Tuesday, January 31, 2012

AMALI : SETUP DHCP SERVER


DHCP SERVER

Service                         : dhcp

Find File                      :  # cd /Media/<Folder located name>(if using Fedora CD)
                                       # ls | grep <file name> ( using for grabbing file only)

Install                           : # yum install dhcp (if there is NO dhcp in fedora packages)
                                      #  rpm –ivh <dhcp file> (if there is dhcp in fedora packages)

Check Status                : # rpm –q dhcpd

Up service                    : # service dhcpd status – check status
  # service dhcpd start – start service
                                      # service dhcpd restart – restart service
                                      # service dhcpd stop - stop service

Parameter                    : vim /etc/dhcpd.conf – modify dhcp scope

Additional info :
SELinux turn off                   : # vim  /etc/selinux/config
                                set selinux = disabled (reboot pc after set)

IPtables (firewall) turn off       :  # service iptables stop
                                (Also can set by using command #setup      service tool)

Uninstall dhcpd                    : # yum uninstall dhcpd
                                # rpm –e dhcpd


AMALI : SETUP SAMBA SERVER

LINUX OS: Fedora 14

SAMBA SERVER

Service                        : Samba

Find File                      :  # cd /Media/<Folder located name>(if using Fedora CD)
                                       # ls | grep <file name> ( using for grabbing file only)

Install                           : # yum –y install samba (if there is NO smb in fedora packages)
                                       ( kena ada connection internet )
                                      # rpm –ivh <samba file> (if there is smb in fedora packages)
                       
Check Status                : # rpm –q samba

Up service                    : # service smb status – check status
  # service smb start – start service
                                      # service smb restart – restart service
                                      # service smb stop - stop service

Configuration File        : # vim  /etc/samba/smb.conf

Parameter                    : security = share I user I server
(Replace : security = share; no need smbpassword)
                                                 
  Create share folder: 
[demo]
                                                     Path = /demo
                                                     Writable = yes
                                                     Browseable = yes
                                                     Public = yes

Additional info :

Failed dependencies       
  -       Find the file that it depends
  -       Install the file

SELinux turn off                      : # vim  /etc/selinux/config
                                       - set selinux = disabled (reboot pc after set)

    IPtables (firewall) turn off          : # service iptables stop
                 (Also can set by using command #setup ---> service tool)

      Give user authority                  : # mkdir /demo
                                                       # chmod –R 777 /demo (full access)-read,write and execute.

        Create user account & samba password             : #  adduser demo
                                                                                 #  passwd demo
                                                                                 #  smbpasswd –a demo
                                                                                 (restart samba)

        Uninstall samba      : # yum uninstall samba
                                  # rpm –e samba


        Thursday, January 26, 2012

        AMALI : BASIC COMMAND FOR LINUX

        3 directory in directory "eika"


        Login user “netsec”.
        Password user “netsec”.
        Login as:  netsec
        netsec @10.1.0.35’s password:  netsec

        Check current user.
        [netsec@localhost ~]$  whoami

        Check current location.
        [netsec@localhost ~]$  pwd

        Create new directory and rename as “your name”.
        [netsec@localhost ~]$  mkdir eika


        Enter into “your name” directory.
        [netsec@localhost ~]$  cd eika

        Create new directory and rename as “student”.
        [netsec@localhost eika]$  mkdir student

        Create new directory and rename as “pelajar”.
        [netsec@localhost eika]$  mkdir pelajar

        Create new directory and rename as “pelatih”.
        [netsec@localhost eika]$  mkdir pelatih

        Create new file in “student” directory and rename as “nama”.
        Fill this file with: and Save this file.
        • Julia
        • Suraya
        • Hapipah
        • Umairah
        [netsec@localhost student]$  nano
        Julia
        Suraya
        Hapipah
        Umairah
        < control + O> - WriteOut
        File Name To Write: nama

        Create new file in “student” directory and rename as “kursus”.
        Fill this file with : And save this file.
        • Netsec
        • Wifi
        • RFID
        [netsec@localhost student]$  nano
        Netsec
        Wifi
        RFID
        < control + O> - WriteOut
        File Name To Write: kursus

        List all file in “student” directory.
        [netsec@localhost student]$  ls

        Copy “nama” file into “pelajar” directory.
        [netsec@localhost student]$  cp nama /home/netsec/eika/pelajar
        [netsec@localhost pelajar]$  cat nama

        Copy “kursus” file into “pelatih” directory.
        [netsec@localhost student]$  cp kursus /home/netsec/eika/pelajar
        [netsec@localhost pelatih]$  cat kursus

        Rename “kursus” file in pelatih directory to “course”.
        [netsec@localhost pelatih]$  mv kursus course

        Move “nama” file from pelajar directory into pelatih directory.
        [netsec@localhost pelajar]$  mv nama /home/netsec/eika/pelatih

        Remove “nama” file from pelatih directory.
        [netsec@localhost pelatih]$  rm nama

        Remove “course” file from pelatih directory.
        [netsec@localhost pelatih]$  rm course

        Go back to home directory.
        [netsec@localhost pelatih]$  cd ~

        Clear command prompt.
        [netsec@localhost pelatih]$  clear

        Logout user.
        [netsec@localhost ~]$  logout


        Thursday, January 19, 2012

        19012012 - WIRELESS SECURITY TEST



        Wireless Technology 
        1. The  802.11 Standard was publish in which year?
             (A) 2008
             (B) 1965
             (C) 1997
             (D) 1980


        2. If the original 802.11 Standard promises a 2Mbps speed, what about 802.11b?
             (A) 10 Mbps
             (B) 11 Mbps
             (C) 22 Mbps
             (D) 53 Mbps


        3. Of which 802.11 Standard provides a greatest coverage range?
             (A) 802.11a
             (B) 802.11b
             (C) 802.11g
             (D) 802.11i


        4. A wireless network is subjected to the following except?
             (A) Interference
             (B) Performance Issue
             (C) Security Issue
             (D) All the above


        5. What channel do Access Point(AP) use by default?
             (A) 1
             (B) 6
             (C) 11
             (D) 14


        6. Of which 802.11 Standard transmit using the 5Ghz spectrum?
             (A) 802.11
             (B) 802.11b
             (C) 802.11a
             (D) 802.11g


        7. Which of the following wireless spectrum operates lower than the Wireless spectrum?(Multiple)
             (A) AM Transmission
             (B) FM Transmission
             (C) Television Transmission
             (D) Ameteur Radio Transmission


        8. Which of these 802.11 Standard is published as "Marketed & Certified as Wi-Fi"?
             (A) 802.11a
             (B) 802.11b
             (C) 802.11g
             (D) All the above


        9. Which three important setting must be made before you establish a Wireless Network?
             (A) SSID
             (B) Channel
             (C) DHCP
             (D) MAC Address


        10. To get connected to an Access Point(AP), there is a basic 3 stage process. Sort this stages in the right order.
             i. Authenticated & Unassociated
             ii. Authenticated & Associated
             iii. Unauthenticated & Unassociated
             (A) i, ii, iii
             (B) iii, ii, i
             (C) ii, iii, i
             (D) iii, i, ii


        11. Arrange the Wireless Network Life Cycle in the right order.
             i. Troubleshooting & Security
             ii. Pre-deployment & Expansion Planning
             iii. Installation & Verification
             iv. Management & Optimization
             (A) i, ii, iii,iv
             (B) ii, iii, iv, i
             (C) iv, iii, ii, i
             (D) ii, iii, i, iv

        12. How do you solve a multipath issue in a Wireless Network?
             (A) Use wired network
             (B) Hard reset the Wireless Access Point
             (C) Move the Access Point in another location
             (D) Move your Wireless Network Client


        13. Verifying a Wireless Network involves the following except?
             (A) To ensure all clients are within the coverage area of the AP
             (B) To make sure the position of the AP is the best planned
             (C) To implement and to test Wireless Network security at it's best
             (D) To add more AP for better coverage


        14. Data collision in a Wireless Network is generally caused by
             (A) Multipath
             (B) Hidden Node
             (C) Wrong antenna used
             (D) Incorrect use of Power adapter


        15. You can prevent un-authorized user accessing your AP by the following implementation except
             (A) WEP
             (B) WPA
             (C) MAC address
             (D) Username &  Password access


        16. You can purchase and upgrade your Wireless AP antenna. Which of these antennas are not available?
             (A) Omni Directional
             (B) Semi Directional
             (C) Telescopic Directional
             (D) Highly Directional


        17. You should upgrade and update your driver and firmware of your network devices. What is the main reason for this?
             (A) To make sure your devices will work properly with newer devices
             (B) To make sure your AP transmit at it's maximum strenght
             (C) To enhance performance of your devices
             (D) To avoid hardware failure

        Wireless Terminology
        18. SSID is short for
             (A) Service Security Identity
             (B) Super Strenght Isometric
             (C) Security Setting Implementation
             (D) Service Set Identity


        19. WEP is short for
             (A) Wired Equipment Protocol
             (B) Wireless Equipment Protection
             (C) Wired Equivalent Protocol
             (D) Wireless Enhancement Protocol


        20. WPA is short for
             (A) Wired Protocol Access
             (B) WiFi Protected Access
             (C) Wired Protection Access
             (D) Wireless Protected Access


        21. DSSS is short for
             (A) Dynamic Sequence Spectrum Spread
             (B) Direct Sequence Spread Spectrum
             (C) Digital Spectrum Sequence Spectrum
             (D) Dynamic Spectrum Spread Sequence


        22. FHSS is short for
             (A) Frequency Hopping Spread Spectrum
             (B) Final Hopping Spectrum Spread
             (C) Fidelity Hashing Spectrum Spread
             (D) Frequency Hopping Spectrum Sequence


        23. IEEE is short for
             (A) Institute of Engineers of Electronics and Electrical
             (B) Institute of Electronics and Electrical Engineers
             (C) Institute of Electrical and Electronics Engineers
             (D) None of the above


        24. MAC is short for
             (A) Media Access Centralization
             (B) Media Access Control
             (C) Multiple Access Control
             (D) Multiplex Amplitude Control


        25. Wi-Fi is short for
             (A) Wireless Fidelity
             (B) Wide Firmware
             (C) WAN Fidelity
             (D) Winchester File
        (prepared by : Mr. Ken Chin(Fluke Network 

        Friday, January 13, 2012

        FILE FOLDER DALAM PENDRIVE JADI SHORTCUT..?



        Folder-folder yang jadi shortcut

        Langkah-langkahnya :

        • Go to ‘Start’ -->’Run’ --> type ‘cmd’ and click OK untuk ke Command Prompt. (If running Windows Vista/7, klik “Home + R” , then taip ‘cmd’. Note: butang ‘Home’ selalunya sebelah ‘alt’).
        • Masukkan command attrib -h -r -s /s /d h:\*.* (assume yang drive letter adalah H: dalam ‘My Computer’, jangan lupa replace kalau drive letter adalah berbeza).

        • Tekan ‘Enter’, then check file/folder dalam removable disk sama ada visible atau tak? If YES, tahniah!!.. Anda berjaya...

        Thursday, January 12, 2012

        AMALI : PHISHING

        (dibuat hanya dalam server 10.1.0.13)

        Keperluan :
        • Website yang hendak dibuat phishing(cth : website UNIMAP).
        • Software  Putty.

        1.Go to website UNIMAP, then save Save Page As html.
        Website UNIMAP(asli)
        Folder yang save page website UNIMAP



        2.Copy “data” dan “write”. Then paste ke dalam folder unimap.
        “data” dan “write” disimpan dalam folder unimap


         
        3.Buka page UNIMAP menggunakan wordPad. Find ‘username’, ‘password’ dan ‘action’.
         name=“ssousername”
        name=“p_request”
        Tukar bahagian action kepada [action=“write.php”] seperti gambar di bawah.
        action=“write.php”




        4.Buka write(dalam folder UNIMAP). Pastikan bahagian ‘username’ dan ‘password’ adalah sama dengan ‘username’ dan ‘password’ dalam page UNIMAP. (selepas password, masukkan url website UNIMAP yang asli seperti dalam gambar di bawah) - FUNGSI : supaya user akan redirect ke website asli setelah login di phishing website.




         
        5.Allocate folder UNIMAP tadi dalam server 10.1.0.13.
        Folder UNIMAP yang telah disimpan dalam server 10.1.0.13




        6.Running software Putty. Masukkan IP address server, then klik SSH.




        7.Login as root. Masukkan password linux123. Then, masuk ke folder yang simpan folder UNIMAP.
        Folder UNIMAP yang ada dalam folder netsec_wifi




        8.Masukkan command “chmod<>-R<>777<>nama folder” seperti di bawah.


         
        9.Check sama ada proses phishing berjaya atau tidak. Masuk semula ke website UNIMAP(melalui web browser server). Login seperti biasa. If selepas klik butang login, website UNIMAP(asli) akan terpapar.
        Login pada  website palsu
        Website UNIMAP yang asli


         
        10. Untuk lihat semula username dan password yang berjaya kita capture. Go to folder UNIMAP > data.

        Tuesday, January 10, 2012

        SHARING BROADBAND(CELCOM)





        If nak setup sharing untuk Celcom broadband
        Untuk Komputer A :
        1. Go to Control Panel > Network Connection > Vodafone Mobile Connect(Celcom broadband).

         

        2. Right click pada Vodafone Mobile Connect > Properties > Advanced. Then klik pada yang berkenaan.


        3. Kemudian masuk semula ke Network Connection. Simbol tangan akan tertera menandakan broadband dah boleh share.


        4. Set IP address pada Local Area Network(LAN) Komputer A.(supaya Komputer B dapat connect ke Komputer B melalui LAN).


        Untuk Komputer B :
        1. Disable connection pada LAN, then enable semula.(supaya Komputer B dapat terima IP address baru).


         



         
         

        Designed By Blogs Gone Wild!