2012年1月29日 星期日

ttyrec:錄製你的tty 控制台 比scripy還好用!!

ttyrec:錄製你的tty 控制台

這是一個與script有著異曲同工之妙的小工具。ttyrec是一個tty控制台錄製程序,其所錄製的數據文件可以使用與之配套的ttyplay播放。不管是你在tty中的各種操作,還是在tty中耳熟能詳的軟件,都可進行錄製。
ttyrec 使用ttyrec 進行錄製的情形
ttyrec 當前版本為1.0.8,於去年6 月發布。你可在所用的Linux 發行版中搜索安裝。若是沒有,也可下載其源代碼,自行編譯。
你若要編譯ttyrec,可以執行make指令,這個過程很快就會完成。在編譯成功後,其目錄包括ttyrec、ttyplay、ttytime三個可執行文件:
  • ttyrec-用於錄製tty 控制台
  • ttyplay-用來播放ttyrec 所錄製的數據文件
  • ttytime-了解ttyrec 所錄製數據文件的時間

ttyrec 的使用亦很簡單,為了方便其執行,你可以將上述三個文件複製到/usr/bin 或/usr/local/bin 目錄。
  1. 在執行ttyrec指令後,即開始錄製過程。注意,ttyrec沒有輸出任何提示信息。
  2. 若是錄製完成,則可以使用exit結束。
  3. ttyrec所錄製的數據文件一般為ttyrecord,可使用ttyplay ttyrecord播放。

一點注意事項:最好能夠使錄製和播放的終端尺寸保持一致。
Read More:

2012年1月28日 星期六

用script錄下終端機中的session

使用 script 录制终端会话

script 真是一个神奇的小家伙,别看它小不起眼,可是却足够的好玩。script 能够将终端的会话过程录制下来,然后使用 scriptreplay 就可以将其录制的结果播放给他人观看。script 的好处就在于,你在终端中的所有操作过程,它都可以原原本本地进行录制。试想一下,我们可以将这种录制应用在很多方面,诸如教学、演示等等。
script
一般来说,script 和 scriptreplay 在 Linux 发行版中都有默认安装。如果你打算使用 script 开始录制终端会话,可以敲入下列指令: script -t 2>demo.timing -a demo.session
该指令中的 -t 选项指明输出录制的时间数据,而 -a 选项则输出录制的文件。你可以将指令中的 demo 换成自己设置的名称。当终端中返回“Script started, file is demo.session”的信息时,你就可以进行需要录制的操作了。
如果需要结束录制过程,则输入 exit 即可。
要播放已录制完成的终端会话,可以使用指令:scriptreplay demo.timing demo.session
关于 script 及 scriptreplay 的更多信息,可以使用 man script 或 man scriptreplay 查询。
[via]
Read More:

transcend不能格式化成NTFS的解決辦法

以Windows XP為例下列步驟是新增NTFS格式化磁碟選項:
1.請點選進入"我的電腦"圖示後選擇行動碟所代表的磁碟機按右鍵
2.選擇"內容",
3.選擇"硬體",
4.點選"內容"按鈕,
5.選擇"原則",
6.選擇"效能最佳化"。
當完成上述步驟您應該可以在格式化工具找到NTFS此一磁碟格式化選項
(請注意在Mac作業系統上可能無法正常使用 NTFS檔案系統。)

2012年1月4日 星期三

Top 10 hacking tools

This is a Cool Collection of Top Ten Linux Hacking Tools.
1. nmap – Nmap (“Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available.
2. Nikto – Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 3200 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Scan items and plugins are frequently updated and can be automatically updated (if desired).
3. THC-Amap – Amap is a next-generation tool for assistingnetwork penetration testing. It performs fast and reliable application protocol detection, independant on the TCP/UDP port they are being bound to.
4. Ethereal – Ethereal is used by network professionals around the world for troubleshooting, analysis, software and protocol development, and education. It has all of the standard features you would expect in a protocol analyzer, and several features not seen in any other product.
5. THC-Hydra – Number one of the biggest security holes are passwords, as every password security study shows. Hydra is a parallized login cracker which supports numerous protocols to attack. New modules are easy to add, beside that, it is flexible and very fast.
6. Metasploit Framework – The Metasploit Framework is an advanced open-source platform for developing, testing, and using exploit code. This project initially started off as a portable network game and has evolved into a powerful tool for penetration testing, exploit development, and vulnerability research.
7. John the Ripper – John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix flavors, supported out of the box are Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches.
8. Nessus – Nessus is the world’s most popular vulnerability scanner used in over 75,000 organisations world-wide. Many of the world’s largest organisations are realising significant cost savings by using Nessus to audit business-critical enterprise devices and applications.
9. IRPAS – Internetwork Routing Protocol Attack Suite – Routing protocols are by definition protocols, which are used by routers to communicate with each other about ways to deliver routed protocols, such as IP. While many improvements have been done to the host security since the early days of the Internet, the core of this network still uses unauthenticated services for critical communication.
10. Rainbowcrack – RainbowCrack is a general propose implementation of Philippe Oechslin’s faster time-memory trade-off technique. In short, the RainbowCrack tool is a hash cracker. A traditional brute force cracker try all possible plaintexts one by one in cracking time. It is time consuming to break complex password in this way. The idea of time-memory trade-off is to do all cracking time computation in advance and store the result in files so called “rainbow table”.
Popularity: 8% [?]
You might be interested in the following Articles
  1. Top 20 Hacking Tools
  2. Top 10 Windows Hacking Tools
  3. Tools for Hacking Bluetooth Enabled Devices
  4. Three Most used Backdoor Programs
  5. Setting Up A Hackers Workstation
  6. Best 5 Port Scanners
  7. Hacking With Nmap – The Network Mapping Tool
  8. Top 15 SQL Injection Scanners

2012年1月3日 星期二

linux 駭客基本學習清單

好用的mtr指令

linux 駭客基本學習清單