Free Hacking Tools: Installing

Showing posts with label Installing. Show all posts
Showing posts with label Installing. Show all posts

Friday, 15 March 2013

Installing John The ripper on Linux machine

,
John the ripper is undoubtedly one of the best password cracking tool. People have been experiencing some problems with installing it. So here we bring out a tutorial on how to install the famous password cracker on a Linux machine.


This is the method to install and use john the ripper in fedora/ubuntu (and many other linux as well)..

1) Download john the ripper software

http://www.ziddu.com/download/6365223/jo...ar.gz.html

2) Extract it and then copy the text from

http://www.openwall.com/lists/john-users/2009/09/02/3

3) Save the copy text in john folder with john.patch.

4) Open terminal and go to john folder

cd Desktop/john-1.7.3.1

5) Now we have to patch our john software with following command

patch -Np1 -i john.patch

6) go to src folder

cd src

7) run this command

make linux-x86-sse2

8) cd .. and goto run folder cd run.

9) Run this commmand

./unshadow /etc/passwd /etc/shadow > filename

10) Finally run this command to crack password

./john filename

and here you have the ripper running. 

by hackiteasy

Installing nessus on ubuntu

,
Installing nessus on an Ubuntu or any other Linux machine can be a difficult task. So here we bring out a tutorial to ease you out to simplify the task of installing Nessus server. Here we have shown the installation on Ubuntu machine this could be used on nay other debian of linux as well.


The totorial starts here-

Download Nessus Nessus-4.0.1-ubuntu810_amd64.deb for Ubuntu 9.04 from http://www.nessus.org.
dpkg -i Nessus-4.0.1-ubuntu810_amd64.deb
Selecting previously deselected package nessus.
(Reading database … 128086 files and directories currently installed.)
Unpacking nessus (from Nessus-4.0.1-ubuntu810_amd64.deb) …
Setting up nessus (4.0.1) …
nessusd (Nessus) 4.0.1. for Linux
(C) 1998 – 2009 Tenable Network Security, Inc.
– Please run /opt/nessus/sbin/nessus-adduser to add a user
– Register your Nessus scanner at http://www.nessus.org/register/ to obtain
all the newest plugins
– You can start nessusd by typing /etc/init.d/nessusd start
root@testserver:~# /opt/nessus/sbin/nessus-adduser
Login : admin
Authentication (pass/cert) : [pass]
Login password :
Login password (again) :
Do you want this user to be a Nessus ‘admin’ user ? (can upload plugins, etc…) (y/n) [n]: y
User rules
———-
nessusd has a rules system which allows you to restrict the hosts
that admin has the right to test. For instance, you may want
him to be able to scan his own host only.
Please see the nessus-adduser manual for the rules syntax
Enter the rules for this user, and enter a BLANK LINE once you are done :
(the user can have an empty rules set)
Login : admin
Password : ***********
This user will have ‘admin’ privileges within the Nessus server
Rules :
Is that ok ? (y/n) [y] y
User added
Register for home feed.
/opt/nessus/bin/nessus-fetch –register xxxx-xxxx-xxxx-xxxx-xxxxx
/etc/init.d/nessusd start
To run Nessus from the command line you use an option “q” that is for batch mode. This allows running from a terminal and without the GUI interface to the client. Handy if you would like to script or automate your scans.
Using batch mode the IP’s that are to be scanned are read from a file.
echo “192.168.0.1? >> iptoscan.txt
/opt/nessus/bin/nessus -q 127.0.0.1 1241 admin password iptoscan.txt scanresults2.html -T htm
Replace “admin password” in your command with the login and password you chose when you created the user using nessus-adduser.
~$ OpenVAS-Client –help
Usage:
OpenVAS-Client [OPTION...] – client for the OpenVAS security scanner
Help Options:
-?, –help Show help options
–help-all Show all help options
–help-gtk Show GTK+ Options
Application Options:
-v, –version Display version information
-n, –no-pixmap No pixmaps
-q, –batch-mode= Batch-mode scan
-c, –config-file=<.rcfile> Configuration file
-T, –output-type=[nbe|html|text|xml|tex] Output format
-V, –verbose Display status messages in batch mode
-p, –list-plugins Obtain list of plugins installed on the server
-P, –list-prefs Obtain list of server and plugin preferences
-i, –in-report= Input file (report conversion)
-o, –out-report= Output file (report conversion)
-x, –dont-check-ssl-cert Override SSL “paranoia” question preventing OpenVAS-Client from checking certificates
-S, –sqlize-output Issue SQL output for -p and -P (experimental)
-s, –list-sessions= List sessions
-R, –restore-session= Restore session
–display=DISPLAY X display to use


Please do comment if this has been helpful.
by hackiteasy
 

Free Hacking Tools Copyright © 2011 -- Template created by All Premium Accounts -- Powered by Free Premium Accounts