FGscanner is available for Download

Posted by:

Hi All!
I finally completed FGscanner  :)
FGscanner is a perl script useful for finding directories that are not indexed, hidden pages, development or test folders on a webserver. The script works in dictionary attack mode using two files (fg_dirs and fg_pages) and can be redirect via proxy or tor network if there is a tor daemon running on your system.

The project is hosted on GitHub and you can download it here.

This is the initial release and any comment, contribution or suggestion is more than welcome ! :)

 

0

Check systems security with Lynis

Posted by:

How many times have you wondered about your systems security ? Using Linux or Mac is not enough! You must check and configure your systems to be as secure as possible. To do this we can use Lynis, a command-line utility to check  system(s) against malware, system misconfigurations, systems integrity, etc…
Lynis is easy to install and is available for Debian like and RedHat like distros, FreeBSD and MacOSX. 

As well explained on rootkit.nl website “Lynis is an auditing tool for Unix (specialists). It scans the system and available software, to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes.

This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems. It can be run without prior installation, so inclusion on read only storage is no problem (USB stick, cd/dvd).

Lynis assists auditors in performing Basel II, GLBA, HIPAA, PCI DSS and SOX (Sarbanes-Oxley) compliance audits.”

In this article I’ll show you how to install and run Lynis on your PC.

Continue Reading →

0

The hidden side of Internet: access it anonymously with FreeNet

Posted by:

Every time we access an Internet resource (web, mail, IRC, etc…) our ADSL modem or router is connected “directly”: all packets transmitted by our computer are addressed via routers and switches across the net to their final destination.
Every time our packets pass through a network device, someone could read, analyze, intercept and hijack our communications.
In order to avoid this and protect our information, our identity and our connections we can use the widely downloaded software FreeNet.
Using Freenet we can access anonymous resources across the internet, using a decentralized encrypted network or we can create our private network between friends to chat, share information and messages.

Continue Reading →

0

VareseNews published my article about Home Computer Security

Posted by:

My article about Home Computer Security has been published by VareseNews (an Italian online newspaper) under it’s “Ventuno” blog.
Take a look on http://www3.varesenews.it/blog/ventuno/2013/04/26/il-nostro-computer-e-veramente-protetto-prima-parte/
The original article is in Italian language, but you can read it in English clicking here.

0

Install PWNPI 3.0, a pentest-oriented Raspberry distribution

Posted by:

Finally my Raspberry PI Model B Rev.2 is arrived !! I choose to buy an used one just to start some testing :)

I choose PWNPI 3.0 as operating system because it contains lots of useful tools to help me in my pentesting activities.

In this article I’ll show you how to install and configure PWNPI 3.0 in a 64Gb SD card.

Continue Reading →

1

How to install Netsniff-ng, an high performance open source network sniffer.

Posted by:

“Netsniff-ng is a free, high performance Linux networking toolkit. The gain of performance is reached by zero-copy mechanisms, so that on packet reception and transmission the kernel does not need to copy packets from kernel space to user space and vice versa.” The official website is netsniff-ng.org

In this tutorial I’ll try to explain how to install this powerful network tool on a Debian-like distribution (I have tested the procedure under Debian 6.0.6 Squeeze x64).

1) Download netsniff-ng sources from official web site http://netsniff-ng.org/ (at the moment the last stable release is netsniff-ng 0.5.7) into your work directory
2) Extract the archive: tar zxvf netsniff-ng-0.5.7.tar.gz
3) Install required dipendencies: apt-get install cmake libcli-dev libnl-dev libnetfilter-conntrack-dev liburcu-dev libgeoip-dev libncurses5-dev libncurses libpcap-dev ccache libpthread-stubs0-dev flex bison
4) Move into src dir: cd ./netsniff-ng-0.5.7/src
5) Create building directory: mkdir build
6) Move into the curvetun directory: cd curvetun
7) Compile NaCl as root: sudo sh build_nacl.sh /tmp Please be patient because compiling require some time…
8) If you have no errors in the previous step you can move into the building dir: cd ../build
9) Start cmake: cmake .. (If you have errors during thi step, try to remove CMakeCache.txt file before remake)
10) If you have no errors in the previous step you can compile the package: make
11) And now, as root, install the package: sudo make install

The netsniff-ng package is now installed and ready to use: please referer to netsniff-ng --help for inline help or netsniff-ng.org

0

How to scan a remote host anonymously using Nmap, Tor and Proxychain

Posted by:

In this post I will try to explain how to scan a remote host anonymously using Nmap, tor and proxychains tools. This tutorial is based on Debian-like distributions.
I
 don’t explain how to install every single tools because you can find lots of stuff about this googling around: search for How to install Tor, Vidalia, Torbutton, Nmap and proxychains.

So, if you have finished to install everything and it works well, you can start to hands on ;)

Continue Reading →

0

Update your Linux distro using wget, yum or apt-get behind a proxy.

Posted by:

As you probably know, patching process is a very important aspect of security strategy and lifecycle: both Windows and *nix systems must be patched against vulnerabilities and exploits. During the past months I heard sysadmins requesting firewall rules to permit servers (from internal LAN or DMZ) to access Internet web sites directly for patch download. This is not the right approach!

On Linux systems (debian/ubuntu or RHEL/CentOS) you can easily configure wget, apt-get or yum to use a proxy. The command is the same for all the applications and can be inserted in your updating scripts.

export http_proxy=http://proxyip:proxyport/

The above commands will forward each wget, apt-get or yum request to your proxy. If you need  a proxy also for https or ftp protocol you have to run also the following commands:

export https_proxy=https://proxyip:proxyport/
export ftp_proxy=ftp://proxyip:proxyport/

Keep in mind that if your proxy require authentication you should configure username and password into the script…but I don`t suggest to do this because you will store credentials in clear text and you have to set the password as never expires.
Probably it is better to configure the proxy to allow http/https/ftp requests coming from server ip without authentication only if directed to update and patches sites.

Keep patched!

0
Page 1 of 2 12