /&gt;80.65.162.229 fa13_ssw-sa01.europronet.ba&lt;br /&gt;80.65.162.230 mx2.europronet.ba&lt;br /&gt;80.65.162.233 fa07_ssw-sa02.europronet.ba&lt;br /&gt;80.65.162.234 hotcasinogb.europronet.ba&lt;br /&gt;80.65.162.237 fa31_ssw-sa01.europronet.ba&lt;br /&gt;80.65.162.241 fa34_ssw-sa01.europronet.ba&lt;br /&gt;80.65.162.242 mail.triptih.europronet.ba&lt;br /&gt;80.65.162.245 fa36_ssw-sa01.europronet.ba&lt;br /&gt;80.65.162.1 fe08_asw-sa01.europronet.ba&lt;br /&gt;80.65.163.78 mailsrvsa.octas.com&lt;br /&gt;80.65.163.81 rg-ice.europronet.ba&lt;br /&gt;80.65.163.108 terme-centrala.europronet.ba&lt;br /&gt;80.65.163.162 mail2.procreditbank.ba&lt;br /&gt;80.65.163.194 ip-65-163-194.europronet.ba&lt;br /&gt;80.65.163.254 robot-vgw.europronet.ba&lt;br /&gt;80.65.162.70 ns.queer.ba&lt;br /&gt;80.65.162.34 posao.ba&lt;br /&gt;80.65.162.35 mposao.ba&lt;br /&gt;&lt;br /&gt;end of search&lt;br /&gt;511 ip tested, 33 names found, in 11 s&lt;br /&gt;&lt;br /&gt;root@dorkness:/pentest/enumeration/dnsenum#&lt;/blockquote&gt;&lt;br /&gt;&lt;br /&gt;So there you go another cool tool to add to BT for your&lt;br /&gt;reconaissance efforts.</description><link>http://archangelamael.blogspot.com/2010/05/adding-more-dns-tools-to-bt4-part-2.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8629796283235435780.post-1817448436860073199</guid><pubDate>Tue, 25 May 2010 19:18:00 +0000</pubDate><atom:updated>2010-05-25T12:44:30.800-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">dns</category><category domain="http://www.blogger.com/atom/ns#">dns records</category><category domain="http://www.blogger.com/atom/ns#">footprinting</category><category domain="http://www.blogger.com/atom/ns#">reconnaissance</category><title>Adding more DNS tools to BT4  part 1</title><description>So here is a write up on adding some tools to the BT4 &lt;a href=&quot;http://en.wikipedia.org/wiki/Domain_Name_System&quot;&gt;DNS&lt;/a&gt; collection.&lt;br /&gt;I will first show how to install and give a brief usage of each tool.&lt;br /&gt;They are not hard to install and are simple to use. The power lies in what they can do.&lt;br /&gt;These tools are ones that I found, and credit goes to their authors. Also note that since the tools are not included in BT by default you are on your own if something goes wrong. However since they are simple python and or ruby scripts with no real dependencies things should work just fine. &lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;NOTE:&lt;/span&gt; Most output info has been slightly modified. &lt;br /&gt;&lt;br /&gt;So without further delay the first up is&lt;br /&gt;DNSDic.py&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Code is here:&lt;/span&gt;&lt;br /&gt;&lt;a href=&quot;https://docs.google.com/View?docid=dg23j87b_214cdwmbjfx&quot;&gt;https://docs.google.com/View?docid=dg23j87b_214cdwmbjfx&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;So copy and paste the code from the link to a file named &lt;span style=&quot;font-style:italic;&quot;&gt;dnsdic.py&lt;/span&gt; and make the file executable.  I added these tools to the following directory to keep things somewhat organised.&lt;br /&gt;The script will need a dictionary when running. A good one and the one the author recommends is located in the &lt;span style=&quot;font-style:italic;&quot;&gt;dnsenum&lt;/span&gt; directory. &lt;br /&gt;&lt;br /&gt;&lt;blockquote&gt;root@dorkness:/pentest/enumeration/#&lt;/blockquote&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Again executable is &lt;/span&gt;&lt;br /&gt;&lt;blockquote&gt;root@dorkness:/pentest/enumeration/# chmod +x dnsdic.py &lt;/blockquote&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Generic run with no options: &lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;blockquote&gt;root@dorkness:/pentest/enumeration/#python dnsdic.py&lt;br /&gt;&lt;br /&gt;***************************************************&lt;br /&gt;* program created by t0ka7a                       *&lt;br /&gt;* http://infond.blogspot.com                      *&lt;br /&gt;* under GNU 3.0 licence                           *&lt;br /&gt;* v0.1 02/14/2010                                 *&lt;br /&gt;* dns dictionnary search of hostnames in a subnet *&lt;br /&gt;***************************************************&lt;br /&gt;&lt;br /&gt;begin search...&lt;br /&gt;&lt;br /&gt;wrong number of arguments&lt;br /&gt;&lt;br /&gt;exemple: dnsdic.py -f ./dico.txt infond.blogspot.com&lt;br /&gt;&lt;br /&gt;&lt;/blockquote&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;&lt;br /&gt;Ok now a run with some actual usage and results.&lt;/span&gt; &lt;br /&gt;&lt;blockquote&gt;root@dorkness:/pentest/enumeration/# python dnsdic.py -f ./dns.txt exampleweb.ba&lt;br /&gt;&lt;br /&gt;***************************************************&lt;br /&gt;* program created by t0ka7a                       *&lt;br /&gt;* http://infond.blogspot.com                      *&lt;br /&gt;* under GNU 3.0 licence                           *&lt;br /&gt;* v0.1 02/14/2010                                 *&lt;br /&gt;* dns dictionnary search of hostnames in a subnet *&lt;br /&gt;***************************************************&lt;br /&gt;&lt;br /&gt;begin search...&lt;br /&gt;&lt;br /&gt;exampleweb.ba [&#39;ftp.exampleweb.ba&#39;] [&#39;81.61.112.150&#39;]&lt;br /&gt;mail.exampleweb.ba [] [&#39;81.61.112.10&#39;]&lt;br /&gt;ns.exampleweb.ba [] [&#39;81.61.112.70&#39;]&lt;br /&gt;exampleweb.ba [&#39;www.exampleweb.ba&#39;] [&#39;81.61.112.250&#39;]&lt;br /&gt;&lt;br /&gt;end of search&lt;br /&gt;95 names tested, 4 hostnames found, in 16.110284 s&lt;br /&gt;&lt;br /&gt;root@dorkness:/pentest/enumeration/#&lt;/blockquote&gt;</description><link>http://archangelamael.blogspot.com/2010/05/adding-more-dns-tools-to-bt4-part-1.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8629796283235435780.post-7643349222573346686</guid><pubDate>Sun, 23 May 2010 20:10:00 +0000</pubDate><atom:updated>2010-05-23T13:55:07.237-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">BT4</category><category domain="http://www.blogger.com/atom/ns#">scanning  for SSL</category><category domain="http://www.blogger.com/atom/ns#">Secure Sockets Layer</category><category domain="http://www.blogger.com/atom/ns#">ssl</category><category domain="http://www.blogger.com/atom/ns#">sslscan</category><title>SSLScan in BT</title><description>SSLScan in BT4&lt;br /&gt;&lt;br /&gt;No need to write a description since the intro below already has one as well as usage details.&lt;br /&gt;In order to use grab some shell or find it in the menu structure under:&lt;br /&gt;BT&gt; NetworkMapping&gt; ALL&gt; sslscan&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Running the command without any options returns the following&lt;/span&gt;.&lt;br /&gt;&lt;blockquote&gt;root@dorkness~:# sslscan&lt;br /&gt;&lt;br /&gt;                  _&lt;br /&gt;          ___ ___| |___  ___ __ _ _ __&lt;br /&gt;         / __/ __| / __|/ __/ _` | &#39;_ \&lt;br /&gt;         \__ \__ \ \__ \ (_| (_| | | | |&lt;br /&gt;         |___/___/_|___/\___\__,_|_| |_|&lt;br /&gt;&lt;br /&gt;                   Version 1.6&lt;br /&gt;             http://www.titania.co.uk&lt;br /&gt;    Copyright (C) 2007-2008 Ian Ventura-Whiting&lt;br /&gt;&lt;br /&gt;SSLScan is a fast SSL port scanner. SSLScan connects to SSL&lt;br /&gt;ports and determines what  ciphers are supported, which are&lt;br /&gt;the servers  prefered  ciphers,  which  SSL  protocols  are&lt;br /&gt;supported  and   returns  the   SSL   certificate.   Client&lt;br /&gt;certificates /  private key can be configured and output is&lt;br /&gt;to text / XML.&lt;br /&gt;&lt;br /&gt;Command:&lt;br /&gt; sslscan [Options] [host:port | host]&lt;br /&gt;&lt;br /&gt;Options:&lt;br /&gt; --targets=&lt;file&gt;     A file containing a list of hosts to&lt;br /&gt;                      check.  Hosts can  be supplied  with&lt;br /&gt;                      ports (i.e. host:port).&lt;br /&gt; --no-failed          List only accepted ciphers  (default&lt;br /&gt;                      is to listing all ciphers).&lt;br /&gt; --ssl2               Only check SSLv2 ciphers.&lt;br /&gt; --ssl3               Only check SSLv3 ciphers.&lt;br /&gt; --tls1               Only check TLSv1 ciphers.&lt;br /&gt; --pk=&lt;file&gt;          A file containing the private key or&lt;br /&gt;                      a PKCS#12  file containing a private&lt;br /&gt;                      key/certificate pair (as produced by&lt;br /&gt;                      MSIE and Netscape).&lt;br /&gt; --pkpass=&lt;password&gt;  The password for the private  key or&lt;br /&gt;                      PKCS#12 file.&lt;br /&gt; --certs=&lt;file&gt;       A file containing PEM/ASN1 formatted&lt;br /&gt;                      client certificates.&lt;br /&gt; --xml=&lt;file&gt;         Output results to an XML file.&lt;br /&gt; --version            Display the program version.&lt;br /&gt; --help               Display the  help text  you are  now&lt;br /&gt;                      reading.&lt;br /&gt;Example:&lt;br /&gt; sslscan 127.0.0.1&lt;/file&gt;&lt;/file&gt;&lt;/password&gt;&lt;/file&gt;&lt;/file&gt;&lt;/blockquote&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Ok here is a generic run without any flags, against our target website. &lt;/span&gt;&lt;br /&gt;Of course the output has been truncated and a little bit munged.&lt;br /&gt;&lt;br /&gt;&lt;blockquote&gt;root@bt:~# sslscan www.examplewebsite.net&lt;br /&gt;&lt;br /&gt;Testing SSL server www.examplewebsite.net on port 443&lt;br /&gt; Supported Server Cipher(s):&lt;br /&gt;   Rejected  SSLv2  168 bits  DES-CBC3-MD5&lt;br /&gt;   Rejected  SSLv2  56 bits   DES-CBC-MD5&lt;br /&gt;   Rejected  SSLv2  40 bits   EXP-RC2-CBC-MD5&lt;br /&gt;   Rejected  SSLv2  128 bits  RC2-CBC-MD5&lt;br /&gt;   Rejected  SSLv2  40 bits   EXP-RC4-MD5&lt;br /&gt;   Rejected  SSLv2  128 bits  RC4-MD5&lt;br /&gt;   Rejected  SSLv3  256 bits  ADH-AES256-SHA&lt;br /&gt;   Accepted  SSLv3  256 bits  DHE-RSA-AES256-SHA&lt;br /&gt;   Rejected  SSLv3  256 bits  DHE-DSS-AES256-SHA&lt;br /&gt;   Accepted  SSLv3  256 bits  AES256-SHA&lt;br /&gt;   Rejected  SSLv3  128 bits  ADH-AES128-SHA&lt;br /&gt;   Accepted  SSLv3  128 bits  DHE-RSA-AES128-SHA&lt;br /&gt;   Rejected  SSLv3  128 bits  DHE-DSS-AES128-SHA&lt;br /&gt;   Accepted  SSLv3  128 bits  AES128-SHA&lt;br /&gt;   Rejected  SSLv3  168 bits  ADH-DES-CBC3-SHA&lt;br /&gt;   Rejected  SSLv3  56 bits   ADH-DES-CBC-SHA&lt;br /&gt;   Rejected  SSLv3  40 bits   EXP-ADH-DES-CBC-SHA&lt;br /&gt;   Rejected  SSLv3  128 bits  ADH-RC4-MD5&lt;br /&gt;   Rejected  SSLv3  40 bits   EXP-ADH-RC4-MD5&lt;br /&gt;   Accepted  SSLv3  168 bits  EDH-RSA-DES-CBC3-SHA&lt;br /&gt;   Rejected  SSLv3  56 bits   EDH-RSA-DES-CBC-SHA&lt;br /&gt;   Rejected  SSLv3  40 bits   EXP-EDH-RSA-DES-CBC-SHA&lt;br /&gt;   Rejected  SSLv3  168 bits  EDH-DSS-DES-CBC3-SHA&lt;br /&gt;   Rejected  SSLv3  56 bits   EDH-DSS-DES-CBC-SHA&lt;br /&gt;   Rejected  SSLv3  40 bits   EXP-EDH-DSS-DES-CBC-SHA&lt;br /&gt;   Accepted  SSLv3  168 bits  DES-CBC3-SHA&lt;br /&gt;   Rejected  SSLv3  56 bits   DES-CBC-SHA&lt;br /&gt;   Rejected  SSLv3  40 bits   EXP-DES-CBC-SHA&lt;br /&gt;   Rejected  SSLv3  40 bits   EXP-RC2-CBC-MD5&lt;br /&gt;   Accepted  SSLv3  128 bits  RC4-SHA&lt;br /&gt;   Accepted  SSLv3  128 bits  RC4-MD5&lt;br /&gt;   Rejected  SSLv3  40 bits   EXP-RC4-MD5&lt;br /&gt;   Rejected  SSLv3  0 bits    NULL-SHA&lt;br /&gt;   Rejected  SSLv3  0 bits    NULL-MD5&lt;br /&gt;   Rejected  TLSv1  256 bits  ADH-AES256-SHA&lt;br /&gt;   Accepted  TLSv1  256 bits  DHE-RSA-AES256-SHA&lt;br /&gt;   Rejected  TLSv1  256 bits  DHE-DSS-AES256-SHA&lt;br /&gt;   Accepted  TLSv1  256 bits  AES256-SHA&lt;br /&gt;   Rejected  TLSv1  128 bits  ADH-AES128-SHA&lt;br /&gt;   Accepted  TLSv1  128 bits  DHE-RSA-AES128-SHA&lt;br /&gt;   Rejected  TLSv1  128 bits  DHE-DSS-AES128-SHA&lt;br /&gt;   Accepted  TLSv1  128 bits  AES128-SHA&lt;br /&gt;   Rejected  TLSv1  168 bits  ADH-DES-CBC3-SHA&lt;br /&gt;   Rejected  TLSv1  56 bits   ADH-DES-CBC-SHA&lt;br /&gt;   Rejected  TLSv1  40 bits   EXP-ADH-DES-CBC-SHA&lt;br /&gt;   Rejected  TLSv1  128 bits  ADH-RC4-MD5&lt;br /&gt;   Rejected  TLSv1  40 bits   EXP-ADH-RC4-MD5&lt;br /&gt;   Accepted  TLSv1  168 bits  EDH-RSA-DES-CBC3-SHA&lt;br /&gt;   Rejected  TLSv1  56 bits   EDH-RSA-DES-CBC-SHA&lt;br /&gt;   Rejected  TLSv1  40 bits   EXP-EDH-RSA-DES-CBC-SHA&lt;br /&gt;   Rejected  TLSv1  168 bits  EDH-DSS-DES-CBC3-SHA&lt;br /&gt;   Rejected  TLSv1  56 bits   EDH-DSS-DES-CBC-SHA&lt;br /&gt;   Rejected  TLSv1  40 bits   EXP-EDH-DSS-DES-CBC-SHA&lt;br /&gt;   Accepted  TLSv1  168 bits  DES-CBC3-SHA&lt;br /&gt;   Rejected  TLSv1  56 bits   DES-CBC-SHA&lt;br /&gt;   Rejected  TLSv1  40 bits   EXP-DES-CBC-SHA&lt;br /&gt;   Rejected  TLSv1  40 bits   EXP-RC2-CBC-MD5&lt;br /&gt;   Accepted  TLSv1  128 bits  RC4-SHA&lt;br /&gt;   Accepted  TLSv1  128 bits  RC4-MD5&lt;br /&gt;   Rejected  TLSv1  40 bits   EXP-RC4-MD5&lt;br /&gt;   Rejected  TLSv1  0 bits    NULL-SHA&lt;br /&gt;   Rejected  TLSv1  0 bits    NULL-MD5&lt;br /&gt;&lt;br /&gt; Prefered Server Cipher(s):&lt;br /&gt;   SSLv3  256 bits  DHE-RSA-AES256-SHA&lt;br /&gt;   TLSv1  256 bits  DHE-RSA-AES256-SHA&lt;br /&gt;&lt;br /&gt; SSL Certificate:&lt;br /&gt;   Version: 2&lt;br /&gt;   Serial Number: -4294967123&lt;br /&gt;   Signature Algorithm: sha1WithRSAEncryption&lt;br /&gt;   Issuer: /OU=Extended Validation CA/O=GlobalSign/CN=GlobalSign Extended Validation CA&lt;br /&gt;   Not valid before: Sep 16 16:14:35 2009 GMT&lt;br /&gt;   Not valid after: Sep 17 16:14:32 2010 GMT&lt;br /&gt;   Subject: /2.5.4.15=V1.0, Clause 5.(b)/serialNumber=32123374/1.3.6.1.5.7.311.60.2.1.3=DK/C=DK/ST=Oerum Djurs/L=Oerum Djurs/streetAddress= Main 6/OU=FairSSL/O=Not Yours v/Some Name /CN=www.examplewebsite.net&lt;br /&gt;   Public Key Algorithm: rsaEncryption&lt;br /&gt;   RSA Public Key: (2048 bit)&lt;br /&gt;     Modulus (2048 bit): &lt;span style=&quot;font-style: italic;&quot;&gt;truncated&lt;/span&gt;&lt;br /&gt;         00:99:2b:cf:e4:f8:e3:40:88:41:58:8a:41:16:1f:&lt;br /&gt;         f3:09:01:99:e5:f3:09:02:89:e4&lt;br /&gt;         43:93:7c:6a:3c:bb:c5:cf:&lt;br /&gt;         43:df&lt;br /&gt;     Exponent: 65421 (0x10001)&lt;br /&gt;   X509v3 Extensions:&lt;br /&gt;     X509v3 Authority Key Identifier:&lt;br /&gt;       keyid:34:B1:E0 &lt;span style=&quot;font-style: italic;&quot;&gt;truncated&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;     Authority Information Access:&lt;br /&gt;       CA Issuers - URI:http://secure.globalsign.net/cacert/extendval1.crt&lt;br /&gt;       OCSP - URI:http://ocsp.globalsign.com/ExtendedSSL&lt;br /&gt;&lt;br /&gt;     X509v3 CRL Distribution Points:&lt;br /&gt;       URI:http://crl.globalsign.net/ExtendVal1.crl&lt;br /&gt;&lt;br /&gt;     X509v3 Subject Key Identifier:&lt;br /&gt;       87:D2:7C:2B:D1:B0 &lt;span style=&quot;font-style: italic;&quot;&gt;truncated&lt;/span&gt;&lt;br /&gt;     X509v3 Basic Constraints:&lt;br /&gt;       CA:FALSE&lt;br /&gt;     X509v3 Key Usage: critical&lt;br /&gt;       Digital Signature, Non Repudiation, Key Encipherment, Data Encipherment&lt;br /&gt;     X509v3 Extended Key Usage:&lt;br /&gt;       TLS Web Server Authentication, TLS Web Client Authentication, Microsoft Server Gated Crypto, Netscape Server Gated Crypto&lt;br /&gt;     X509v3 Certificate Policies:&lt;br /&gt;       Policy: 1.3.6.1.4.1.4146.1.1&lt;br /&gt;         CPS: http://www.globalsign.net/repository/&lt;br /&gt;&lt;br /&gt;     Netscape Cert Type:&lt;br /&gt;       SSL Client, SSL Server&lt;br /&gt;     X509v3 Subject Alternative Name:&lt;br /&gt;       DNS:www.examplewebsite.net, DNS:examplewebsite.net&lt;br /&gt; Verify Certificate:&lt;br /&gt;   unable to get local issuer certificate&lt;br /&gt;&lt;br /&gt;root@dorkness~:#&lt;br /&gt;&lt;/blockquote&gt;&lt;br /&gt;&lt;br /&gt;So a generic run returns a lot of information. We learn the properties such as validity, &lt;a href=&quot;http://msdn.microsoft.com/en-us/library/ms675449%28VS.85%29.aspx&quot;&gt;CN&lt;/a&gt; &lt;a href=&quot;http://wiki.cacert.org/DomainController&quot;&gt;CDP&lt;/a&gt; &lt;a href=&quot;http://en.wikipedia.org/wiki/Online_Certificate_Status_Protocol&quot;&gt;OSCP&lt;/a&gt; even the &lt;a href=&quot;http://en.wikipedia.org/wiki/Extended_Validation_Certificate&quot;&gt;EV &lt;/a&gt;attributes are returned.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Note:&lt;/span&gt; This information is all publicly available. This tool just presents said info in a nice format such as &lt;a href=&quot;http://en.wikipedia.org/wiki/XML&quot;&gt;.xml &lt;/a&gt;files, using the --xml=file flag, where &lt;span style=&quot;font-style: italic;&quot;&gt;file&lt;/span&gt; is the name to save as.&lt;br /&gt;&lt;br /&gt;The other flags above can be used to further refine the output. One of the more important ones is the -&lt;span style=&quot;font-style: italic;&quot;&gt;-no-failed flag&lt;/span&gt; which only lists accepted ciphers (see output above), the default of course is to list them all. The &lt;span style=&quot;font-style: italic;&quot;&gt;ssl2, ssl3,&lt;/span&gt; and &lt;span style=&quot;font-style: italic;&quot;&gt;tls1&lt;/span&gt; flags of course will check for and list only those ciphers defined. If you have several servers to check on then you can also pass a list to sslscan using the &lt;span style=&quot;font-style: italic;&quot;&gt;--targets=file &lt;/span&gt;flag. The other flags are pretty self explanatory.&lt;br /&gt;&lt;br /&gt;So the question become &quot;Why is any or all of this important?&quot; Well easy. When auditing servers you may find ones that use weak cypher or protocols, think &lt;a href=&quot;http://en.wikipedia.org/wiki/Null_cipher&quot;&gt;NULL cipher&lt;/a&gt;, or SSLv1.&lt;br /&gt;&lt;br /&gt;Well that&#39;s about all there is to it, have fun and enjoy.</description><link>http://archangelamael.blogspot.com/2010/05/sslscan-in-bt.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8629796283235435780.post-5021684837515278392</guid><pubDate>Wed, 19 May 2010 15:19:00 +0000</pubDate><atom:updated>2010-05-19T08:24:45.457-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">delete panel</category><category domain="http://www.blogger.com/atom/ns#">gnome</category><category domain="http://www.blogger.com/atom/ns#">panels</category><category domain="http://www.blogger.com/atom/ns#">restore panel</category><title>Remove and Renew Gnome Panels</title><description>So your messing around with your panels in gnome and maybe you did like me and biffed them. &lt;br /&gt;Well here is a quick way to remove and renew them. &lt;br /&gt;Get a shell opened up and type the following commands in succession and then you will kill the panels, delete them and create the default panels when you first installed gnome. &lt;br /&gt;&lt;br /&gt;----------------CODE-------------------------&lt;br /&gt;&lt;br /&gt;aa@dork:~# gconftool --recursive-unset /apps/panel&lt;br /&gt;&lt;br /&gt;aa@dork:~# -rf ~/.gconf/apps/panel&lt;br /&gt;&lt;br /&gt;aa@dork:~# pkill gnome-panel&lt;br /&gt;&lt;br /&gt;----------------CODE-------------------------&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;So that&#39;s pretty much it. Again this will kill your panels and then recreate the defaults for you.</description><link>http://archangelamael.blogspot.com/2010/05/remove-and-renew-gnome-panels.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8629796283235435780.post-1236511183074482252</guid><pubDate>Fri, 30 Apr 2010 20:04:00 +0000</pubDate><atom:updated>2010-05-01T12:43:43.396-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">BT4</category><category domain="http://www.blogger.com/atom/ns#">Enumeration</category><category domain="http://www.blogger.com/atom/ns#">Web Scanners</category><category domain="http://www.blogger.com/atom/ns#">Whatweb 0.4.2</category><title>Install WhatWeb 0.4.2 in BT4</title><description>Quick guide to get &lt;a href=&quot;http://www.morningstarsecurity.com/research/whatweb&quot;&gt;Whatweb&lt;/a&gt; going in BT4 &lt;br /&gt;WhatWeb is a &quot;Next generation web scanner. Identify what websites are running.&quot;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;First and foremost grab some shell in BT, and get the tar.gz:&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;root@dorkbox:/pentest/enumeration# wget http://www.morningstarsecurity.com/downloads/whatweb-0.4.2.tar.gz&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Next unpack the archive:&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;root@dorkbox:/pentest/enumeration# tar xvf whatweb* &lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Remove the archive, and change into the new directory:&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;root@dorkbox:/pentest/enumeration# rm -f whatweb-0.4.2.tar.gz&lt;br /&gt;root@dorkbox:/pentest/enumeration# cd whatweb*&lt;br /&gt;root@dorkbox:/pentest/enumeration/whatweb-0.4.2#&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Next read the Install file. &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;root@dorkbox:/pentest/enumeration/whatweb-0.4.2# cat INSTALL | less &lt;br /&gt;&lt;br /&gt;As you can see by the install file it mentions using ruby 1.9&lt;br /&gt;Well BT4 comes with Ruby 1.8.7 I am not sure if this will make a difference since there is no mention in the documentation nor the website of any type of dependencies. So far during my experiments with WhatWeb, I have not seen any problems. YMMV. There is also mention to a couple other packages but these are already included in BT4 so no problems there. &lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;&lt;br /&gt;As for using the program see also the readme.&lt;/span&gt;&lt;br /&gt;The readme will contain a good bit of info on using whatweb.&lt;br /&gt;&lt;br /&gt;root@dorkbox:/pentest/enumeration/whatweb-0.4.2# cat README | less &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;But as an example of some generic output: &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;root@bt:/pentest/enumeration/whatweb# ./whatweb examplewebsite.com&lt;br /&gt;http://examplewebsite.com [301] title[301 Moved Permanently], server-header[Apache], redirect-location[http://www.examplewebsite.com/], md5[0670664f17b872398a96c6a58e812c2d], header-hash[0671564f07b972398a96c6a58e812c2d]&lt;br /&gt;http://examplewebsite.com/ [200] Google-Analytics-GA[791888], Joomla[1.4], server-header[Apache], meta-generator[Joomla! 1.4 - Open Source Content Management], title[Example Websites Design], md5[fcb3ec0df12e54dfdef2e991a24f1c1], footer-hash[a19d726fa5771113aceaec0c61b1bf8ea7], div-span-structure[e56dd07d6f482ee11342e4ea99a9e6a8], header-hash[4379923363b07114470bde23484214e3f]&lt;br /&gt;root@bt:/pentest/enumeration/whatweb#&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;&lt;br /&gt;As a side note the above is not a real website. &lt;/span&gt;&lt;br /&gt;Thanks to http://www.morningstarsecurity.com and Andrew Horton aka urbanadventurer&lt;br /&gt;Have fun and remember don&#39;t mess with networks that you don&#39;t have permission for.</description><link>http://archangelamael.blogspot.com/2010/04/install-whatweb-042-in-bt4.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8629796283235435780.post-4236992443736768221</guid><pubDate>Fri, 30 Apr 2010 13:11:00 +0000</pubDate><atom:updated>2010-04-30T06:28:36.585-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Data Capture</category><category domain="http://www.blogger.com/atom/ns#">tcp</category><category domain="http://www.blogger.com/atom/ns#">tcp/ip</category><category domain="http://www.blogger.com/atom/ns#">TCPDump</category><title>TCPDump Flags</title><description>I was trying to capture some data the other day and was using &lt;a href=&quot;http://www.tcpdump.org&quot;&gt;TCPDump&lt;/a&gt;. This is really for my own needs but I like to share when I can. &lt;br /&gt;Here are a few flags to use when trying to capture certain data types in TCP.&lt;br /&gt;There are more and you can read online to find more if needed.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Sniff all SYN flagged packets:&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;root@bt:~# tcpdump &#39;tcp[13] &amp; 2 != 0&#39;&lt;br /&gt;&lt;br /&gt;tcpdump: verbose output suppressed, use -v or -vv for full protocol decode&lt;br /&gt;listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes&lt;br /&gt;^C  &lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;ctrl+c: Indicates that I stopped the capture. &lt;/span&gt;&lt;br /&gt;0 packets captured&lt;br /&gt;0 packets received by filter&lt;br /&gt;0 packets dropped by kernel&lt;br /&gt;&lt;br /&gt;With the above resulting output. &lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Sniff all PSH flagged packets:&lt;/span&gt;&lt;br /&gt;root@bt:~# tcpdump &#39;tcp[13] &amp; 8 != 0&#39;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Sniff all URG flagged packets:&lt;/span&gt;&lt;br /&gt;root@bt:~# tcpdump &#39;tcp[13] &amp; 32 != 0&#39;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Sniff all RST flagged packets:&lt;/span&gt;&lt;br /&gt;root@bt:~# tcpdump &#39;tcp[13] &amp; 4 != 0&#39;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Sniff all ACK flagged packets:&lt;/span&gt;&lt;br /&gt;root@bt:~# tcpdump &#39;tcp[13] &amp; 16 != 0&#39;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Sniff all FIN flagged packets:&lt;/span&gt;&lt;br /&gt;root@bt:~# tcpdump &#39;tcp[13] &amp; 1 != 0&#39;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Sniff all SYN-ACK flagged packets:&lt;/span&gt;&lt;br /&gt;root@bt:~# tcpdump &#39;tcp[13] = 18&#39;</description><link>http://archangelamael.blogspot.com/2010/04/tcpdump-flags.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8629796283235435780.post-4976783688418010454</guid><pubDate>Wed, 03 Mar 2010 20:57:00 +0000</pubDate><atom:updated>2010-07-19T02:43:04.053-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hex codes</category><category domain="http://www.blogger.com/atom/ns#">vga</category><category domain="http://www.blogger.com/atom/ns#">vga codes</category><title>VGA Resolutions Codes</title><description>I was looking for a VGA Resolution Code and needed to look in several places to find a complete list. Or at list the ones that I wanted.&lt;br /&gt;So here is a list of all the ones I collected.&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Width-Height-Depth VGA Codes HEX Codes&lt;/span&gt;&lt;br /&gt;80x25 (TEXT)----------- 3840------------0xF00&lt;br /&gt;80x50 (TEXT)  3841  0xF01&lt;br /&gt;80x43 (TEXT)  3842  0xF02&lt;br /&gt;80x28 (TEXT)  3843  0xF03&lt;br /&gt;80x30 (TEXT)  3845  0xF05&lt;br /&gt;80x34 (TEXT)  3846  0xF06&lt;br /&gt;80x60 (TEXT)  3847  0xF07&lt;br /&gt;&lt;br /&gt;320x200x8  816  0x330&lt;br /&gt;320x200x16  782  0x30E&lt;br /&gt;320x200x24  783  0x30F&lt;br /&gt;&lt;br /&gt;320x240x8  820  0x334&lt;br /&gt;320x240x16  821  0x335&lt;br /&gt;320x240x24  822  0x336&lt;br /&gt;&lt;br /&gt;320x400x8  817  0x331&lt;br /&gt;320x400x16  818  0x332&lt;br /&gt;320x400x24  819  0x333&lt;br /&gt;&lt;br /&gt;640x400x8  768  0x300&lt;br /&gt;640x400x16  829  0x33d&lt;br /&gt;640x400x24  830  0x33e&lt;br /&gt;&lt;br /&gt;640x480x8  769  0x301&lt;br /&gt;640x480x16  785  0x311&lt;br /&gt;640x480x24  786  0x312&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Width-Height-Depth VGA Codes HEX Codes&lt;/span&gt;&lt;br /&gt;768x480x8  866  0x362&lt;br /&gt;768x480x16  ???  ????&lt;br /&gt;768x480x24  ???  ????&lt;br /&gt;&lt;br /&gt;800x600x8  771  0x303&lt;br /&gt;800x600x16  788  0x314&lt;br /&gt;800x600x24  789  0x315&lt;br /&gt;&lt;br /&gt;1024x768x8  773  0x305&lt;br /&gt;1024x768x16  791  0x317&lt;br /&gt;1024x768x24  792  0x318&lt;br /&gt;&lt;br /&gt;1280x800x8  864  0x360&lt;br /&gt;1280x800x16  ???  ????&lt;br /&gt;1280x800x24  865  0x361&lt;br /&gt;&lt;br /&gt;1280x1024x8            775             0x307&lt;br /&gt;1280x1024x16           794             0x31a&lt;br /&gt;1280x1024x24           795             0x31b&lt;br /&gt;&lt;br /&gt;1440x900x8  868  0x364&lt;br /&gt;1440x900x16  ???  ????&lt;br /&gt;1440x900x24  869  0x365&lt;br /&gt;&lt;br /&gt;1600x1200x8            796             0x372&lt;br /&gt;1600x1200x16           798             0x374&lt;br /&gt;1600x1200x24           799             0x375&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Note to self : The vga code for the eeepc 701 series = 311</description><link>http://archangelamael.blogspot.com/2010/03/vga-resolutions-codes.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8629796283235435780.post-1001254862173700932</guid><pubDate>Sat, 27 Feb 2010 21:11:00 +0000</pubDate><atom:updated>2010-02-27T13:23:28.582-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">BT4</category><category domain="http://www.blogger.com/atom/ns#">firefox</category><category domain="http://www.blogger.com/atom/ns#">swiftfox</category><title>Adding SwiftFox to BT4</title><description>Ok so a quick guide on adding another browswer to BT4&lt;br /&gt;&lt;a href=&quot;http://getswiftfox.com/index.htm&quot;&gt;Swiftfox&lt;/a&gt; is based off of &lt;a href=&quot;http://www.firefox.com&quot;&gt;Firefox&lt;/a&gt; and it is designed to be faster. &lt;br /&gt;There are different builds to take advantage of different processors.&lt;br /&gt;Use at your own discretion. &lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;First add the repo to your sources.list. &lt;/span&gt;&lt;br /&gt;--------------------code------------------------------&lt;br /&gt;root@dorktest:~# nano /etc/apt/sources.list &lt;br /&gt;--------------------code------------------------------&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;add the following :&lt;/span&gt;&lt;br /&gt;--------------------code------------------------------&lt;br /&gt;deb http://getswiftfox.com/builds/debian unstable non-free&lt;br /&gt;--------------------code------------------------------&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Then install it:&lt;/span&gt;&lt;br /&gt;--------------------code------------------------------&lt;br /&gt;root@dorktest:~# apt-get update &amp;&amp; apt-get install swiftfox-yourprochere&lt;br /&gt;--------------------code------------------------------&lt;br /&gt;where &lt;span style=&quot;font-weight:bold;&quot;&gt;yourprochere&lt;/span&gt; is your processor.&lt;br /&gt;The different versions available are: &lt;br /&gt;swiftfox-i686 (Older AMD &amp; Intel)&lt;br /&gt;swiftfox-athlon64 (AMD64 users on a 64bit OS)&lt;br /&gt;swiftfox-athlon64-32bit (AMD64 users on a 32bit OS)&lt;br /&gt;swiftfox-prescott (Intel Prescott and newer)&lt;br /&gt;If you are not sure use &lt;a href=&quot;http://getswiftfox.com/proc.htm&quot;&gt;this chart&lt;/a&gt; for more info.</description><link>http://archangelamael.blogspot.com/2010/02/adding-swiftfox-to-bt4.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8629796283235435780.post-3325218869627979384</guid><pubDate>Fri, 26 Feb 2010 23:29:00 +0000</pubDate><atom:updated>2010-02-26T16:16:17.935-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">aircrack-ng</category><category domain="http://www.blogger.com/atom/ns#">Airdrop-ng</category><category domain="http://www.blogger.com/atom/ns#">BT4</category><title>Install Airdrop-ng</title><description>So the TheX1le released (to the general populace) airdrop-ng today.&lt;br /&gt;You can visit the &lt;a href=&quot;http://www.aircrack-ng.org/&quot;&gt;aircrack-ng&lt;/a&gt; site for more info. There is a video of the talk &lt;a href=&quot;http://www.ustream.tv/recorded/4503340&quot;&gt;here.&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;So this one is so easy a itard can do it.&lt;br /&gt;Grab a shell in BT4 &lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Then&lt;/span&gt; &lt;br /&gt;---------------code--------------------------------------&lt;br /&gt;root@dorktest:~# cd /pentest/wireless/&lt;br /&gt;root@dorktest:/pentest/wireless# svn co http://trac.aircrack-ng.org/svn/trunk/scripts/airdrop-ng&lt;br /&gt;---------------code--------------------------------------&lt;br /&gt;Second line above should be all on one line. &lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Once it completes then:&lt;/span&gt; &lt;br /&gt;---------------code--------------------------------------&lt;br /&gt;root@dorktest:~# cd /pentest/wireless/airdrop-ng/&lt;br /&gt;root@dorktest:/pentest/wireless/airdrop-ng/ cat  README&lt;br /&gt;---------------code--------------------------------------&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;And Read it. &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Then:&lt;/span&gt;&lt;br /&gt;---------------code--------------------------------------&lt;br /&gt;root@dorktest:/pentest/wireless/airdrop-ng/python install.py&lt;br /&gt;---------------code--------------------------------------&lt;br /&gt;to run the installer.&lt;br /&gt;See how easy that was.</description><link>http://archangelamael.blogspot.com/2010/02/install-airdrop-ng.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8629796283235435780.post-6771093488802981596</guid><pubDate>Fri, 05 Feb 2010 14:14:00 +0000</pubDate><atom:updated>2010-02-05T06:31:43.314-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">BT4</category><category domain="http://www.blogger.com/atom/ns#">ecryptfs</category><category domain="http://www.blogger.com/atom/ns#">Encryption</category><title>Installing ecryptfs in BT4.</title><description>Installing ecryptfs in BT4.&lt;br /&gt;This guide is a simple one to get encryption setup. This is not the best way of doing things&lt;br /&gt;However it is probably the quickest and easiest to do. &lt;br /&gt;First things:&lt;br /&gt;-----------------code------------------------------&lt;br /&gt;root@bt:~# apt-get install ecryptfs-utils&lt;br /&gt;Reading package lists... Done&lt;br /&gt;The following NEW packages will be installed:&lt;br /&gt;  ecryptfs-utils libecryptfs0 libtspi1&lt;br /&gt;0 upgraded, 3 newly installed, 0 to remove and 19 not upgraded.&lt;br /&gt;Need to get 331kB of archives.&lt;br /&gt;After this operation, 1212kB of additional disk space will be used.&lt;br /&gt;Do you want to continue [Y/n]? y&lt;br /&gt;-----------------code------------------------------&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;After the install is complete before you go on READ THE MAN PAGE and the faq&lt;/span&gt;&lt;br /&gt;-----------------code------------------------------&lt;br /&gt;root@bt:~# man ecryptfs &lt;br /&gt;root@bt:~# /usr/share/doc/ecryptfs-utils/ecryptfs-faq.html&lt;br /&gt;-----------------code------------------------------&lt;br /&gt;See also the web page at http://ecryptfs.sourceforge.net/&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;This is important for your security.&lt;/span&gt;&lt;br /&gt;Next run the setup&lt;br /&gt;-----------------code------------------------------&lt;br /&gt;root@bt:~# ecryptfs-setup-private&lt;br /&gt;Enter your log in passphrase: &lt;span style=&quot;font-style:italic;&quot;&gt;enter your actual log in info here&lt;/span&gt;&lt;br /&gt;Enter your mount passphrase [leave blank to generate one]:&lt;br /&gt;************************************************************************&lt;br /&gt;YOU SHOULD RECORD THIS MOUNT PASSPHRASE AND STORE IN A SAFE LOCATION:&lt;br /&gt;a706b05233346537fa28121a40e2040ce&lt;br /&gt;THIS WILL BE REQUIRED IF YOU NEED TO RECOVER YOUR DATA AT A LATER TIME.&lt;br /&gt;************************************************************************&lt;br /&gt;Done configuring.&lt;br /&gt;Testing mount/write/umount/read...&lt;br /&gt;Testing succeeded.&lt;br /&gt;-----------------code------------------------------&lt;br /&gt;Once this is done there will be a new directory created called Private&lt;br /&gt;Since I did this with the root user account it is stored in /&lt;br /&gt;Inside this directory is a readme read it before proceeding.&lt;br /&gt;So in order to use your new encrypted directory you will need to log out and back in.&lt;br /&gt;Now your log in passphrase along with the aforementioned mount passphrase will be used to mount the directory Private. There are caveats to using this type of system. Only data you store in Private is encrypted. Any data saved or collected while browsing the internet that is stored elsewhere on the system will be not be encrypted. If you have a swap partition it will not be encrypted either.  As with most encryption systems if you leave physical access or access to the encrypted container open (suppose you leave the computer and go out for a coffee, without logging out) then again the data would be accessible. Also when you log out the folder will show that there is encrypted data in the directory.</description><link>http://archangelamael.blogspot.com/2010/02/installing-ecryptfs-in-bt4.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8629796283235435780.post-4422507042589997000</guid><pubDate>Mon, 18 Jan 2010 19:05:00 +0000</pubDate><atom:updated>2010-03-02T10:46:50.789-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">browser</category><category domain="http://www.blogger.com/atom/ns#">BT</category><category domain="http://www.blogger.com/atom/ns#">Google</category><category domain="http://www.blogger.com/atom/ns#">Google Chromium</category><title>Google Chromium in BT4</title><description>This is a small guide to adding the Google browser Chromium to &lt;a href=&quot;http://www.backtrack-linux.org/&quot;&gt;Back Track 4&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;Note: Following this guide may break your system and no one will take responsibility for it but you.&lt;br /&gt;OK the first thing you need to do is add the PPA&#39;s to your apt sources list. &lt;br /&gt;-------------------------CODE-----------------------------&lt;br /&gt;root@dorkbox:~# nano /etc/apt/sources.list&lt;br /&gt;-------------------------CODE-----------------------------&lt;br /&gt;Add the following to the list&lt;br /&gt;-------------------------CODE-----------------------------&lt;br /&gt;# Chromium browser PPA &lt;br /&gt;deb http://ppa.launchpad.net/chromium-daily/ppa/ubuntu intrepid main&lt;br /&gt;deb-src http://ppa.launchpad.net/chromium-daily/ppa/ubuntu intrepid main&lt;br /&gt;-------------------------CODE-----------------------------&lt;br /&gt;Save and exit. &lt;br /&gt;Next get the key &lt;br /&gt;-------------------------CODE-----------------------------&lt;br /&gt;root@dorkbox:~# apt-key adv --keyserver keyserver.ubuntu.com --recv-keys FBEF0D696DE1C72BA5A835FE5A9BF3BB4E5E17B5&lt;br /&gt;-------------------------CODE-----------------------------&lt;br /&gt;Note the above should be one line. &lt;br /&gt;Next update apt&lt;br /&gt;-------------------------CODE-----------------------------&lt;br /&gt;root@dorkbox:~# apt-get update &lt;br /&gt;-------------------------CODE-----------------------------&lt;br /&gt;Last apt-get the browser.&lt;br /&gt;-------------------------CODE-----------------------------&lt;br /&gt;root@dorkbox:~# apt-get install chromium-browser &lt;br /&gt;-------------------------CODE-----------------------------&lt;br /&gt;Three other packages should get pulled as well.&lt;br /&gt;chromium-browser chromium-browser-inspector chromium-codecs-ffmpeg</description><link>http://archangelamael.blogspot.com/2010/01/google-chromium-in-bt4.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>2</thr:total></item></channel></rss>