| No comment yet

How to install Kernel PAE (Ubuntu)

(PAE) stand for Physical Address Extension. It's a feature of x86 and x86-64 processors that allows more than 4 Gigabytes of physical memory to be used in 32-bit systems.

Without PAE kernel, you should see something as follows:
root@penreturns:~$ free -m

Sample output:


To enable PAE, open terminal and type the following command:
root@penreturns:~$ sudo apt-get install linux-headers-server linux-image-server linux-server

Reboot your machine.

Now check again :
root@penreturns:~$ free -m

Sample output:


Enjoy!

*copy code without root@penreturns:~$
| No comment yet

Booth Malaysia Ubuntu LoCo Team di Kolej Matrikulasi Pulau Pinang


Tarikh: 18 Februari 2012
Masa: 8:00am - 5:00pm
Tempat: KMPP - Kolej Matrikulasi Pulau Pinang

Aktiviti:
- Memperkenalkan ubuntu kepada pengunjung yang terdiri daripada pelajar dan juga tenaga pengajar Kolej Matrikulasi Pulau Pinang.

More Picture at - Ubuntu Malaysia LoCo Team

*copy code without root@penreturns:~$
| No comment yet

Detecting ARP Poisoning with Wireshark (Ubuntu)

1. First, download Wireshark. Open your terminal and type:
root@penreturns:~$ sudo apt-get install wireshark

2. Run wireshark by typing this command:
root@penreturns:~$ gksudo wireshark &

ARP poisoning attacks are the most popular, they are extremely easy to do. The most common and effective method of doing this on a shared network segment is to ARP poison the target router, or entire subnet. This also makes it extremely easy to detect. Because an ARP poisoning attack works by repeatedly Re-ARPing the target it will occassionally collide with ARP frames sent by the ACTUAL host. We can detect this with Wireshark by filtering duplicate address ARP frames.




We simply start our capture and set our filter to “arp.duplicate-address-frame” When we examine the data provided by Wireshark we also see that the IP address 192.168.0.1 is being claimed by another MAC address. Under normal network operations two systems should not be claiming the same address on the same network segment, particularly the address of the gateway.


In my case, theres no duplicate address. That's mean im not under ARP Poisoning attack.

Enjoy!
*copy code without root@penreturns:~$
| No comment yet

How to install Metasploit Framework (Ubuntu)



1. First, open a terminal and type:
root@penreturns:~$ wget http://updates.metasploit.com/data/releases/framework-4.0.0-linux-full.run
This downloads the current version of the Metasploit framework via wget.

2. Before you can run the installer you need to make it executable.
root@penreturns:~$ chmod +x framework-4.*-linux-full.run

3. And now execute the installer.
root@penreturns:~$ sudo ./framework-4.*-linux-full.run

4. Get the latest Metasploit update
root@penreturns:~$ sudo msfupdate

5. Run Metasploit
root@penreturns:~$ msfconsole


Enjoy!

*copy code without root@penreturns:~$
| No comment yet

Upgrade your 11.10 to Ubuntu 12.04 (Precise Pangolin)


1. First, open a terminal and type:
root@penreturns:~$ sudo apt-get update && sudo apt-get upgrade
2. After updating your system, press Alt – F2 on your keyboard, then search for "update-manager -d"



3. Next, click "Upgrade" to begin upgrading your system.

4. Finish downloading and installing all 12.04 packages.

5. Reboot.
root@penreturns:~$ sudo reboot

And you’re done! Enjoy!

*copy code without root@penreturns:~$
| No comment yet

How to change your Hostname (Ubuntu)

1. First, open a terminal and type:
root@penreturns:~$ gksu gedit /etc/hostname
You should see a line stating your current hostname. For eg. iPad



2. Change the hostname to something you desired. Save and close the file.

3. Back in your terminal, type:
root@penreturns:~$ gksu gedit /etc/hosts
4. Change the line:
127.0.1.1 iPad

to

127.0.1.1 your-new-hostname

Save and close the file.
Reboot and your new hostname should appear in the terminal now.
*copy code without root@penreturns:~$
| No comment yet

Useful Commands in (Linux)

A comprehensive list of commands needed when using Ubuntu:

Command privileges.
root@penreturns:~$ sudo command - run command as root
root@penreturns:~$ sudo su – root shell open
root@penreturns:~$ sudo su user – open shell as a user
root@penreturns:~$ sudo -k – forget your password sudo
root@penreturns:~$ gksudo command – sudo visual dialog (GNOME)
root@penreturns:~$ kdesudo command – sudo visual dialog (KDE)
root@penreturns:~$ sudo visudo – edit / etc / sudoers
root@penreturns:~$ gksudo nautilus – root file manager (GNOME)
root@penreturns:~$ kdesudo konqueror – root file manager (KDE)
root@penreturns:~$ passwd – change your password

Command Network.
root@penreturns:~$ ifconfig – displays information network
root@penreturns:~$ iwconfig – displays information from wireless
root@penreturns:~$ sudo iwlist scan – scan wireless networks
root@penreturns:~$ sudo /etc/init.d/networking restart – reset the network
root@penreturns:~$ (file) /etc/network/interfaces – manual configuration
root@penreturns:~$ ifup interface – bring online interface
root@penreturns:~$ ifdown interface – disable interface

Commands Display
root@penreturns:~$ sudo /etc/init.d/gdm restart – reset X (Gnome)
root@penreturns:~$ sudo /etc/init.d/kdm restart – reset X (KDE)
root@penreturns:~$ (file) /etc/X11/xorg.conf – show Configuration
root@penreturns:~$ sudo dpkg-reconfigure - reconfigure xserver-xorg-phigh - reset configuration X
Ctrl+Alt+Bksp – X display reset if frozen
Ctrl+Alt+FN – switch to tty N
Ctrl+Alt+F7 – switch back to X display

Commands Service System.
root@penreturns:~$ start service – service to start work (Upstart)
root@penreturns:~$ stop service – service to stop working (Upstart)
root@penreturns:~$ status service – check if service is running (Upstart)
root@penreturns:~$ /etc/init.d/service start – start service (SysV)
root@penreturns:~$ /etc/init.d/service stop – stop service (SysV)
root@penreturns:~$ /etc/init.d/service status – check service (SysV)
root@penreturns:~$ /etc/init.d/service restart – reset service (SysV)
root@penreturns:~$ runlevel – get current runlevel

Commands for Firewall.
root@penreturns:~$ ufw enable – turn on the firewall
root@penreturns:~$ ufw disable – turn off the firewall
root@penreturns:~$ ufw default allow – allow all connections by default
root@penreturns:~$ ufw default deny – drop all connections by default
root@penreturns:~$ ufw status – current rules and
root@penreturns:~$ ufw allow port – to allow traffic on port
root@penreturns:~$ ufw deny port – port block
root@penreturns:~$ ufw deny from ip – ip block

Command System.
root@penreturns:~$ lsb_release -a – get the version of Ubuntu
root@penreturns:~$ uname -r – get kernel version
root@penreturns:~$ uname -a – get all the information kernel

Commands for Package Manager.
root@penreturns:~$ sudo apt-get update – refresh updates available
root@penreturns:~$ sudo apt-get upgrade – update all packages
root@penreturns:~$ sudo apt-get dist-upgrade – version update
root@penreturns:~$ sudo apt-get install pkg – installing pkg
root@penreturns:~$ sudo apt-get remove pkg – uninstall pkg
root@penreturns:~$ sudo apt-get autoremove – removing packages obsotletos
root@penreturns:~$ sudo apt-get -f install – try to fix packages
root@penreturns:~$ dpkg –configure -a – try to fix a broken package
root@penreturns:~$ dpkg -i pkg.deb – install file pkg.deb
root@penreturns:~$ (file) /etc/apt/sources.list – list of repositories APT

Special Packages For commands.
ubuntu-desktop – Setting the standard Ubuntu
kubuntu-desktop – KDE Desktop
xubuntu-desktop – desktop XFCE
ubuntu-minimal – core earnings Ubuntu
ubuntu-standard – the standard utilities Ubuntu
ubuntu-restricted-extras – not free, but useful
kubuntu-restricted-extras – ditto KDE
xubuntu-restricted-extras – ditto XFCE
build-essential – packages used to compile
linux-image-generic – latest generic kernel image
linux-headers-generic – latest headlines

Applications commands.
nautilus – File Manager (GNOME)
dolphin – File Manager (KDE)
konqueror – Web browser (KDE)
kate – text editor (KDE)
gedit – text editor (GNOME)

*copy code without root@penreturns:~$