Wednesday, November 17, 2010
Thursday, November 11, 2010
Ice Symbol Lookup Error
Re-hosting the resolution since it appears Novell's server goes down from time to time when I attempted to re-reference:
Install Novell eDirctory Adminstration Utilies as follows.
Extract the tar.gz file for eDirectory installation and locate the directory /eDirectory/setup.
Type ./nds-install from the setup directory.
Select option 2 for installing Novell eDirectory Administartion utilities.
Edit /etc/ld.so.conf file and make sure entry /opt/novell/eDirectory/lib is in the file. If not add the path in there and save the file.
Type "ldconfig" and press Enter.
If the following error is received after following the steps listed above, please reboot the server
"ice: error while loading shared libraries: libldapsdk.so.0: cannot open shared object file: No such file or directory"
Install Novell eDirctory Adminstration Utilies as follows.
Extract the tar.gz file for eDirectory installation and locate the directory /eDirectory/setup.
Type ./nds-install from the setup directory.
Select option 2 for installing Novell eDirectory Administartion utilities.
Edit /etc/ld.so.conf file and make sure entry /opt/novell/eDirectory/lib is in the file. If not add the path in there and save the file.
Type "ldconfig" and press Enter.
If the following error is received after following the steps listed above, please reboot the server
"ice: error while loading shared libraries: libldapsdk.so.0: cannot open shared object file: No such file or directory"
Wednesday, November 10, 2010
Rogue Access Point
Rogue AP using GTWPA from Dean Liu on Vimeo.
GTWPA project is a wrapper around airbase-ng and dnsspoof. Redirects HTTP traffic to your malicious web server when the victim attempts to browse.
See project here:
crack-wifi.com/forum/viewtopic.php?id=363
I modified code base such that it enables attacking machine as web proxy after credentials are submitted.
You can serve up any login page you want. Here are some ideas: ask for credit card, Facebook login, serve up Metasploit payloads as Windows updates, etc.
Tuesday, November 9, 2010
Google Hacking Database
http://www.exploit-db.com/google-dorks/
Recently resurrected by exploit-db.
Repository of queries that may disclose sensitive information which may lead to compromise.
Saturday, November 6, 2010
Subscribe to:
Posts (Atom)