Every time we access an Internet resource (web, mail, IRC, etc…) our ADSL modem or router is connected “directly”: all packets transmitted by our computer are addressed via routers and switches across the net to their final destination.
Every time our packets pass through a network device, someone could read, analyze, intercept and hijack our communications.
In order to avoid this and protect our information, our identity and our connections we can use the widely downloaded software FreeNet.
Using Freenet we can access anonymous resources across the internet, using a decentralized encrypted network or we can create our private network between friends to chat, share information and messages.
VareseNews published my article about Home Computer Security
My article about Home Computer Security has been published by VareseNews (an Italian online newspaper) under it’s “Ventuno” blog.
Take a look on http://www3.varesenews.it/blog/ventuno/2013/04/26/il-nostro-computer-e-veramente-protetto-prima-parte/
The original article is in Italian language, but you can read it in English clicking here.
Install PWNPI 3.0, a pentest-oriented Raspberry distribution
Finally my Raspberry PI Model B Rev.2 is arrived !! I choose to buy an used one just to start some testing 🙂
I choose PWNPI 3.0 as operating system because it contains lots of useful tools to help me in my pentesting activities.
In this article I’ll show you how to install and configure PWNPI 3.0 in a 64Gb SD card.
How to install Netsniff-ng, an high performance open source network sniffer.
“Netsniff-ng is a free, high performance Linux networking toolkit. The gain of performance is reached by zero-copy mechanisms, so that on packet reception and transmission the kernel does not need to copy packets from kernel space to user space and vice versa.” The official website is netsniff-ng.org
In this tutorial I’ll try to explain how to install this powerful network tool on a Debian-like distribution (I have tested the procedure under Debian 6.0.6 Squeeze x64).
1) Download netsniff-ng sources from official web site http://netsniff-ng.org/ (at the moment the last stable release is netsniff-ng 0.5.7) into your work directory
2) Extract the archive: tar zxvf netsniff-ng-0.5.7.tar.gz
3) Install required dipendencies: apt-get install cmake libcli-dev libnl-dev libnetfilter-conntrack-dev liburcu-dev libgeoip-dev libncurses5-dev libncurses libpcap-dev ccache libpthread-stubs0-dev flex bison
4) Move into src dir: cd ./netsniff-ng-0.5.7/src
5) Create building directory: mkdir build
6) Move into the curvetun directory: cd curvetun
7) Compile NaCl as root: sudo sh build_nacl.sh /tmp
Please be patient because compiling require some time…
8) If you have no errors in the previous step you can move into the building dir: cd ../build
9) Start cmake: cmake ..
(If you have errors during thi step, try to remove CMakeCache.txt file before remake)
10) If you have no errors in the previous step you can compile the package: make
11) And now, as root, install the package: sudo make install
The netsniff-ng package is now installed and ready to use: please referer to netsniff-ng --help
for inline help or netsniff-ng.org
How to scan a remote host anonymously using Nmap, Tor and Proxychain
In this post I will try to explain how to scan a remote host anonymously using Nmap, tor and proxychains tools. This tutorial is based on Debian-like distributions.
IÂ don’t explain how to install every single tools because you can find lots of stuff about this googling around: search for How to install Tor, Vidalia, Torbutton, Nmap and proxychains.
So, if you have finished to install everything and it works well, you can start to hands on 😉