Pular para o conteúdo principal

Postagens

Mostrando postagens de 2017

Instalação DOCKER no Kali Linux

I’ve recently upgraded to Kali 2 2016.2 and decided to run some local web apps to exercise exploiting the MEAN stack. To make things as quick and simple as possible, I decided to run these web apps in Docker. To install Docker in Kali, these were the steps I followed: Create a backports file and add the entry for Debian Wheezy: echo 'deb http://http.debian.net/debian wheezy-backports main' > /etc/apt/sources.list.d/backports.list && apt-get update Install ca-certificates and allow APT to operate via https: apt-get install apt-transport-https ca-certificates Add the appropriate GPG key: apt-key adv --keyserver hkp://p80.pool.sks-keyservers.net:80 --recv-keys 58118E89F3A912897C070ADBF76221572C52609D Add the appropriate Docker source entry: echo 'deb https://apt.dockerproject.org/repo debian-wheezy main' > /etc/apt/sources.list.d/docker.list && apt-get update Install Docker and start its service: apt-

x86_64 Linux Error: gnu/stub-32.h Missing Error and Solution

I ‘m getting the following error while compiling application under CentOS / RHEL / Fedora Linux 64 bit edition: /usr/include/gnu/stubs.h:7:27: error: gnu/stubs-32.h: No such file or directory How do I fix this error and compile my applications using gcc under RHEL / Fedora / CentOS Linux 64bit system? You need to install the glibc-devel package. It contains the object files necessary for developing programs which use the standard C libraries (which are used by nearly all programs). If you are developing programs which will use the standard C libraries, your system needs to have these standard object files available in order to create the executables. Install glibc-devel if you are going to develop programs which will use the standard C libraries. Fix for the RHEL/CentOS 5.x for GCC gnu/stub-32.h missing error Type the following yum command : # yum -y install glibc-devel.i386 Fix for the RHEL/CentOS 6.x for GCC gnu/stub-32.h missing error Type the following

Install MYSQL Centos

MySQL is a popular database management system used for web and server applications. However, MySQL is no longer in CentOS’s repositories and MariaDB has become the default database system offered. MariaDB is considered a drop-in replacement for MySQL and would be sufficient if you just need a database system in general. See our MariaDB in CentOS 7 guide for installation instructions. If you nonetheless prefer MySQL, this guide will introduce how to install, configure and manage it on a Linode running CentOS 7. Large MySQL databases can require a considerable amount of memory. For this reason, we recommend using a high memory Linode for such setups. This guide is written for a non-root user. Commands that require elevated privileges are prefixed with sudo . If you’re not familiar with the sudo command, you can check our Users and Groups guide. Before You Begin Ensure that you have followed the Getting Started and Securing Your Server guides

Installing Snort, Barnyard2, BASE, Snorby on Centos6.8

INTRODUCTION: In this post we will walk through Installation of Snort,barnyard,BASE and snorby.Snort is basically an intrusion detection system but we can tune it to intrusion prevention system.This post is step by step procedure to configure snort as intrusion prevention system and configure log analysis tools for snort which is BASE and Snorby. PREREQUESITE: Centos 6.8 minimal installed with internet connection. INSTALLING SNORT Snort is an open source intrusion prevention system(IPS) capable of real-time  traffic analaysis and packet logging Step 1 : UPDATE SERVER yum install -y epel-release yum update -y Step 2 : INSTALL DEPENDENCIES yum install -y wget gcc flex bison zlib zlib-devel libpcap libpcap-devel pcre pcre-devel tcpdump mysql mysql-server mysql-devel git libtool curl man make rpm-build autoconf automake  libdnet libdnet-devel   php-mysql tree Step 3 : INSTALL DAQ cd /usr/src/ wget -c https://www.snort.org/downloads/s

Snort - IDS, Configurações e Assinaturas

1.     Em que consiste um IDS: A detecção de intrusão tem as suas raízes nos sistemas de auditoria financeira às Mainframes. Os acessos tinham que ser cuidadosamente controlados, dessa forma foram criados mecanismos de segurança capazes de permitir aos administradores analisar logs em busca de anomalias que indicassem mau uso ou alterações aos ficheiros não autorizados. Este é o principio de detecção de intrusões, ou IDS (Intrusion Detection Systems). A ideia por detrás deste tipo de sistema é simples, um agente monitoriza actividade dos ficheiros num host ou no tráfego da rede e reporta as situações anómalas que possam ocorrer ao administrador. O mercado encontra-se dividido em duas vertentes: host-based e network-based. 1.1   Host-Based IDS Adicionam uma camada alvo de segurança a uma aplicação particularmente vulnerável ou a sistemas essenciais. Um agente monitoriza por exemplo um servidor de base de dados, audita e mantém um trilho, logs do sistema de situa