Skip to content

{ Category Archives } Linux

Ping Script

This is a basic Ping Script : It first pings the then pings the after that it pings the and finally pings the address Why does it pings 1.1 and 2.1 ? Because my friend wanted to use it in different areas, ( he his not familiar with the shell ) […]

Tagged , , ,

Hidden password in an extended attribute

Today I was playing with some forensic challenges and I got surprised by one of them. We had to analyse an image. My first guess was to use some steganography tools, but after an hour, I decided to move on and to research how to hide data on Mac OS X (because the challenge specified that […]

Tagged , , , , ,

Intruded Nº4

Level four :

It looks like the second challenge, but, let’s have a closer look to the inside :

After isolation of the important instructions :

I used brake points :

Let’s have a closer look to $esp

This was the password I typed in, let’s see further

Seems […]

Tagged , , ,

Intruded Nº3

Let’s connect to the server :

Let’s directly go to the Wargame folder

Multiple small program, let’s try them all :

It looks like we have to use ./prog we have to read /home/level4/.passwd … and ./prog is reading the file /tmp/file.log and printing the content … so let’s link both


Tagged , , , ,

Intruded nº2

Now that we succeeded the first level, let’s go for the second one. Once connected to the second level you see this :

let’s see the available files and directories :

Let’s explore a bit further :

and a bit further

Finally, a wargame folder

Let’s run the small program […]

Tagged , , , , ,

Intruded nº1

Today I tried the Intruded Leviathan wargame. This resolves the first challenge :   open a terminal type “ssh -p 10101” type the password  leviathan Connect to the remote web server :

First thing to do, evaluate the situation with the following command :

As we can see there is a .backup […]

Tagged , , ,

UDP Flooder in C

Yesterday we where still working on some attacks on our  bench test  and we tried some exploits on IP phones that we found on the internet. Most of them where making DOS or DDOS on the phones, this means that the phones were basically freezing.  Then we made some modification to a C UDP flooder […]

Tagged , , , , , , , , , , ,

Creating one Pixel in a BMP in C

Warning: strpos(): Empty needle in /home/users4/n/noktec/www/noktec/wp-includes/media.php on line 1608

This code was just a challenge, I wanted to create a simple image file with BMP headers.  The following code simply generate pink pixel . There is actually a pixel on this post somewhere there —>

The code is pretty simple, however has not been commented, for more information have a look to the […]

Tagged , , , , , ,

Who’s connected ?

To know who’s connected on your computer use the following commands : Commands : who : show the connected users : Linux/Mac last : show last connexion (passed ) : Linux / Mac lastb : show last connexion (failed) : Linux These files may also contain clues :

Tagged , , , , , , ,

Eject a dvd in command lines

A simple command to eject a DVD/ CD from the command line. To eject the DVD :

To close de drive :

That’s it.

Tagged , , , ,