Friday, January 20, 2017

Python SimpleHTTPServer ile dizin servisi

Bulunduğunuz dizini spesifik bir porta atayacağınız SimpleHTTPServer  ile hızlıca servis edebilirsiniz. Özellikle hızlıca ağ içi dosya transferi için kullanışlı.

$ python -m SimpleHTTPServer 8090


Tuesday, January 17, 2017

bugcrowd

bugcrowd.com

Utilize the collective creativity of tens of thousands of hackers to test your applications
https://bugcrowd.com/how-it-works

Saturday, January 7, 2017

Grant DBA rights to specific user

$ sqlplus

SQL*Plus: Release 11.2.0.1.0 Production on Sat Jan 7 13:52:22 2017

Copyright (c) 1982, 2009, Oracle.  All rights reserved.

Enter user-name: sys as sysdba
Enter password:

Connected to:
Oracle Database 11g Enterprise Edition Release 11.2.0.1.0 - 64bit Production
With the Partitioning, OLAP, Data Mining and Real Application Testing options

SQL> grant dba to availabilityuser with admin option;

Grant succeeded.

Thursday, December 22, 2016

Veritas Volume Replicator operational notes

VVR nedir?

Veritas volume replicator, Veritas storage foundation yeni adı ile Infoscale uygulamalarında prod ve drc tarafında uygulayabileceğiniz bir replikasyon çözümüdür.



RVG'ye yeni bir volume ekleme işlemi:

Öncelikle primary ve secondary tarafında volume tanımı yapılmalı ve logtype=dcm belirtilmeli ve secondary tarafta mkfs.vxfs ile biçimlendirme yapılmalıdır.

prod # vradmin -g cbsdg addvol rvg_rclus home0


RVG'den volume çıkarma işlemi:

Öncelikle volume primary sistemde umount yapılmalı. Umount işlemi için eğer VCS (Veritas Cluster Server) kullanıyorsanız cluster explorer arayüzü veya hares komut çağrılarını kullanabilirsiniz.

Aşağıdaki işlem sonrası hem prod hem de drc tarafında vxprint çıktılarında volume'ün RVG kapsamından çıktığını gözlemledim.

Sonrasında:

prod # vradmin -g cbsdg delvol rvg_rclus home0


Mevcut bir Rlink kaydı üzerinde düzenleme işlemi:

Öncelikle rlink pause edilmeli.

prod # vxrlink -g cbsdg pause rlink_rclus
prod # vxedit -g cbsdg set remote_dg=cbsdg rlink_rclus
prod # vxrlink -g cbsdg resume rlink_rclus





Veritas Storage Foundation and High Availability Solutions Replication Administrator's Guide:
https://origin-download.veritas.com/resources/content/live/DOCUMENTATION/5000/DOC5264/en_US/sf_replication_admin_60_lin.pdf



Sunday, December 18, 2016

Ücretsiz olarak kullanabileceğiniz en iyi 10 networking monitoring çözümü




  1. monit
  2. ganglia
  3. munin
  4. cacti
  5. nagios
  6. zabbix
  7. observium
  8. zenoss
  9. collectd
  10. argus

Kaynak:

sixrevisions.com/tools/10-free-server-network-monitoring-tools-that-kick-ass


Varsayılan şifreler ile alakalı siteler



http://www.defaultpassword.com

http://www.routerpasswords.com

Ağ yöneticileri için sertifikasyon yol haritası




Kaynak:

http://www.itcareerfinder.com/brain-food/blog/entry/it-certification-path-network-administrator.html

Wednesday, December 7, 2016

Veritas Cluster Server: make main.cf writable and save

Veritas Cluster Server ile uygulamalarınızı high available çalışmalarını sağlayabilirsiniz.

A/A veya A/P senaryolar için kullanabilirsiniz.

Çok sayıda resource üzerinde çalışıyorsunuz konsol tabanlı operasyon yapma ihtiyacı söz konusu olabiliyor bu durumda konsol operasyonlarınız öncesi main.cf dosyasını yazıalbilir hale getirip işlemlerinizi yapıp kaydetmeniz gerekiyor.

main.cf veritas cluster server ayarlarının saklandığı her bir node'da bulunan dosya.

Yazılabilir yapmak için:
# haconf -makerw

Kaydetmek için:
# haconf -dump -makero


Thursday, December 1, 2016

Veritas Storage Foundation / Infoscale: volume, disk grubu yaratma ve listeme

Volume yaratma:

# vxassist -g cbsdg make dataVol02 10m


Volume listeleme:

# vxlist vol


Disk grubu yaratma

# vxdg init <dgname>


Disk grubu ve disk listeme

# vxdisk -e -o alldgs list

# vxdg list


Friday, November 18, 2016

xargs usage

xargs can also be used to parallelize operations with the -P maxprocs argument to specify how many parallel processes should be used to execute the commands over the input argument lists. However, the output streams may not be synchronized. This can be overcome by using an --output file argument where possible, and then combining the results after processing. The following example queues 24 processes and waits on each to finish before launching another.

find /path -name '*.foo' | xargs -P 24 -I '{}' /cpu/bound/process '{}' -o '{}'.out

https://en.wikipedia.org/wiki/Xargs






Thursday, November 3, 2016

tcpdump komutu kullanım örnekleri

www.thegeekstuff.com/2010/08/tcpdump-command-examples

Linux Security Administrator's Guide


general overview of security issues that face the administrator of Linux systems. It covers general security philosophy and a number of specific examples of how to better secure your Linux system from intruders. Also included are pointers to security related material and programs.

www.linuxsecurity.com/docs/SecurityAdminGuide/SecurityAdminGuide.html

Saturday, October 15, 2016

15 popüler ağ güvenliği aracı


1. Nmap

Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap homepage.


2. Wireshark

Wireshark is a network protocol analyzer. It lets you capture and interactively browse the traffic running on a computer network. Wireshark homepage.


3. Metasploit Community edition

Metasploit Community Edition simplifies network discovery and vulnerability verification for specific exploits, increasing the effectiveness of vulnerability scanners. This helps prioritize remediation and eliminate false positives, providing true security risk intelligence. Metasploit community edition homepage.


4. Nikto2

Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6400 potentially dangerous files/CGIs, checks for outdated versions of over 1200 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software. Nikto2 homepage.


5. John the Ripper

John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix systems, supported out of the box are Windows LM hashes, plus lots of other hashes and ciphers in the community-enhanced version. John the Ripper homepage.


6. ettercap

Ettercap is a comprehensive suite for man in the middle attacks. It features sniffing of live connections, content filtering on the fly and many other interesting tricks. It supports active and passive dissection of many protocols and includes many features for network and host analysis. ettercap homepage.


7. NexPose Community edition

The Nexpose Community Edition is a free, single-user vulnerability management solution. Nexpose Community Edition is powered by the same scan engine as Nexpose Enterprise and offers many of the same features. Nexpose homepage.


8. Ncat

Ncat is a feature-packed networking utility which reads and writes data across networks from the command line. Ncat was written for the Nmap Project as a much-improved reimplementation of the venerable Netcat. It uses both TCP and UDP for communication and is designed to be a reliable back-end tool to instantly provide network connectivity to other applications and users. Ncat will not only work with IPv4 and IPv6 but provides the user with a virtually limitless number of potential uses. ncat homepage.


9. Kismet

Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and (with appropriate hardware) can sniff 802.11b, 802.11a, 802.11g, and 802.11n traffic. Kismet also supports plugins which allow sniffing other media such as DECT. kismet homepage.


10. w3af

w3af is a Web Application Attack and Audit Framework. The project’s goal is to create a framework to find and exploit web application vulnerabilities that is easy to use and extend. w3af homepage.


11. hping

hping is a command-line oriented TCP/IP packet assembler/analyzer. The interface is inspired to the ping(8) unix command, but hping isn’t only able to send ICMP echo requests. It supports TCP, UDP, ICMP and RAW-IP protocols, has a traceroute mode, the ability to send files between a covered channel, and many other features. hping homepage.


12. burpsuite

Burp Suite is an integrated platform for performing security testing of web applications. Its various tools work seamlessly together to support the entire testing process, from initial mapping and analysis of an application’s attack surface, through to finding and exploiting security vulnerabilities. BurpSuite homepage.


13. THC-Hydra

A very fast network logon cracker which support many different services. hydra homepage.


14. sqlmap

sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections. sqlmap homepage.


15. webscarab

WebScarab has a large amount of functionality, and as such can be quite intimidating to the new user. But, for the simplest case, intercepting and modifying requests and responses between a browser and HTTP/S server, there is not a lot that needs to be learned. WebScarab homepage.

Friday, October 14, 2016

linux: mac spoof nasıl yapılır

* Spoof the MAC address:

sudo ifconfig en1 ether [mac address to spoof]

Where it says "[mac address to spoof]", press Command-V to paste the victim's, er, I mean the machine-to-be-spoofed's MAC address.  Your machine may require an administrator password at this point.  This is the password you use to log into OS X on your own machine.

* Confirm the spoof:

ifconfig en1 | grep ether

Your displayed MAC address should now be different from what it was before.

A Developer’s Journey into Linux Containers



https://deis.com/blog/2015/developer-journey-linux-containers/

command line external ip information

$ curl ipinfo.io

Return IP information about your external ip address with JSON format

Tuesday, October 11, 2016

OS X El Capitan: how to run wireshark with iphone usb interface

Öncelikle cihazınıza ait udid bilgisini edinmeniz gerekiyor. Bu bilgiyi itunes summary kısmından öğrenebilirsiniz.

Detaylar:

https://blog.unlockbase.com/find-udid-blocked-icloud-iphone/

Sonrasında virtual interface oluşturmak için rvictl aracını kullanıyoruz.

localuserpc:~ root# rvictl -s en5

rvictl [-h][-l][-s <udid1> ... <udidN>][-x <udid1> ... <udidN>]

Remote Virtual Interface Tool starts and stops a remote packet capture instance 
for any set of attached mobile devices. It can also provide feedback on any attached 
devices that are currently relaying packets back to this host. 

Options:
-l, -L List currently active devices
-s, -S Start a device or set of devices
-x, -X Stop a device or set of devices


localuserpc:~ root# rvictl -s
Starting device XXX [SUCCEEDED] with interface rvi0

sonrasında çalıştırdığınızda rvi0 interface'i üzerinden filtreleme yapabilirsiniz;

localuserpc:~ root# wireshark


Thursday, September 8, 2016

jq: command-line tool for parsing JSON.

Passing it through jq's parser, with the most basic option, will make it look nicer (with colors):
user@host:~$ curl -s https://status.github.com/api/status.json |\
  jq '.'
{
  "status": "good",
  "last_updated": "2015-01-21T16:59:01Z"
}
Do some basic selection:
user@host:~$ curl -s https://status.github.com/api/status.json |\
  jq '.status'
"good"

Tuesday, August 23, 2016

anti adblock killer ile adblock tespit eden siteleri bypass edin

https://greasyfork.org/en/scripts/735-anti-adblock-killer-reek

bu script'i kullanabilmeniz için tarayıcınızda tampermonkey kurulu olmalıdır.

2016 Data Storage Innovation Conference sunumları erişilibilir

2016 Data Storage Innovation Conference sunumları erişilibilir

http://www.snia.org/events/dsicon/presentations2016


Yeni sürüm BlackArch Linux yayınlandı

The new ISOs include over 1500 tools. For more details see the ChangeLog below.

Here's the ChangeLog :
include linux kernel 4.7.1
updated BlackArch Linux installer
added more than 100 new tools
updated all blackarch tools
updated all system packages
updated menu entries for window managers (awesome, fluxbox, openbox)


Wednesday, August 17, 2016

NSA Private Hacking Tools

NSA's Hacking Group Hacked! Bunch of Private Hacking Tools:

The Equation Group is a highly sophisticated threat actor described by its discoverers at Kaspersky Labs as one of the most sophisticated cyber attack groups in the world and "the most advanced ... we have seen", operating alongside but always from a position of superiority with the creators of Stuxnet and Flame.[1][2]

The name Equation Group was chosen because of the group's predilection for strong encryption methods in their operations. By 2015, Kaspersky documented 500malware infections by the group in at least 42 countries, while acknowledging that the actual number could be in the tens of thousands due to its self-terminating protocol.[2][3]

They are suspected of being tied to the United States National Security Agency (NSA).[4][5] By 2015, most of their targets had been in Iran, Russia, Pakistan,Afghanistan, India, Syria, and Mali.[2]


Hacker Demands $568 Million in Bitcoin to Leak All Tools and Data


Not just this, the hackers, calling themselves "The Shadow Brokers," are also asking for 1 Million Bitcoins (around $568 Million) in an auction to release the 'best' cyber weapons and more files.
İncelemek isterseniz aşağıdaki adreslerden indirebilirsiniz.

File Urls
- ———-

magnet:?xt=urn:btih:40a5f1514514fb67943f137f7fde0a7b5e991f76&tr=http://diftracker.i2p/announce.php

https://mega.nz/#!zEAU1AQL!oWJ63n-D6lCuCQ4AY0Cv_405hX8kn7MEsa1iLH5UjKU
https://app.box.com/s/amgkpu1d9ttijyeyw2m4lso3egb4sola
https://www.dropbox.com/s/g8kvfl4xtj2vr24/EQGRP-Auction-Files.zip
https://ln.sync.com/dl/5bd1916d0#eet5ufvg-tjijei4j-vtadjk6b-imyg2qkd
https://yadi.sk/d/QY6smCgTtoNz6

# unzip EQGRP-Auction-Files.zip 
Archive:  EQGRP-Auction-Files.zip
  inflating: eqgrp-auction-file.tar.xz.gpg  
  inflating: eqgrp-auction-file.tar.xz.gpg.sig  
  inflating: eqgrp-free-file.tar.xz.gpg  
  inflating: eqgrp-free-file.tar.xz.gpg.sig  
  inflating: public.key.asc          
  inflating: sha256sum.txt           

  inflating: sha256sum.txt.sig 

# gpg --output eqgrp-free-file.tar.xz --decrypt eqgrp-free-file.tar.xz.gpg

tar -xf eqgrp-free-file.tar.xz

(Password: theequationgroup)

# cd Firewall/
# ls
BANANAGLEE  BARGLEE  BLATSTING  BUZZDIRECTION  EXPLOITS  OPS  padding  SCRIPTS  TOOLS  TURBO

https://webcache.googleusercontent.com/search?q=cache:owtq6OBSmgEJ:https://theshadowbrokers.tumblr.com/+&cd=1&hl=en&ct=clnk&gl=us


Friday, August 12, 2016

firefox: An error occurred during a connection to localhost:5634. Issuer certificate is invalid. (Error code: sec_error_ca_cert_invalid)

Platform: Red Hat Enterprise Linux Server release 6.6

Veritas Operations Manager Server 6.1 kurulumu sonrası https://localhost:5634/ arayüzüne firefox ile erişim sağlamaya çalıştığımda aşağıdaki hatayı aldım.

Secure Connection Failed

An error occurred during a connection to localhost:5634. Issuer certificate is invalid. (Error code: sec_error_ca_cert_invalid)

    The page you are trying to view cannot be shown because the authenticity of the received data could not be verified.
    Please contact the website owners to inform them of this problem. Alternatively, use the command found in the help menu to report this broken site.

Çözüm:

Go to about:config

security.use_mozillapkix_verification

set it to true (you can double click on it to do so) and restart firefox

Tuesday, July 19, 2016

epel and remi repo installation on centos 6


  • Command to install the EPEL repository configuration package:    yum install https://dl.fedoraproject.org/pub/epel/epel-release-latest-6.noarch.rpm
  • Command to install the Remi repository configuration package:    yum install http://rpms.remirepo.net/enterprise/remi-release-6.rpm