ERROR OCURRED

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Thursday, December 20, 2012

error:0906406D:PEM routines:PEM_def_callback:problems getting password

Posted on 1:26 AM by Unknown
Failed to acquire SSL private key '/etc/pki/tls/private/server.key': error:0906406D:PEM routines:PEM_def_callback:problems getting password


solution:- remove password from your server.key file.

Command which you can used.

[root@ramank ssl]# openssl rsa -in server.key.ORIG -out server.key
Enter pass phrase for server.key.secure:

writing RSA key


Done
Read More
Posted in | No comments

Tuesday, December 11, 2012

YUM SERVER SETUP IN REDHAT

Posted on 9:22 PM by Unknown
Red Hat Enterprise Linux Server release 6.2 (Santiago)

yum server setup:-

1) Copy Packages folder from DVD to /any/location/in/system

/opt/Packages

2) Install following three rpms.

[root@localhost Packages]# rpm -ivh deltarpm-3.5-0.5.20090913git.el6.x86_64.rpm
warning: deltarpm-3.5-0.5.20090913git.el6.x86_64.rpm: Header V3 RSA/SHA256 Signature, key ID c105b9de: NOKEY
Preparing...                ########################################### [100%]
   1:deltarpm               ########################################### [100%]
[root@localhost Packages]# rpm -ivh python-de
python-decorator-3.0.1-3.1.el6.noarch.rpm
python-decoratortools-1.7-4.1.el6.noarch.rpm
python-deltarpm-3.5-0.5.20090913git.el6.x86_64.rpm
python-devel-2.6.6-29.el6_2.2.x86_64.rpm
[root@localhost Packages]# rpm -ivh python-deltarpm-3.5-0.5.20090913git.el6.x86_64.rpm
warning: python-deltarpm-3.5-0.5.20090913git.el6.x86_64.rpm: Header V3 RSA/SHA256 Signature, key ID c105b9de: NOKEY
Preparing...                ########################################### [100%]
   1:python-deltarpm        ########################################### [100%]
[root@localhost Packages]# rpm -ivh createrepo-0.9.8-5.el6.noarch.rpm
warning: createrepo-0.9.8-5.el6.noarch.rpm: Header V3 RSA/SHA1 Signature, key ID c105b9de: NOKEY
Preparing...                ########################################### [100%]
   1:createrepo             ########################################### [100%]


3)  Go under PKG dir and run following command

#[root@localhost Packages]# createrepo .   (DOT)
3296/3887 - mesa-libGLU-devel-7.11-5.el6.i686.rpm                              
iso-8859-1 encoding on Ville Skytt� - 2.8.2-2

3887/3887 - libreoffice-langpack-sl-3.4.5.2-16.el6.x86_64.rpm                  
Saving Primary metadata
Saving file lists metadata
Saving other metadata


Done.


[root@localhost Packages]# yum clean all
Loaded plugins: product-id, refresh-packagekit, security, subscription-manager
Updating certificate-based repositories.
Cleaning repos:
Cleaning up Everything


[root@localhost Packages]# yum list all
Loaded plugins: product-id, refresh-packagekit, security, subscription-manager
Updating certificate-based repositories.
Installed Packages
ConsoleKit.x86_64                        0.4.1-3.el6                           @
anaconda-RedHatEnterpriseLinux-201111171049.x86_64/6.2
ConsoleKit-libs.x86_64                   0.4.1-3.el6                           @
anaconda-RedHatEnterpriseLinux-201111171049.x86_64/6.2
ConsoleKit-x11.x86_64                    0.4.1-3.el6                           @
Read More
Posted in | No comments

Friday, November 23, 2012

How to install OpenVAS in Fedora

Posted on 1:36 AM by Unknown
Configure Repo  for  yum installation. 

[root@ramank ~]# wget -q -O - http://www.atomicorp.com/installers/atomic | sh

Atomic Archive installer, version 2.0.6

BY INSTALLING THIS SOFTWARE AND BY USING ANY AND ALL SOFTWARE
PROVIDED BY ATOMICORP LIMITED YOU ACKNOWLEDGE AND AGREE:

THIS SOFTWARE AND ALL SOFTWARE PROVIDED IN THIS REPOSITORY IS
PROVIDED BY ATOMICORP LIMITED AS IS, IS UNSUPPORTED AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL ATOMICORP LIMITED, THE
COPYRIGHT OWNER OR ANY CONTRIBUTOR TO ANY AND ALL SOFTWARE PROVIDED
BY OR PUBLISHED IN THIS REPOSITORY BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
OF THE POSSIBILITY OF SUCH DAMAGE.

Do you agree to these terms? (yes/no) [Default: yes] y
Invalid input
Do you agree to these terms? (yes/no) [Default: yes] yes

Configuring the [atomic] yum archive for this system

Installing the Atomic GPG key: OK
Downloading atomic-release-1.0-14.fc16.art.noarch.rpm: OK



The Atomic Rocket Turtle archive has now been installed and configured for your system
The following channels are available:
  atomic          - [ACTIVATED] - contains the stable tree of ART packages
  atomic-testing  - [DISABLED]  - contains the testing tree of ART packages
  atomic-bleeding - [DISABLED]  - contains the development tree of ART packages


Installation


[root@ramank ~]# yum install openvas
Loaded plugins: langpacks, presto, refresh-packagekit
atomic                                                                          | 1.9 kB     00:00    
atomic/primary_db                                                               | 116 kB     00:01    
Setting up Install Process
Resolving Dependencies

Total download size: 70 M
Installed size: 201 M
Is this ok [y/N]: y
Downloading Packages:
Installed:
  openvas.noarch 0:1.0-3.fc16.art                                                                     

Dependency Installed:
  greenbone-security-assistant.i686 0:3.0.3-3.fc16.art  kpathsea.i686 0:2007-66.fc16                 
  libmicrohttpd.i686 0:0.9.22-1.fc16                    mingw32-nsis.i686 0:2.46-3.fc16              
  ncrack.i686 0:0.4-0.1.ALPHA.fc16                      netpbm-progs.i686 0:10.47.31-1.fc16          
  nikto.noarch 1:2.1.5-6.fc16.art                       openvas-administrator.i686 0:1.2.1-2.fc16.art
  openvas-cli.i686 0:1.1.5-3.fc16.art                   openvas-libraries.i686 0:5.0.4-5.fc16.art    
  openvas-manager.i686 0:3.0.4-4.fc16.art               openvas-scanner.i686 0:3.3.1-2.fc16.art      
  perl-libwhisker2.noarch 0:2.5-5.fc16.art              pnscan.i686 0:1.11-1.fc16.art                
  python-SocksiPy.noarch 0:1.00-5.fc15                  tex-preview.noarch 0:11.86-6.fc16            
  texlive.i686 0:2007-66.fc16                           texlive-dvips.i686 0:2007-66.fc16            
  texlive-latex.i686 0:2007-66.fc16                     texlive-texmf.noarch 0:2007-40.fc16          
  texlive-texmf-dvips.noarch 0:2007-40.fc16             texlive-texmf-fonts.noarch 0:2007-40.fc16    
  texlive-texmf-latex.noarch 0:2007-40.fc16             texlive-utils.i686 0:2007-66.fc16            
  wapiti.noarch 0:2.2.1-4.fc16.art                      wmi.i686 0:1.3.14-2.fc16.art                 

Completed.



How to run setup with details.


[root@ramank ~]# openvas-setup

Openvas Setup, Version: 0.3


Step 1: Update NVT's and SCAP data
Please note this step could take some time.
Once completed, NVT's and SCAP data will be updated automatically every 24 hours

Updating NVTs....

Restarting openvas-scanner (via systemctl):  Job failed. See system logs and 'systemctl status' for details.
                                                           [FAILED]
Updating SCAP data...
[i] This script synchronizes a SCAP data directory with the OpenVAS one.
[i] SCAP dir: /var/lib/openvas/scap-data
[i] Will use rsync
[i] Using rsync: /usr/bin/rsync
[i] Configured SCAP data rsync feed: rsync://feed.openvas.org:/scap-data
OpenVAS feed server - http://openvas.org/
This service is hosted by Intevation GmbH - http://intevation.de/
All transactions are logged.
Please report problems to admin@intevation.de

receiving incremental file list
./
COPYING
        1187 100%    1.13MB/s    0:00:00 (xfer#1, to-check=28/30)
COPYING.asc
         198 100%  193.36kB/s    0:00:00 (xfer#2, to-check=27/30)
nvdcve-2.0-2002.xml
    19507956 100%  112.33kB/s    0:02:49 (xfer#3, to-check=26/30)
nvdcve-2.0-2002.xml.asc
         198 100%    0.37kB/s    0:00:00 (xfer#4, to-check=25/30)
nvdcve-2.0-2003.xml
     5798371 100%  154.08kB/s    0:00:36 (xfer#5, to-check=24/30)
nvdcve-2.0-2003.xml.asc
         198 100%    0.29kB/s    0:00:00 (xfer#6, to-check=23/30)
nvdcve-2.0-2004.xml
    12331181 100%  214.26kB/s    0:00:56 (xfer#7, to-check=22/30)
nvdcve-2.0-2004.xml.asc
         198 100%    0.46kB/s    0:00:00 (xfer#8, to-check=21/30)
nvdcve-2.0-2005.xml
    19671905 100%  159.13kB/s    0:02:00 (xfer#9, to-check=20/30)
nvdcve-2.0-2005.xml.asc
         198 100%    0.32kB/s    0:00:00 (xfer#10, to-check=19/30)
nvdcve-2.0-2006.xml
    31312876 100%  181.65kB/s    0:02:48 (xfer#11, to-check=18/30)
nvdcve-2.0-2006.xml.asc
         198 100%    0.35kB/s    0:00:00 (xfer#12, to-check=17/30)
nvdcve-2.0-2007.xml
    29317902 100%  152.60kB/s    0:03:07 (xfer#13, to-check=16/30)
nvdcve-2.0-2007.xml.asc
         198 100%    1.62kB/s    0:00:00 (xfer#14, to-check=15/30)
nvdcve-2.0-2008.xml
    34128705 100%  158.15kB/s    0:03:30 (xfer#15, to-check=14/30)
nvdcve-2.0-2008.xml.asc
         198 100%    0.26kB/s    0:00:00 (xfer#16, to-check=13/30)
nvdcve-2.0-2009.xml
    33566018 100%  200.77kB/s    0:02:43 (xfer#17, to-check=12/30)
nvdcve-2.0-2009.xml.asc
         198 100%    0.33kB/s    0:00:00 (xfer#18, to-check=11/30)
nvdcve-2.0-2010.xml
    48866041 100%  203.87kB/s    0:03:54 (xfer#19, to-check=10/30)
nvdcve-2.0-2010.xml.asc
         198 100%    0.22kB/s    0:00:00 (xfer#20, to-check=9/30)
nvdcve-2.0-2011.xml
   113504024 100%  152.58kB/s    0:12:06 (xfer#21, to-check=8/30)
nvdcve-2.0-2011.xml.asc
         198 100%  193.36kB/s    0:00:00 (xfer#22, to-check=7/30)
nvdcve-2.0-2012.xml
    33311229 100%  142.27kB/s    0:03:48 (xfer#23, to-check=6/30)
nvdcve-2.0-2012.xml.asc
         198 100%    0.99kB/s    0:00:00 (xfer#24, to-check=5/30)
official-cpe-dictionary_v2.2.xml
    16156377 100%  146.36kB/s    0:01:47 (xfer#25, to-check=4/30)
official-cpe-dictionary_v2.2.xml.asc
         198 100%    0.21kB/s    0:00:00 (xfer#26, to-check=3/30)
sha1sums
        1774 100%    1.89kB/s    0:00:00 (xfer#27, to-check=2/30)
timestamp
          13 100%    0.01kB/s    0:00:00 (xfer#28, to-check=1/30)
timestamp.asc
         198 100%    0.21kB/s    0:00:00 (xfer#29, to-check=0/30)

sent 585 bytes  received 397528878 bytes  164710.78 bytes/sec
total size is 397478331  speedup is 1.00
[i] (Re-)initializing database
[i] Updating CPEs
[i] Updating /var/lib/openvas/scap-data/nvdcve-2.0-2002.xml
[i] Updating /var/lib/openvas/scap-data/nvdcve-2.0-2003.xml
[i] Updating /var/lib/openvas/scap-data/nvdcve-2.0-2004.xml
[i] Updating /var/lib/openvas/scap-data/nvdcve-2.0-2005.xml
[i] Updating /var/lib/openvas/scap-data/nvdcve-2.0-2006.xml
[i] Updating /var/lib/openvas/scap-data/nvdcve-2.0-2007.xml
[i] Updating /var/lib/openvas/scap-data/nvdcve-2.0-2008.xml
[i] Updating /var/lib/openvas/scap-data/nvdcve-2.0-2009.xml
[i] Updating /var/lib/openvas/scap-data/nvdcve-2.0-2010.xml
[i] Updating /var/lib/openvas/scap-data/nvdcve-2.0-2011.xml
[i] Updating /var/lib/openvas/scap-data/nvdcve-2.0-2012.xml
Updating OpenVAS Manager database....

Step 2: Configure GSAD
The Greenbone Security Assistant is a Web Based front end
for managing scans. By default it is configured to only allow
connections from localhost.


Allow connections from any IP? [Default: yes]
Restarting gsad (via systemctl):                           [  OK  ]

Step 3: Choose the GSAD admin users password.
The admin user is used to configure accounts,
Update NVT's manually, and manage roles.

Enter administrator username: admin
Enter Administrator Password:
Verify Administrator Password:

ad   main:MESSAGE:28965:2012-11-23 14h26.10 IST: No rules file provided, the new user will have no restrictions.
ad   main:MESSAGE:28965:2012-11-23 14h26.10 IST: User admin has been successfully created.

Step 4: Create a user

Using /var/tmp as a temporary file holder.

Add a new openvassd user
---------------------------------


Login :

Login : ramank
Authentication (pass/cert) [pass] : pass
Login password (again) :

User rules
---------------
openvassd has a rules system which allows you to restrict the hosts that ramank has the right to test.
For instance, you may want him to be able to scan his own host only.

Please see the openvas-adduser(8) man page for the rules syntax.

Enter the rules for this user, and hit ctrl-D once you are done:
(the user can have an empty rules set)

Login             : raman
Password          : ***********

Rules             :


Is that ok? (y/n) [y] y
user added.

Starting openvas-administrator...
Starting openvas-administrator (via systemctl):            [  OK  ]


Setup complete, you can now access GSAD at:
  https://:9392

Screen shot attached for ref.





Enjoy.



Read More
Posted in | No comments

Wednesday, November 21, 2012

Install Tor on Fedora 16

Posted on 9:42 PM by Unknown
For installation  use following command

1) Yum installation tor.

After installation start/restart the services. like this.

2) [root@ramank ~]# sudo service tor start
Redirecting to /bin/systemctl  start tor.service
[root@ramank ~]# service tor restart
Redirecting to /bin/systemctl  restart tor.service

3) Install Firefox addon Button.

you can download from

https://www.torproject.org/torbutton/

 Used by me :- 826K       torbutton-current.xpi

How to Install Firefox add.

In firefox.

i) ctrl + Shift + A   or Go under tools > Choose Add-on.


Choose Install add-on  from files.   ( right size of the under tools for all add on)

Now here select location, it will ask restart Browser.

Done.


4) Now Click on Tor button and enjoy the browinsg under tor.

 
Read More
Posted in | No comments

Tuesday, November 20, 2012

How to clone Virtual Machine in Sun VirtualBox

Posted on 3:03 AM by Unknown
Tested with Fedora 15 + Oracle Virtual Box + Win2008  Vm

Simple copy through UUID error. You can't open/create new VM's

Following steps help me to clone VM.

1) Shut-down Original VM.

2) Find your orginal vdi location.

like mine :- [root@ramank win2008]# pwd
/home/ramank/VirtualBox VMs/win2008

3) Run following command to Clone VDI.

[root@ramank win2008]# vboxmanage  clonehd win2008.vdi win2008_r2.vdi

this takes few accordig to VM size.

4) Now create 2nd VM, & make sure choose new VDI location.





VBoxManage clonehd         | 
[--format VDI|VMDK|VHD|RAW|]
[--variant Standard,Fixed,Split2G,Stream,ESX]
[--existing]
The disk image to clone as well as the target image must be described either by its UUIDs (if the mediums are registered) or by its filename. Registered images can be listed by VBoxManage list hdds (see the section called “VBoxManage list” for more information). A filename must be specified as valid path, either as an absolute path or as a relative path starting from the current directory.
The following options are available:
format
Allow to choose a file format for the output file different from the file format of the input file.
variant
Allow to choose a file format variant for the output file. It is a comma-separated list of variant flags. Not all combinations are supported, and specifying inconsistent flags will result in an error message.
existing
Perform the clone operation to an already existing destination medium. Only the portion of the source medium which fits into the destination medium is copied. This means if the destination medium is smaller than the source only a part of it is copied, and if the destination medium is larger than the source the remaining part of the destination medium is unchanged.

Note

For compatibility with earlier versions of VirtualBox, the "clonevdi" command is also supported and mapped internally to the "clonehd" command.


Ref:- http://www.virtualbox.org/manual/ch08.html#vboxmanage-clonevm

 Work like charm.

Enjoy
Read More
Posted in | No comments

Best Tool to get Hardware details in Linux

Posted on 12:18 AM by Unknown
Hardware lister (lshw)

lshw (Hardware Lister) is a small tool to provide detailed information on the hardware configuration of the machine. It can report exact memory configuration, firmware version, mainboard configuration, CPU version and speed, cache configuration, bus speed, etc. on DMI-capable x86 or EFI (IA-64) systems and on some PowerPC machines.


Installation Steps.

[root@ramank ~]# yum -y install lshw*
Loaded plugins: langpacks, presto, refresh-packagekit
Setting up Install Process
Resolving Dependencies
--> Running transaction check
---> Package lshw.i686 0:B.02.16-1.fc16 will be installed
---> Package lshw-gui.i686 0:B.02.16-1.fc16 will be installed
--> Finished Dependency Resolution

Dependencies Resolved

================================================================================
 Package           Arch          Version                 Repository        Size
================================================================================
Installing:
 lshw              i686          B.02.16-1.fc16          updates          283 k
 lshw-gui          i686          B.02.16-1.fc16          updates          376 k

Transaction Summary
================================================================================
Install       2 Packages

Total download size: 659 k
Installed size: 2.4 M
Downloading Packages:
(1/2): lshw-B.02.16-1.fc16.i686.rpm                      | 283 kB     00:04    
(2/2): lshw-gui-B.02.16-1.fc16.i686.rpm                  | 376 kB     00:12    
--------------------------------------------------------------------------------
Total                                            37 kB/s | 659 kB     00:17    
Running Transaction Check
Running Transaction Test
Transaction Test Succeeded
Running Transaction
  Installing : lshw-B.02.16-1.fc16.i686                                     1/2
  Installing : lshw-gui-B.02.16-1.fc16.i686                                 2/2

Installed:
  lshw.i686 0:B.02.16-1.fc16           lshw-gui.i686 0:B.02.16-1.fc16         

Complete!



Usages:-

For Graphic use command like

[root@ramank tmp]#  lshw-gui

Screen Shot attached for ref.








Command Based.

just enter  command like #lshw

or short command like below

[root@ramank ~]#  lshw -short
H/W path         Device       Class          Description
========================================================
                              system         Latitude E6420 ()
/0                            bus            0K0DNP
/0/0                          memory         64KiB BIOS
/0/4                          processor      Intel(R) Core(TM) i5-2520M CPU @ 2.
/0/4/5                        memory         32KiB L1 cache
/0/4/6                        memory         256KiB L2 cache
/0/4/7                        memory         3MiB L3 cache
/0/4/0.1                      processor      Logical CPU
/0/4/0.2                      processor      Logical CPU
/0/4/0.3                      processor      Logical CPU
/0/4/0.4                      processor      Logical CPU
/0/4/0.5                      processor      Logical CPU
/0/4/0.6                      processor      Logical CPU
/0/4/0.7                      processor      Logical CPU
/0/4/0.8                      processor      Logical CPU
/0/4/0.9                      processor      Logical CPU
/0/4/0.a                      processor      Logical CPU
/0/4/0.b                      processor      Logical CPU
/0/4/0.c                      processor      Logical CPU
/0/4/0.d                      processor      Logical CPU
/0/4/0.e                      processor      Logical CPU
/0/4/0.f                      processor      Logical CPU
/0/4/0.10                     processor      Logical CPU
/0/41                         memory         4GiB System Memory
/0/41/0                       memory         4GiB SODIMM DDR3 Synchronous 1333 M
/0/41/1                       memory         DIMM [empty]
/0/1                          processor     
/0/1/2.1                      processor      Logical CPU
/0/1/2.2                      processor      Logical CPU
/0/1/2.3                      processor      Logical CPU
/0/1/2.4                      processor      Logical CPU
/0/1/2.5                      processor      Logical CPU
/0/1/2.6                      processor      Logical CPU
/0/1/2.7                      processor      Logical CPU
/0/1/2.8                      processor      Logical CPU
/0/1/2.9                      processor      Logical CPU
/0/1/2.a                      processor      Logical CPU
/0/1/2.b                      processor      Logical CPU
/0/1/2.c                      processor      Logical CPU
/0/1/2.d                      processor      Logical CPU
/0/1/2.e                      processor      Logical CPU
/0/1/2.f                      processor      Logical CPU
/0/1/2.10                     processor      Logical CPU
/0/100                        bridge         2nd Generation Core Processor Famil
/0/100/2                      display        2nd Generation Core Processor Famil
/0/100/16                     communication  6 Series/C200 Series Chipset Family
/0/100/19        em1          network        82579LM Gigabit Network Connection
/0/100/1a                     bus            6 Series/C200 Series Chipset Family
/0/100/1b                     multimedia     6 Series/C200 Series Chipset Family
/0/100/1c                     bridge         6 Series/C200 Series Chipset Family
/0/100/1c.1                   bridge         6 Series/C200 Series Chipset Family
/0/100/1c.1/0    wlan0        network        Centrino Advanced-N 6205
/0/100/1c.2                   bridge         6 Series/C200 Series Chipset Family
/0/100/1c.3                   bridge         6 Series/C200 Series Chipset Family
/0/100/1c.5                   bridge         6 Series/C200 Series Chipset Family
/0/100/1c.5/0                 generic        O2 Micro, Inc.
/0/100/1c.5/0.1               storage        O2 Micro, Inc.
/0/100/1d                     bus            6 Series/C200 Series Chipset Family
/0/100/1f                     bridge         QM67 Express Chipset Family LPC Con
/0/100/1f.2                   storage        Mobile 82801 SATA RAID Controller
/0/100/1f.3                   bus            6 Series/C200 Series Chipset Family
/0/2             scsi0        storage       
/0/2/0.0.0       /dev/sda     disk           320GB TOSHIBA MK3261GS
/0/2/0.0.0/1     /dev/sda1    volume         1023KiB BIOS Boot partition
/0/2/0.0.0/2     /dev/sda2    volume         500MiB EXT4 volume
/0/2/0.0.0/3     /dev/sda3    volume         50GiB EXT4 volume
/0/2/0.0.0/4     /dev/sda4    volume         5247MiB Linux swap volume
/0/2/0.0.0/5     /dev/sda5    volume         100GiB EXT4 volume
/0/2/0.0.0/6     /dev/sda6    volume         142GiB EXT4 volume
/0/3             scsi1        storage       
/0/3/0.0.0       /dev/cdrom3  disk           DVD+-RW TS-U633J
/1                            power          DELL TVMVN19



See man page for more options.


Enjoy...




Read More
Posted in | No comments

Monday, November 5, 2012

How Enable/Diabled WLAN/Blutooth on Dell Inspiron 14R

Posted on 10:42 PM by Unknown
On Insprion 1464, use the F2 key to turn wireless On/Off.

Will work for you. Same tested under  Fedora 17 (OS) working fine.
Read More
Posted in | No comments

Postgres 8.4 on CentOS

Posted on 12:02 AM by Unknown
Step which need to follow to install Postgres 8.4.

Default yum will install 8.1 but if you wan to install 8.4 use following steps.

[root@localhost tmp]# wget http://yum.pgrpms.org/reporpms/8.4/pgdg-centos-8.4-2.noarch.rpm


[root@localhost tmp]# rpm -Uvh pgdg-centos-8.4-2.noarch.rpm


[root@localhost tmp]# yum install postgresql postgresql-server postgresql-contrib

Loaded plugins: fastestmirror
Loading mirror speeds from cached hostfile
 * base: centos.uhost.hk
 * updates: centos.uhost.hk
 * addons: mirror.centos.org
 * extras: centos.uhost.hk
Setting up Install Process
Parsing package install arguments
Resolving Dependencies
--> Running transaction check
---> Package postgresql-server.i386 0:8.4.14-1PGDG.rhel5 set to be updated
---> Package postgresql.i386 0:8.4.14-1PGDG.rhel5 set to be updated
--> Processing Dependency: postgresql-libs = 8.4.14-1PGDG.rhel5 for package: postgresql
---> Package postgresql-contrib.i386 0:8.4.14-1PGDG.rhel5 set to be updated
--> Processing Dependency: libossp-uuid.so.15 for package: postgresql-contrib
--> Running transaction check
--> Processing Dependency: libpq.so.4 for package: apr-util
--> Processing Dependency: libpq.so.4 for package: libdbi-dbd-pgsql
---> Package postgresql-libs.i386 0:8.4.14-1PGDG.rhel5 set to be updated
---> Package uuid.i386 0:1.5.1-4.rhel5 set to be updated
--> Running transaction check
---> Package compat-postgresql-libs.i686 0:4-1PGDG.rhel5 set to be updated
---> Package apr-util.i386 0:1.2.7-11.el5_5.2 set to be updated
--> Finished Dependency Resolution

Dependencies Resolved

================================================================================
 Package                    Arch     Version                   Repository  Size
================================================================================
Installing:
 postgresql                 i386     8.4.14-1PGDG.rhel5        pgdg84     1.6 M
 postgresql-contrib         i386     8.4.14-1PGDG.rhel5        pgdg84     432 k
 postgresql-server          i386     8.4.14-1PGDG.rhel5        pgdg84     5.0 M
Updating:
 apr-util                   i386     1.2.7-11.el5_5.2          base        80 k
 postgresql-libs            i386     8.4.14-1PGDG.rhel5        pgdg84     210 k
Installing for dependencies:
 compat-postgresql-libs     i686     4-1PGDG.rhel5             pgdg84      63 k
 uuid                       i386     1.5.1-4.rhel5             pgdg84      53 k

Transaction Summary
================================================================================
Install      5 Package(s)        
Update       2 Package(s)        
Remove       0 Package(s)        

Total download size: 7.5 M
Is this ok [y/N]: y
Downloading Packages:
(1/7): uuid-1.5.1-4.rhel5.i386.rpm                       |  53 kB     00:01    
(2/7): compat-postgresql-libs-4-1PGDG.rhel5.i686.rpm     |  63 kB     00:00    
(3/7): apr-util-1.2.7-11.el5_5.2.i386.rpm                |  80 kB     00:01    
(4/7): postgresql-libs-8.4.14-1PGDG.rhel5.i386.rpm       | 210 kB     00:02    
(5/7): postgresql-contrib-8.4.14-1PGDG.rhel5.i386.rpm    | 432 kB     00:02    
(6/7): postgresql-8.4.14-1PGDG.rhel5.i386.rpm            | 1.6 MB     00:08    
(7/7): postgresql-server-8.4.14-1PGDG.rhel5.i386.rpm     | 5.0 MB     00:25    
--------------------------------------------------------------------------------
Total                                           161 kB/s | 7.5 MB     00:47    
Running rpm_check_debug
Running Transaction Test
Finished Transaction Test
Transaction Test Succeeded
Running Transaction
  Updating       : postgresql-libs                                   [1/9]
  Installing     : compat-postgresql-libs                            [2/9]
  Installing     : postgresql                                        [3/9]
  Updating       : apr-util                                          [4/9]
  Installing     : uuid                                              [5/9]
  Installing     : postgresql-contrib                                [6/9]
  Installing     : postgresql-server                                 [7/9]
  Cleanup        : apr-util                                          [8/9]
  Cleanup        : postgresql-libs                                   [9/9]

Installed: postgresql.i386 0:8.4.14-1PGDG.rhel5 postgresql-contrib.i386 0:8.4.14-1PGDG.rhel5 postgresql-server.i386 0:8.4.14-1PGDG.rhel5
Dependency Installed: compat-postgresql-libs.i686 0:4-1PGDG.rhel5 uuid.i386 0:1.5.1-4.rhel5
Updated: apr-util.i386 0:1.2.7-11.el5_5.2 postgresql-libs.i386 0:8.4.14-1PGDG.rhel5
Complete!


[root@localhost tmp]# rpm -qa | grep postgres
compat-postgresql-libs-4-1PGDG.rhel5
postgresql-contrib-8.4.14-1PGDG.rhel5
postgresql-8.4.14-1PGDG.rhel5
postgresql-server-8.4.14-1PGDG.rhel5
postgresql-libs-8.4.14-1PGDG.rhel5


     
[root@localhost tmp]# /etc/init.d/postgresql status
 is stopped

enjoy
Read More
Posted in | No comments

Friday, November 2, 2012

How install all Development Libraries in linux

Posted on 3:35 AM by Unknown
In Centos/fedora to install all  Development Libraries through yum, you can use following command.

[root@ramank ~]# yum grouplist | grep -i dev
   Development Libraries
   Development Tools
   Legacy Software Development
   GNOME Software Development
   Java Development
   KDE Software Development
   LibreOffice Development
   Perl Development
   Web Development
   X Software Development
   XFCE Software Development

So now suppose i want to insatll All Dev lib so the command which i used is like below

#[root@ramank ~]# yum groupinstall "Development Libraries"
Loaded plugins: langpacks, presto, refresh-packagekit
Setting up Group Process
 xscreensaver-gl-extras      i686      1:5.20-1.fc16           updates    2.2 M
 zlib                        i686      1.2.5-7.fc16            updates     83 k

Transaction Summary
================================================================================
Install       1 Package
Upgrade      50 Packages

Total download size: 27 M
Is this ok [y/N]:


Done
Read More
Posted in | No comments

Thursday, October 25, 2012

How to install chkrootkit :-Determine whether the system is infected with a rootkit

Posted on 2:16 AM by Unknown
 chkrootkit   examine   certain  elements  of  the  target  system  and
       determines whether they have  been  tampered  with.  Some  tools  which  chkrootkit  applies while analyzing binaries and log files can be found
   at /usr/lib/chkrootkit.

What is ROOTKIT:-

A rootkit is a stealthy type of software, often malicious, designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged access to a computer. The term rootkit is a concatenation of "root" (the traditional name of the privileged account on Unix operating systems) and the word "kit" (which refers to the software components that implement the tool). The term "rootkit" has negative connotations through its association with malware.
Rootkit installation can be automated, or an attacker can install it once they've obtained root or Administrator access. Obtaining this access is a result of direct attack on a system (i.e. exploiting a known vulnerability, password (either by cracking, privilege escalation, or social engineering)). Once installed it becomes possible to hide the intrusion as well as to maintain privileged access. Like any software they can have a good purpose or a malicious purpose. The key is the root/Administrator access. Full control over a system means that existing software can be modified, including software that might otherwise be used to detect or circumvent it.

CHKROOTKIT Installation:-


[root@ramank ~]# yum install chkrootkit.i686
Loaded plugins: langpacks, presto, refresh-packagekit
Setting up Install Process
Resolving Dependencies
--> Running transaction check
---> Package chkrootkit.i686 0:0.49-3.fc15 will be installed
--> Finished Dependency Resolution

Dependencies Resolved

================================================================================
 Package             Arch          Version                Repository       Size
================================================================================
Installing:
 chkrootkit          i686          0.49-3.fc15            fedora          304 k

Transaction Summary
================================================================================
Install       1 Package

Total download size: 304 k
Installed size: 304 k
Is this ok [y/N]: y
Downloading Packages:
chkrootkit-0.49-3.fc15.i686.rpm                          | 304 kB     00:03    
Running Transaction Check
Running Transaction Test
Transaction Test Succeeded
Running Transaction
  Installing : chkrootkit-0.49-3.fc15.i686                                  1/1

Installed:
  chkrootkit.i686 0:0.49-3.fc15                                                

Complete!



Usage:-

[ramank@ramank ~]$ chkrootkit
ROOTDIR is `/'
Checking `amd'... not found
Checking `basename'... not infected
Checking `biff'... not found
Checking `chfn'... not infected
Checking `chsh'... not infected
Checking `cron'... not infected
Checking `crontab'... not infected
Checking `date'... not infected
Checking `du'... not infected
Checking `dirname'... not infected
Checking `echo'... not infected
Checking `egrep'... not infected
Checking `env'... not infected
Checking `find'... not infected
Checking `fingerd'... not found
Checking `gpm'... not infected
Checking `grep'... not infected
Checking `hdparm'... not infected
Checking `su'... not infected
Checking `ifconfig'... not infected
Checking `inetd'... not found
Checking `inetdconf'... not found
Checking `identd'... not found
Checking `init'... not infected
Checking `killall'... not infected
Checking `ldsopreload'... not infected
Checking `login'... not infected
Checking `ls'... not infected
Checking `lsof'... not infected
Checking `mail'... not infected
Checking `mingetty'... not infected
Checking `netstat'... not infected
Checking `named'... not found
Checking `passwd'... not infected
Checking `pidof'... not infected
Checking `pop2'... not found
Checking `pop3'... not found
Checking `ps'... not infected
Checking `pstree'... not infected
Checking `rpcinfo'... not infected
Checking `rlogind'... not found
Checking `rshd'... not found
Checking `slogin'... not infected
Checking `sendmail'... not infected
Checking `sshd'... not infected
Checking `syslogd'... not tested
Checking `tar'... not infected
Checking `tcpd'... not infected
Checking `tcpdump'... not infected
Checking `top'... not infected
Checking `telnetd'... not found
Checking `timed'... not found
Checking `traceroute'... not infected
Checking `vdir'... not infected
Checking `w'... not infected
Checking `write'... not infected
Checking `aliens'... no suspect files
Searching for sniffer's logs, it may take a while... nothing found
Searching for HiDrootkit's default dir... nothing found
Searching for t0rn's default files and dirs... nothing found
Searching for t0rn's v8 defaults... nothing found
Searching for Lion Worm default files and dirs... nothing found
Searching for RSHA's default files and dir... nothing found
Searching for RH-Sharpe's default files... nothing found
Searching for Ambient's rootkit (ark) default files and dirs... nothing found
Searching for suspicious files and dirs, it may take a while...
/usr/lib/.libssl.so.10.hmac /usr/lib/.libssl.so.1.0.0j.hmac /usr/lib/vmware/modules/source/.patched /lib/.libcrypto.so.10.hmac /lib/.libgcrypt.so.11.hmac /lib/.libcrypto.so.1.0.0j.hmac

Searching for LPD Worm files and dirs... nothing found
Searching for Ramen Worm files and dirs... nothing found
Searching for Maniac files and dirs... nothing found
Searching for RK17 files and dirs... nothing found
Searching for Ducoci rootkit... nothing found
Searching for Adore Worm... nothing found
Searching for ShitC Worm... nothing found
Searching for Omega Worm... nothing found
Searching for Sadmind/IIS Worm... nothing found
Searching for MonKit... nothing found
Searching for Showtee... nothing found
Searching for OpticKit... nothing found
Searching for T.R.K... nothing found
Searching for Mithra... nothing found
Searching for LOC rootkit... nothing found
Searching for Romanian rootkit... nothing found
Searching for HKRK rootkit... nothing found
Searching for Suckit rootkit... Warning: /sbin/init INFECTED
Searching for Volc rootkit... nothing found
Searching for Gold2 rootkit... nothing found
Searching for TC2 Worm default files and dirs... nothing found
Searching for Anonoying rootkit default files and dirs... nothing found
Searching for ZK rootkit default files and dirs... nothing found
Searching for ShKit rootkit default files and dirs... nothing found
Searching for AjaKit rootkit default files and dirs... nothing found
Searching for zaRwT rootkit default files and dirs... nothing found
Searching for Madalin rootkit default files... nothing found
Searching for Fu rootkit default files... nothing found
Searching for ESRK rootkit default files... nothing found
Searching for rootedoor... nothing found
Searching for ENYELKM rootkit default files... nothing found
Searching for common ssh-scanners default files... nothing found
Searching for anomalies in shell history files... nothing found
Checking `asp'... not infected
Checking `bindshell'... not infected
Checking `lkm'... chkproc: nothing detected
chkdirs: nothing detected
Checking `rexedcs'... not found
Checking `sniffer'... wlan0: PF_PACKET(/usr/sbin/wpa_supplicant, /sbin/dhclient)
vmnet1: not promisc and no PF_PACKET sockets
vmnet8: not promisc and no PF_PACKET sockets
Checking `w55808'... not infected
Checking `wted'... chkwtmp: nothing deleted
Checking `scalper'... not infected
Checking `slapper'... not infected
Checking `z2'... chklastlog: nothing deleted
Checking `chkutmp'... chkutmp: nothing deleted
Checking `OSX_RSPLUG'... not infected
Read More
Posted in | No comments

Wednesday, October 24, 2012

How to install Rootkit Hunter

Posted on 11:50 PM by Unknown
What is rootkit:-

A rootkit is a stealthy type of software, often malicious, designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged access to a computer. The term rootkit is a concatenation of "root" (the traditional name of the privileged account on Unix operating systems) and the word "kit" (which refers to the software components that implement the tool). The term "rootkit" has negative connotations through its association with malware.
Rootkit installation can be automated, or an attacker can install it once they've obtained root or Administrator access. Obtaining this access is a result of direct attack on a system (i.e. exploiting a known vulnerability, password (either by cracking, privilege escalation, or social engineering)). Once installed it becomes possible to hide the intrusion as well as to maintain privileged access. Like any software they can have a good purpose or a malicious purpose. The key is the root/Administrator access. Full control over a system means that existing software can be modified, including software that might otherwise be used to detect or circumvent it.


rkhunter software Description:-

rkhunter  is  a  shell  script  which carries out various checks on the
       local system to try and detect known rootkits and malware. It also per‐
       forms  checks  to  see  if  commands  have been modified, if the system
       startup files have been modified, and various  checks  on  the  network
       interfaces, including checks for listening applications.

       rkhunter  has  been written to be as generic as possible, and so should
       run on most Linux and UNIX systems. It is provided  with  some  support
       scripts should certain commands be missing from the system, and    some     of    these are perl scripts.  rkhunter does require certain commands  to  be  present  for it to be able to execute. Additionally, some tests require  specific commands, but if these are not present then the test  will  be  skipped.  rkhunter needs to be run under a Bourne-type shell, typically  bash or ksh. rkhunter can be run  as  a  cron  job  or  from  the  com mand-line.


Installation:-

[root@ramank ~]# yum install rkhunter.noarch
Loaded plugins: langpacks, presto, refresh-packagekit
Setting up Install Process
Resolving Dependencies
--> Running transaction check
---> Package rkhunter.noarch 0:1.3.8-12.fc16 will be installed
--> Finished Dependency Resolution

Dependencies Resolved

================================================================================
 Package          Arch           Version                  Repository       Size
================================================================================
Installing:
 rkhunter         noarch         1.3.8-12.fc16            updates         181 k

Transaction Summary
================================================================================
Install       1 Package

Total download size: 181 k
Installed size: 734 k
Is this ok [y/N]: y
Downloading Packages:
rkhunter-1.3.8-12.fc16.noarch.rpm                        | 181 kB     00:00    
Running Transaction Check
Running Transaction Test
Transaction Test Succeeded
Running Transaction
  Installing : rkhunter-1.3.8-12.fc16.noarch                                1/1

Installed:
  rkhunter.noarch 0:1.3.8-12.fc16                                              

Complete! :-


Following command option tells rkhunter to perform various checks  on the  local  system.

[root@ramank ~]# rkhunter --check
[ Rootkit Hunter version 1.3.8 ]

Checking system commands...

  Performing 'strings' command checks
    Checking 'strings' command                               [ OK ]

  Performing 'shared libraries' checks
    Checking for preloading variables                        [ None found ]
    Checking for preloaded libraries                         [ None found ]
    Checking LD_LIBRARY_PATH variable                        [ Not found ]

  Performing file properties checks
    Checking for prerequisites                               [ Warning ]
    /sbin/chkconfig                                          [ OK ]
    /sbin/depmod                                             [ OK ]
    /sbin/fsck                                               [ OK ]
    /sbin/fuser                                              [ OK ]
    /sbin/ifconfig                                           [ OK ]
    /sbin/ifdown                                             [ OK ]
    /sbin/ifup                                               [ OK ]
    /sbin/init                                               [ OK ]
    /sbin/insmod                                             [ OK ]
    /sbin/ip                                                 [ OK ]
    /sbin/lsmod                                              [ OK ]
    /sbin/modinfo                                            [ OK ]
    /sbin/modprobe                                           [ OK ]
    /sbin/nologin                                            [ OK ]
    /sbin/rmmod                                              [ OK ]
    /sbin/route                                              [ OK ]
    /sbin/rsyslogd                                           [ OK ]
    /sbin/runlevel                                           [ OK ]
    /sbin/sulogin                                            [ OK ]
    /sbin/sysctl                                             [ OK ]
    /bin/awk                                                 [ OK ]
    /bin/basename                                            [ OK ]
    /bin/bash                                                [ OK ]
    /bin/cat                                                 [ OK ]
    /bin/chmod                                               [ OK ]
    /bin/chown                                               [ OK ]
    /bin/cp                                                  [ OK ]
    /bin/cut                                                 [ OK ]
    /bin/date                                                [ OK ]
    /bin/df                                                  [ OK ]
    /bin/dmesg                                               [ OK ]
    /bin/echo                                                [ OK ]
    /bin/ed                                                  [ OK ]
    /bin/egrep                                               [ OK ]
    /bin/env                                                 [ OK ]
    /bin/fgrep                                               [ OK ]
    /bin/find                                                [ OK ]
    /bin/grep                                                [ OK ]
    /bin/kill                                                [ OK ]
    /bin/login                                               [ OK ]
    /bin/ls                                                  [ OK ]
    /bin/mail                                                [ OK ]
    /bin/mktemp                                              [ OK ]
    /bin/more                                                [ OK ]
    /bin/mount                                               [ OK ]
    /bin/mv                                                  [ OK ]
    /bin/netstat                                             [ OK ]
    /bin/ps                                                  [ OK ]
    /bin/pwd                                                 [ OK ]
    /bin/readlink                                            [ OK ]
    /bin/rpm                                                 [ OK ]
    /bin/sed                                                 [ OK ]
    /bin/sh                                                  [ OK ]
    /bin/sort                                                [ OK ]
    /bin/su                                                  [ OK ]
    /bin/touch                                               [ OK ]
    /bin/uname                                               [ OK ]
    /bin/systemd                                             [ OK ]
    /bin/systemctl                                           [ OK ]
    /bin/gawk                                                [ OK ]
    /bin/mailx                                               [ OK ]
    /usr/sbin/adduser                                        [ OK ]
    /usr/sbin/chroot                                         [ OK ]
    /usr/sbin/groupadd                                       [ OK ]
    /usr/sbin/groupdel                                       [ OK ]
    /usr/sbin/groupmod                                       [ OK ]
    /usr/sbin/grpck                                          [ OK ]
    /usr/sbin/lsof                                           [ OK ]
    /usr/sbin/prelink                                        [ OK ]
    /usr/sbin/pwck                                           [ OK ]
    /usr/sbin/sestatus                                       [ OK ]
    /usr/sbin/tcpd                                           [ OK ]
    /usr/sbin/useradd                                        [ OK ]
    /usr/sbin/userdel                                        [ OK ]
    /usr/sbin/usermod                                        [ OK ]
    /usr/sbin/vipw                                           [ OK ]
    /usr/sbin/xinetd                                         [ OK ]
    /usr/bin/awk                                             [ OK ]
    /usr/bin/chattr                                          [ OK ]
    /usr/bin/curl                                            [ OK ]
    /usr/bin/cut                                             [ OK ]
    /usr/bin/diff                                            [ OK ]
    /usr/bin/dirname                                         [ OK ]
    /usr/bin/du                                              [ OK ]
    /usr/bin/elinks                                          [ OK ]
    /usr/bin/env                                             [ OK ]
    /usr/bin/file                                            [ OK ]
    /usr/bin/find                                            [ OK ]
    /usr/bin/GET                                             [ OK ]
    /usr/bin/groups                                          [ OK ]
    /usr/bin/head                                            [ OK ]
    /usr/bin/id                                              [ OK ]
    /usr/bin/kill                                            [ OK ]
    /usr/bin/killall                                         [ OK ]
    /usr/bin/last                                            [ OK ]
    /usr/bin/lastlog                                         [ OK ]
    /usr/bin/ldd                                             [ OK ]
    /usr/bin/less                                            [ OK ]
    /usr/bin/links                                           [ OK ]
    /usr/bin/locate                                          [ OK ]
    /usr/bin/logger                                          [ OK ]
    /usr/bin/lsattr                                          [ OK ]
    /usr/bin/md5sum                                          [ OK ]
    /usr/bin/newgrp                                          [ OK ]
    /usr/bin/passwd                                          [ OK ]
    /usr/bin/perl                                            [ OK ]
    /usr/bin/pgrep                                           [ OK ]
    /usr/bin/pstree                                          [ OK ]
    /usr/bin/readlink                                        [ OK ]
    /usr/bin/rkhunter                                        [ OK ]
    /usr/bin/runcon                                          [ OK ]
    /usr/bin/sha1sum                                         [ OK ]
    /usr/bin/sha224sum                                       [ OK ]
    /usr/bin/sha256sum                                       [ OK ]
    /usr/bin/sha384sum                                       [ OK ]
    /usr/bin/sha512sum                                       [ OK ]
    /usr/bin/size                                            [ OK ]
    /usr/bin/stat                                            [ OK ]
    /usr/bin/strace                                          [ OK ]
    /usr/bin/strings                                         [ OK ]
    /usr/bin/sudo                                            [ OK ]
    /usr/bin/tail                                            [ OK ]
    /usr/bin/test                                            [ OK ]
    /usr/bin/top                                             [ OK ]
    /usr/bin/tr                                              [ OK ]
    /usr/bin/uniq                                            [ OK ]
    /usr/bin/users                                           [ OK ]
    /usr/bin/vmstat                                          [ OK ]
    /usr/bin/w                                               [ OK ]
    /usr/bin/watch                                           [ OK ]
    /usr/bin/wc                                              [ OK ]
    /usr/bin/wget                                            [ OK ]
    /usr/bin/whatis                                          [ OK ]
    /usr/bin/whereis                                         [ OK ]
    /usr/bin/which                                           [ OK ]
    /usr/bin/who                                             [ OK ]
    /usr/bin/whoami                                          [ OK ]
    /usr/bin/gawk                                            [ OK ]

[Press to continue]

Checking for rootkits...

  Performing check of known rootkit files and directories
    55808 Trojan - Variant A                                 [ Not found ]
    ADM Worm                                                 [ Not found ]
    AjaKit Rootkit                                           [ Not found ]
    Adore Rootkit                                            [ Not found ]
    aPa Kit                                                  [ Not found ]
    Apache Worm                                              [ Not found ]
    Ambient (ark) Rootkit                                    [ Not found ]
    Balaur Rootkit                                           [ Not found ]
    BeastKit Rootkit                                         [ Not found ]
    beX2 Rootkit                                             [ Not found ]
    BOBKit Rootkit                                           [ Not found ]
    cb Rootkit                                               [ Not found ]
    CiNIK Worm (Slapper.B variant)                           [ Not found ]
    Danny-Boy's Abuse Kit                                    [ Not found ]
    Devil RootKit                                            [ Not found ]
    Dica-Kit Rootkit                                         [ Not found ]
    Dreams Rootkit                                           [ Not found ]
    Duarawkz Rootkit                                         [ Not found ]
    Enye LKM                                                 [ Not found ]
    Flea Linux Rootkit                                       [ Not found ]
    FreeBSD Rootkit                                          [ Not found ]
    Fu Rootkit                                               [ Not found ]
    Fuck`it Rootkit                                          [ Not found ]
    GasKit Rootkit                                           [ Not found ]
    Heroin LKM                                               [ Not found ]
    HjC Kit                                                  [ Not found ]
    ignoKit Rootkit                                          [ Not found ]
    iLLogiC Rootkit                                          [ Not found ]
    IntoXonia-NG Rootkit                                     [ Not found ]
    Irix Rootkit                                             [ Not found ]
    Kitko Rootkit                                            [ Not found ]
    Knark Rootkit                                            [ Not found ]
    ld-linuxv.so Rootkit                                     [ Not found ]
    Li0n Worm                                                [ Not found ]
    Lockit / LJK2 Rootkit                                    [ Not found ]
    Mood-NT Rootkit                                          [ Not found ]
    MRK Rootkit                                              [ Not found ]
    Ni0 Rootkit                                              [ Not found ]
    Ohhara Rootkit                                           [ Not found ]
    Optic Kit (Tux) Worm                                     [ Not found ]
    Oz Rootkit                                               [ Not found ]
    Phalanx Rootkit                                          [ Not found ]
    Phalanx2 Rootkit                                         [ Not found ]
    Phalanx2 Rootkit (extended tests)                        [ Not found ]
    Portacelo Rootkit                                        [ Not found ]
    R3dstorm Toolkit                                         [ Not found ]
    RH-Sharpe's Rootkit                                      [ Not found ]
    RSHA's Rootkit                                           [ Not found ]
    Scalper Worm                                             [ Not found ]
    Sebek LKM                                                [ Not found ]
    Shutdown Rootkit                                         [ Not found ]
    SHV4 Rootkit                                             [ Not found ]
    SHV5 Rootkit                                             [ Not found ]
    Sin Rootkit                                              [ Not found ]
    Slapper Worm                                             [ Not found ]
    Sneakin Rootkit                                          [ Not found ]
    'Spanish' Rootkit                                        [ Not found ]
    Suckit Rootkit                                           [ Not found ]
    SunOS Rootkit                                            [ Not found ]
    SunOS / NSDAP Rootkit                                    [ Not found ]
    Superkit Rootkit                                         [ Not found ]
    TBD (Telnet BackDoor)                                    [ Not found ]
    TeLeKiT Rootkit                                          [ Not found ]
    T0rn Rootkit                                             [ Not found ]
    trNkit Rootkit                                           [ Not found ]
    Trojanit Kit                                             [ Not found ]
    Tuxtendo Rootkit                                         [ Not found ]
    URK Rootkit                                              [ Not found ]
    Vampire Rootkit                                          [ Not found ]
    VcKit Rootkit                                            [ Not found ]
    Volc Rootkit                                             [ Not found ]
    Xzibit Rootkit                                           [ Not found ]
    X-Org SunOS Rootkit                                      [ Not found ]
    zaRwT.KiT Rootkit                                        [ Warning ]
    ZK Rootkit                                               [ Not found ]

  Performing additional rootkit checks
    Suckit Rookit additional checks                          [ OK ]
    Checking for possible rootkit files and directories      [ None found ]
    Checking for possible rootkit strings                    [ None found ]

  Performing malware checks
    Checking running processes for suspicious files          [ None found ]
    Checking for login backdoors                             [ None found ]
    Checking for suspicious directories                      [ None found ]
    Checking for sniffer log files                           [ None found ]
  Performing trojan specific checks
    Checking for enabled xinetd services                     [ None found ]
    Checking for Apache backdoor                             [ Not found ]

  Performing Linux specific checks
    Checking loaded kernel modules                           [ OK ]
    Checking kernel module names                             [ OK ]

[Press to continue]

Checking the network...

  Performing checks on the network ports
    Checking for backdoor ports                              [ None found ]
    Checking for hidden ports                                [ Skipped ]

  Performing checks on the network interfaces
    Checking for promiscuous interfaces                      [ None found ]

Checking the local host...

  Performing system boot checks
    Checking for local host name                             [ Found ]
    Checking for system startup files                        [ Found ]
    Checking system startup files for malware                [ None found ]

  Performing group and account checks
    Checking for passwd file                                 [ Found ]
    Checking for root equivalent (UID 0) accounts            [ None found ]
    Checking for passwordless accounts                       [ None found ]
    Checking for passwd file changes                         [ Warning ]
    Checking for group file changes                          [ Warning ]
    Checking root account shell history files                [ OK ]

  Performing system configuration file checks
    Checking for SSH configuration file                      [ Found ]
    Checking if SSH root access is allowed                   [ Not set ]
    Checking if SSH protocol v1 is allowed                   [ Not set ]
    Checking for running syslog daemon                       [ Found ]
    Checking for syslog configuration file                   [ Found ]
    Checking if syslog remote logging is allowed             [ Not allowed ]

  Performing filesystem checks
    Checking /dev for suspicious file types                  [ None found ]
    Checking for hidden files and directories                [ Warning ]

[Press to continue]

System checks summary
=====================

File properties checks...
    Required commands check failed
    Files checked: 138
    Suspect files: 0

Rootkit checks...
    Rootkits checked : 249
    Possible rootkits: 1
    Rootkit names    : zaRwT.KiT Rootkit

Applications checks...
    All checks skipped

The system checks took: 3 minutes and 13 seconds

All results have been written to the log file (/var/log/rkhunter/rkhunter.log)

One or more warnings have been found while checking the system.
Please check the log file (/var/log/rkhunter/rkhunter.log)





P.S :-  Warning: zaRwT.KiT Rootkit                        [ Warning ]
             Directory '/rk' found
  
  rk Dir exist under /
drwxr-xr-x    2 root   root   4.0K Apr 23  2012 rk






Read More
Posted in | No comments
Newer Posts Older Posts Home
Subscribe to: Comments (Atom)

Popular Posts

  • No package 'lua5.1' found
    hecking for LUA51... no checking for LUA51... configure: error: Package requirements (lua5.1 >= 5.1) were not met: No package 'lua5.1...
  • response to SOA query was unsuccessful: solved
    check your zone file [root@inf1sysadm1 data]# pwd /var/named/data # cat ind.raman.com.zone $ORIGIN . $TTL 3600 ; 1 hour ind.raman.com IN SO...
  • can't locate your x11 installation Fedora
    While install Conky, system through this error. Solution:- You need to install X11 Software Dev Package. Login on system with root user ...
  • Qmail Installation & Configuration step by step
    Tested under CentOS 5.8  64bit machine. 1)Packges which i installed for Qmail. httpd-2.2.3-76 php-5.1.6-39 perl-5.8.8 -38 gcc-4.1.2 mysql-5....
  • Dell MD3200 SAS Cabling With Diagram
    I have 2 MD3200 with SAS Ports + 2 Power Edge720. Task to connect Both DAS with Both server and make sure Both server showing  all DAS Parti...
  • It is safe to clean windows prefetch folder and registry folder ?
     It is safe to clean windows prefetch folder and registry folder ? Will this boost Windows operating system capabilities ? Many of you hav...
  • Windows 7 & Windows 8 fail to start
    Windows 7 fail to boot, what should I do? Is Windows 7 failing to boot after you installed the loader or after you just installed a fresh ne...
  • Steps how to change VolStatus in Bacula through bonsole.
    In my example MediaId=4 or Volumename=000018L4 shows volstatus is Purged. *list volumes Pool: Default +---------+------------+-----------+--...
  • Adobe Photoshop CS5 Error 16 , Adobe Photoshop CS5 Error 7
    When you install Adobe Photoshop CS5 you might get some errors. In case you get one you will see a code and a little description. Is very im...
  • X connection to localhost:10.0 broken (explicit kill or server shutdown).
    Solution:- With Xhost, you can solve this issue.

Categories

  • Adobe
  • Players
  • Reviews
  • Windows

Blog Archive

  • ►  2013 (27)
    • ►  October (3)
    • ►  August (1)
    • ►  June (1)
    • ►  April (3)
    • ►  February (10)
    • ►  January (9)
  • ▼  2012 (29)
    • ▼  December (2)
      • error:0906406D:PEM routines:PEM_def_callback:probl...
      • YUM SERVER SETUP IN REDHAT
    • ►  November (7)
      • How to install OpenVAS in Fedora
      • Install Tor on Fedora 16
      • How to clone Virtual Machine in Sun VirtualBox
      • Best Tool to get Hardware details in Linux
      • How Enable/Diabled WLAN/Blutooth on Dell Inspiron 14R
      • Postgres 8.4 on CentOS
      • How install all Development Libraries in linux
    • ►  October (10)
      • How to install chkrootkit :-Determine whether the ...
      • How to install Rootkit Hunter
    • ►  September (4)
    • ►  August (1)
    • ►  June (2)
    • ►  April (1)
    • ►  March (1)
    • ►  January (1)
  • ►  2011 (36)
    • ►  December (3)
    • ►  November (3)
    • ►  October (1)
    • ►  September (5)
    • ►  August (4)
    • ►  May (2)
    • ►  April (4)
    • ►  March (5)
    • ►  February (2)
    • ►  January (7)
  • ►  2010 (24)
    • ►  December (1)
    • ►  November (1)
    • ►  October (4)
    • ►  August (1)
    • ►  May (1)
    • ►  April (1)
    • ►  March (2)
    • ►  February (5)
    • ►  January (8)
  • ►  2009 (18)
    • ►  December (6)
    • ►  November (3)
    • ►  August (1)
    • ►  July (2)
    • ►  June (1)
    • ►  May (1)
    • ►  April (1)
    • ►  March (1)
    • ►  February (1)
    • ►  January (1)
  • ►  2008 (16)
    • ►  December (1)
    • ►  October (1)
    • ►  August (1)
    • ►  July (5)
    • ►  April (2)
    • ►  February (1)
    • ►  January (5)
  • ►  2007 (4)
    • ►  July (3)
    • ►  June (1)
Powered by Blogger.

About Me

Unknown
View my complete profile