I wasn't trying to install backtrack on the USB, I was trying to get the iso to boot like a live CD.
Type: Posts; User: Sarmacid; Keyword(s):
I wasn't trying to install backtrack on the USB, I was trying to get the iso to boot like a live CD.
Did you try any attacks on the machine with snort? If not, it shouldn't be generating alerts.
The easiest way I've found to test snort, is to enable the ICMP rules, start snort, and ping it from...
You can add the BT repos to Ubuntu and download the tools, this is however not supported by the BT team.
If you want to do this yourself, I'd suggest downloading Nessus and setting it up to scan your server. Not only does it tell you what ports are open, like nmap, but it tests those ports for known...
I don't think you could effectively block it for good, there would always be a way to get around, however you've mentioned ways to make it harder on them. I haven't seen a company block corkscrew...
You can edit the menu entry. Go to System -> Preferences -> Main menu. There you just need to look for zenmap, hit properties and on the command, add 'gksu' at the start. Then you'll be prompted for...
In my experience there should be 3 IPs on that network, Router, your PC and your roomate's PC, not sure why you only get 2 though.
Which plugin feed are you using, and what's the output when you try to run it?
Actually I had 2 scripts. The first one generated all the possible combinations for the password, the second one tried to decrypt using each line produced by the second one as a passphrase.
the...
That does seem very supicious, I have nothing on either my user's crontab or root's crontab. Just to be sure I'd reinstall Ubuntu.
I remember this happening to me. To be able to decrypt my files again I had make a script to bruteforce GPG with the most likely combination of the passphrase I had that was about 12 characters,...
I'd suggest installing Virtualbox in Ubuntu and running BT as a virtual machine, at least that's what I do.
If your firewall is well configured, it will stop them from accessing your machine, however that alone won't stop them from snooping around what you do on the internet. Using https, they can tell...
You need to change the "the_rules_you_wish_to_use" part for the adequate URL.
Usually the flags -h or --help will provide more help. If not, you can always read the man pages
man snort
Not sure about the grub, I think grub-md5-crypt worked on grub 1.5 and must have changed in grub 2.
About the screen locking, unless you have compiz, the shortcut ctrl + alt + L will work, or you...
Are you trying to prevent other users from accessing your home folder? If that's the case then
chmod 700 /home/$USER And add the -R flag if you want it recursive.
You have to consider that if both systems have been hardened, both will be secure, and also take into account that sometimes it's easier to hack someone than to hack a computer.
The keys are stored in the /home/$USER/.gnupg folder, so they would be encrypted too. You'll need to back them up.
Check this out https://help.ubuntu.com/community/IptablesHowTo
The ssh client is intalled by default in Ubuntu, which is the config file you're looking at. The other file, sshd_config, will appear after you install the ssh server.
I'm guessing this hasn't been done because allowing an program to escalate privileges would introduce a lot of vulnerabilities. However gedit allows for plugins, so maybe there's one for that task or...
It was discussed yesterday, and yes, it affects Unix systems as well.
http://ubuntuforums.org/showthread.php?t=1380322
The attack was targeted at information, not to use the machine in any...
It may be a firewall issue. Post the output of the command
sudo iptables -L
It presented me with the screensaver and required me to enter my password to get back to my session. Do you have passwordless login enabled?
However I did notice that the guest had read and...