wilo300zx

Members
  • Content count

    43
  • Joined

  • Last visited

Community Reputation

2 Neutral

About wilo300zx

  • Rank
    DDP Fan club member
  • Birthday 08/01/1988

Contact Methods

  • AIM wilodarkart
  • Website URL http://202.87.11.23/
  • ICQ 0

Profile Information

  • Location Australia
  1. Is there a problem with the #binrev irc channel? I keep getting: * Looking up irc.binrev.net * Connecting to irc.binrev.net (69.59.25.198) port 7000... * Connection failed. Error: Connection timed out This is using ssl, the server has been timing out since Sunday, just wondering is something wrong with IRC
  2. I have a problem with ProFTPD. Every time i restart my server, Ubuntu/ProFTPD forgets its passwords. Traditionally i had to go through terminal and reset the passwords using 'sudo passwd (username)' and then i had to enter the password. I know i can link ProFTPD to a SQL database, but i don't know much about SQL and i think this idea would be too difficult for me. My Proftpd server, has 26 users, so it takes a while to manual use terminal to reset the passwords. Is there a way to write a script that will reset all my user passwords upon restart? I also don't want to keep the passwords in this script in plain text just in case my server gets compromised. How can i go about this? I have found a few guides about Linux scripting : http://www.ax697.org/writing-a-basic-ubuntu-script-200786.html but nothing i found useful
  3. Good work with the forums, they look much better then the old ones, good work!

  4. milw0rm is closing up shop

    This is definitely sad news I enjoyed scrolling through milw0rm and browsing through google looking for unpatched http servers... Long live milw0rm. Maybe it may be a good idea for us to mirror the site, maybe download it to a disk to preserve the wealth of knowledge that is offered there? I mean, minus all the video's, the text side of the site wouldn't be much larger then a few hundred MB? Just an idea
  5. Cell Phone Hacking

    I really want to see a tut on here Lattera! I still cant get my emulator to work... and i know im overlooking something stupid. Anyone wanna help me, i cant find any tuts on google, and android website itself only shows how to stop and start the emulator, not how to compile it. :S I dont have Java or Perl installed, could this be a reason why it wont work on my machine?
  6. Cell Phone Hacking

    Im also interested in this. The G1? is that the dream? or is that like the hd touch? i want to get the htc touch hd with cupcake on it, is it easy to do, i had troubles getting my SDK to work, but im bad at compiling shit Much more info needed!
  7. Problems with openvpn

    I am trying to connect my Vista laptop across the internet to a openvpn server. I have openvpn server installed and running on my Ubuntu server. I have openvpn client running on my laptop. I have enabled port forwarding from WAN to LAN on port 1194 on my router I have disabled my firewall on my laptop I cant work out why my client wont connect to my server, i have tried windows vpn client and open vpn client. I have followed these instructions from Ubuntu help: https://help.ubuntu.com/community/OpenVPN This is the log file from my server: ( /var/log/openvpn.log) Options error: --client-config-dir/--ccd-exclusive requires --mode server Use --help for more information. Thu Jun 25 16:27:24 2009 OpenVPN 2.1_rc11 i486-pc-linux-gnu [SSL] [LZO2] [EPOLL] [PKCS11] built on Mar 9 2009 Thu Jun 25 16:27:24 2009 WARNING: --keepalive option is missing from server config Thu Jun 25 16:27:24 2009 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Jun 25 16:27:24 2009 /usr/bin/openssl-vulnkey -q -b 1024 -m <modulus omitted> Thu Jun 25 16:27:25 2009 TUN/TAP device tun0 opened Thu Jun 25 16:27:25 2009 /sbin/ifconfig tun0 10.8.0.1 pointopoint 10.8.0.2 mtu 1500 Thu Jun 25 16:27:25 2009 GID set to nogroup Thu Jun 25 16:27:25 2009 UID set to nobody Thu Jun 25 16:27:25 2009 Listening for incoming TCP connection on [undef]:1194 Thu Jun 25 16:27:25 2009 TCPv4_SERVER link local (bound): [undef]:1194 Thu Jun 25 16:27:25 2009 TCPv4_SERVER link remote: [undef] Thu Jun 25 16:27:25 2009 Initialization Sequence Completed This is the log file from my openvpn client: Thu Jun 25 16:20:23 2009 OpenVPN 2.0.9 Win32-MinGW [SSL] [LZO] built on Oct 1 2006 Thu Jun 25 16:20:23 2009 IMPORTANT: OpenVPN's default port number is now 1194, based on an official port number assignment by IANA. OpenVPN 2.0-beta16 and earlier used 5000 as the default port. Thu Jun 25 16:20:23 2009 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Jun 25 16:20:23 2009 Control Channel Authentication: using 'ta.key' as a OpenVPN static key file Thu Jun 25 16:20:23 2009 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Thu Jun 25 16:20:23 2009 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Thu Jun 25 16:20:23 2009 Control Channel MTU parms [ L:1573 D:166 EF:66 EB:0 ET:0 EL:0 ] Thu Jun 25 16:20:23 2009 Data Channel MTU parms [ L:1573 D:1450 EF:41 EB:4 ET:32 EL:0 ] Thu Jun 25 16:20:23 2009 Local Options hash (VER=V4): '1a647362' Thu Jun 25 16:20:23 2009 Expected Remote Options hash (VER=V4): '47de3ccc' Thu Jun 25 16:20:23 2009 UDPv4 link local: [undef] Thu Jun 25 16:20:23 2009 UDPv4 link remote: x.x.x.x:1194 Thu Jun 25 16:20:23 2009 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Thu Jun 25 16:20:25 2009 TCP/UDP: Closing socket Thu Jun 25 16:20:25 2009 SIGTERM[hard,] received, process exiting Thu Jun 25 16:20:32 2009 OpenVPN 2.0.9 Win32-MinGW [SSL] [LZO] built on Oct 1 2006 Thu Jun 25 16:20:32 2009 IMPORTANT: OpenVPN's default port number is now 1194, based on an official port number assignment by IANA. OpenVPN 2.0-beta16 and earlier used 5000 as the default port. Thu Jun 25 16:20:32 2009 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Jun 25 16:20:32 2009 Control Channel Authentication: using 'ta.key' as a OpenVPN static key file Thu Jun 25 16:20:32 2009 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Thu Jun 25 16:20:32 2009 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Thu Jun 25 16:20:32 2009 Control Channel MTU parms [ L:1573 D:166 EF:66 EB:0 ET:0 EL:0 ] Thu Jun 25 16:20:32 2009 Data Channel MTU parms [ L:1573 D:1450 EF:41 EB:4 ET:32 EL:0 ] Thu Jun 25 16:20:32 2009 Local Options hash (VER=V4): '1a647362' Thu Jun 25 16:20:32 2009 Expected Remote Options hash (VER=V4): '47de3ccc' Thu Jun 25 16:20:32 2009 UDPv4 link local: [undef] Thu Jun 25 16:20:32 2009 UDPv4 link remote: x.x.x.x:1194 Thu Jun 25 16:20:32 2009 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Thu Jun 25 16:20:35 2009 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Thu Jun 25 16:20:37 2009 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Thu Jun 25 16:20:39 2009 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Any ideas whats going on here? I have googled "ead UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)" and found a few hits about UDP flooding, and i have tried using tcp on the server and client to counteract that, no such luck. I have restarted both machines and servcies. Still no luck. Can anyone else think of anything im doing wrong? Also this is my server conf file: dev tun proto tcp port 1194 ca /etc/openvpn/easy-rsa/keys/ca.crt cert /etc/openvpn/easy-rsa/keys/server.crt key /etc/openvpn/easy-rsa/keys/server.key dh /etc/openvpn/easy-rsa/keys/dh1024.pem user nobody group nogroup server 10.8.0.0/24 255.255.255.0 keepalive 10 120 persist-key persist-tun #status openvpn-status.log #verb 3 client-to-client push "redirect-gateway def1" log-append /var/log/openvpn.log comp-lzo
  8. Getting Certified

    Well thanks for the replies! This was exactly the sort of information i was after. I think i might start out with Comptia A+, Net then do my CCNA. I ordered myself a "starter kit" from CiscoKits.com: http://www.ciscokits.com/cisco-dual-2501-8...outer-ccna-kit/ I just want the routers to screw around on until im prepared for the CCNA. How many hours of study are needed for the Comptia A+ and Net? I have heard i need to allow for about 40 hours for the CCNA. I have also ordered from Amazon, Network Warrior and Linux Administration: A Beginner's Guide. I really want to get into security, voip and wireless, so i guess after CCNA, i could go Comptia Security, Linux and CCNA voice and wireless Thanks once again, much appreciated.
  9. Just wondering if anyone has successfully installed Google mobile phone platform Android onto a HTC Touch HD? I know a few people on the IRC channel, have got the HTC Touch HD, but i was wondering who has tried or has Android running on their touch hd. I am currently using the Palm Treo 750 with Windows 6 on it need i say more? Apparently the HTC Touch HD does not ship with the Android O.S but some people have attempted to port it. I know the HTC dream a and magic have Android but these phones are crap in comparison to the touch hd. I really like the Touch HD but i dont want it with WinMo on it, ill buy a iphone before i buy a WinMo phoen again. SO who has done it, can it be done, and has anyone run android in a vm? http://source.android.com/download I was thinking of trialing the mobile platform in VMware, would this work? Sorry about all the questions
  10. Problem with Fail2Ban

    n3xg3n thanks, that worked a charm! I feel so stupid, bad formatting and my seemingly inability to use google is my downfall I have had the fail2ban working for about 3 hours now and already have 7 blocked ip's, 4 against my ftp service and 3 against my ssh service. So much kiddie script shit out there... Would it be worth while implementing a IDS?
  11. Problem with Fail2Ban

    Now when i restart the service and i go to check my fail2ban.log files i get a entry full of this fail2ban.server : ERROR Unexpected communication error I know fail2ban is working for SSH: 2009-06-03 16:14:35,291 fail2ban.actions: WARNING [ssh] Ban 202.169.224.202 But its not working for proftpd, i have tried a few times, any ideas? These are the errors i get on the fail2ban log's: 2009-06-03 16:14:33,277 fail2ban.server : INFO Exiting Fail2ban 2009-06-03 16:14:33,808 fail2ban.server : INFO Changed logging target to /var/log/fail2ban.log for Fail2ban v0.8.3 2009-06-03 16:14:33,809 fail2ban.jail : INFO Creating new jail 'ssh' 2009-06-03 16:14:33,810 fail2ban.jail : INFO Jail 'ssh' uses poller 2009-06-03 16:14:33,847 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:33,848 fail2ban.filter : INFO Added logfile = /var/log/auth.log 2009-06-03 16:14:33,849 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:33,850 fail2ban.filter : INFO Set maxRetry = 6 2009-06-03 16:14:33,850 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:33,852 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:33,853 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:33,854 fail2ban.filter : INFO Set findtime = 600 2009-06-03 16:14:33,855 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:33,855 fail2ban.actions: INFO Set banTime = 600 2009-06-03 16:14:33,856 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:33,867 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:33,874 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:33,881 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:33,889 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:33,897 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:33,907 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:33,919 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:33,933 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:33,950 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:33,967 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:33,986 fail2ban.jail : INFO Creating new jail 'apache' 2009-06-03 16:14:33,986 fail2ban.jail : INFO Jail 'apache' uses poller 2009-06-03 16:14:33,988 fail2ban.filter : INFO Added logfile = /var/log/apache2/other_vhosts_access.log 2009-06-03 16:14:33,989 fail2ban.filter : INFO Added logfile = /var/log/apache2/access.log 2009-06-03 16:14:33,991 fail2ban.filter : INFO Set maxRetry = 6 2009-06-03 16:14:33,994 fail2ban.filter : INFO Set findtime = 600 2009-06-03 16:14:33,995 fail2ban.actions: INFO Set banTime = 600 2009-06-03 16:14:34,000 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,003 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,004 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,005 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,007 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,008 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,010 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,011 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,012 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,014 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,015 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,016 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,018 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,020 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,022 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,023 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,024 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,026 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,027 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,028 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,029 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,030 fail2ban.jail : INFO Creating new jail 'proftpd' 2009-06-03 16:14:34,030 fail2ban.jail : INFO Jail 'proftpd' uses poller 2009-06-03 16:14:34,032 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,033 fail2ban.filter : INFO Added logfile = /var/log/proftpd/proftpd.log 2009-06-03 16:14:34,034 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,034 fail2ban.filter : INFO Set maxRetry = 6 2009-06-03 16:14:34,035 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,036 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,038 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,038 fail2ban.filter : INFO Set findtime = 600 2009-06-03 16:14:34,039 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,040 fail2ban.actions: INFO Set banTime = 600 2009-06-03 16:14:34,041 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,044 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,047 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,051 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,054 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,055 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,057 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,058 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,060 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,061 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,062 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,064 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,065 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,066 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,068 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,070 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,072 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,073 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,074 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,076 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,077 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,078 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,080 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,081 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,156 fail2ban.jail : INFO Jail 'ssh' started 2009-06-03 16:14:34,162 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,240 fail2ban.jail : INFO Jail 'apache' started 2009-06-03 16:14:34,241 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:34,290 fail2ban.jail : INFO Jail 'proftpd' started 2009-06-03 16:14:34,344 fail2ban.server : ERROR Unexpected communication error 2009-06-03 16:14:35,291 fail2ban.actions: WARNING [ssh] Ban 202.169.224.202 Also this is my iptables, i can see one person has been blocked, but why dont people on ftp that i know are brute forcing, not getting blocked? infotech@infotechserver:/etc/fail2ban$ sudo iptables -L Chain INPUT (policy ACCEPT) target prot opt source destination fail2ban-proftpd tcp -- anywhere anywhere multiport dports ftp fail2ban-apache tcp -- anywhere anywhere multiport dports www fail2ban-ssh tcp -- anywhere anywhere multiport dports ssh Chain FORWARD (policy ACCEPT) target prot opt source destination Chain OUTPUT (policy ACCEPT) target prot opt source destination Chain fail2ban-apache (1 references) target prot opt source destination RETURN all -- anywhere anywhere Chain fail2ban-proftpd (1 references) target prot opt source destination RETURN all -- anywhere anywhere Chain fail2ban-ssh (1 references) target prot opt source destination DROP all -- host-202-169-224-202.jmn.net.id anywhere RETURN all -- anywhere anywhere
  12. Problem with Fail2Ban

    Wow, it appears that the '[' was the cause of all that debugger crap in terminal. I removed the '[' and restarted the service, all is good. When i saw 14 lines of code saying error i thought i must have deleted half of its dependacies. Also, the reason im implementing the fail2ban policy is that the attack happens for about 5 hours a day, and even though i use alpha numeric user names, and alpha-numberic-symbol passwords, i hate the thought of someone trying to crack my systems >.< Failing this, i may have to invest in some defensive enumeration on thie Madrid jerk, teach the kiddie script a lesson infotech@infotechserver:/etc/fail2ban$ sudo /etc/init.d/fail2ban restart [sudo] password for infotech: * Restarting authentication failure monitor fail2ban [ OK ]
  13. Problem with Fail2Ban

    As you may have gathered on our #Binrev channel i have been receiving numerous brute force attempts against my Proftpd server. Its for public use so i cant change the default ftp port. I have added numerous IP's to the Beny All section of proftpd.conf but its a battle that cant be won. I think someone on #Binrev suggested i should install fail2ban on the server, so i have done that and now i'm having trouble trying to get it to work. I was following this documentation: fail2ban article But i cant seem to get it to work. I am running Ubuntu Server 9.04, and i am aware that the article was written for a older version of Ubuntu, but i figured that it should still work, as all the parameters to the service log files all remain the same. I have the latest version of fail2ban 8.1 and i have modified the fail2ban.local and fail2ban.conf file accordingly to what i need. I want to be able to stop brute forces against my postfix, apache and proftps deamons. This is my configuration file: [DEFAULT] ignoreip = 127.0.0.1 xxx.xx.xx.xxx bantime = 600 maxretry = 3 # "backend" specifies the backend used to get files modification. backend = polling # Destination email address used to email about attacks destemail = xxxx@xxx.com # ACTIONS # Default banning action banaction = iptables-multiport # email action. mta = sendmail # Default protocol protocol = tcp # Action shortcuts. To be used to define action parameter # The simplest action to take: ban only action_ = %(banaction)s[name=%(__name__)s, port="%(port)s", protocol="%(protocol)s] # ban & send an e-mail with whois report to the destemail. action_mw = %(banaction)s[name=%(__name__)s, port="%(port)s", protocol="%(protocol)s] %(mta)s-whois[name=%(__name__)s, dest="%(destemail)s", protocol="%(protocol)s] # ban & send an e-mail with whois report and relevant log lines # to the destemail. action_mwl = %(banaction)s[name=%(__name__)s, port="%(port)s", protocol="%(protocol)s] %(mta)s-whois-lines[name=%(__name__)s, dest="%(destemail)s", logpath=%(logpath)s] # Choose default action. To change, just override value of 'action' with the # interpolation to the chosen action shortcut (e.g. action_mw, action_mwl, etc) in jail.local # globally (section [DEFAULT]) or per specific section action = %(action_mwl)s [ssh] enabled = true port = ssh filter = sshd logpath = /var/log/auth.log maxretry = 6 [apache] enabled = true port = http filter = apache-auth logpath = /var/log/apache*/*access.log maxretry = 6 [proftpd] enabled = true port = ftp filter = proftpd logpath = /var/log/proftpd/proftpd.log maxretry = 6 [ This is the error i get when i try and restart the fail2ban service: infotech@infotechserver:/etc/fail2ban$ sudo /etc/init.d/fail2ban restart * Restarting authentication failure monitor fail2ban Traceback (most recent call last): File "/usr/bin/fail2ban-client", line 401, in <module> if client.start(sys.argv): File "/usr/bin/fail2ban-client", line 370, in start return self.__processCommand(args) File "/usr/bin/fail2ban-client", line 180, in __processCommand ret = self.__readConfig() File "/usr/bin/fail2ban-client", line 374, in __readConfig self.__configurator.readAll() File "/usr/share/fail2ban/client/configurator.py", line 58, in readAll self.__jails.read() File "/usr/share/fail2ban/client/jailsreader.py", line 41, in read ConfigReader.read(self, "jail") File "/usr/share/fail2ban/client/configreader.py", line 59, in read SafeConfigParserWithIncludes.read(self, [bConf, bLocal]) File "/usr/share/fail2ban/client/configparserinc.py", line 105, in read fileNamesFull += SafeConfigParserWithIncludes.getIncludes(filename) File "/usr/share/fail2ban/client/configparserinc.py", line 76, in getIncludes parser.read(resource) File "/usr/lib/python2.6/ConfigParser.py", line 286, in read self._read(fp, filename) File "/usr/lib/python2.6/ConfigParser.py", line 510, in _read raise e ConfigParser.ParsingError: File contains parsing errors: /etc/fail2ban/jail.local [line 74]: '[\n' [fail] Any ideas what i am doing wrong? i have tried google'ling for the answer but i dont get any answers.
  14. This is purely for experiment to demonstrate as part of my 'Identity Theft' presentation - In no means will any of this code/script or any materials be available to the general public I am currently studying Bach of I.T at Uni this year and our current topic on 'user information and storage - identity theft' has me thinking. We have to give a presentation on identity theft and how human society can be manipulated and/or exploited for a predetermined outcome. I was going to talk about social engineering using phone calls/emails etc relating to the likes of Kevin Mitnick but then i thought about the idea of phishing. Phishing is a combination of social engineering and human carelessness. So i thought, ill show, in person, how a common social networking website like Facebook and its millions of users can be exploited through their incompetencies and laziness. I done some research, got a rough picture in my head where i was going with this and if at all, this could be done within reason. In theory the page should operate similar to this: http://my.opera.com/coxy/blog/2007/11/24/f...k-phishing-scam I also want to be able to hand craft a email to look and act like a legitimate email from Facebook. So the test subject will receive a email from facebook.com "some kind of notification" So i think this is how someone could go about this: 1) Create a fake Facebook domain; something like : http://www.facebook.com/au/login.php/somephpidstring. 2) Capture the current php login page from Facebook and duplicate it on my own domain. 3) Create a https page for fake authenitifcation. 4) Setup some kinda of database or back end logging script to record the data submitted into the login script. 5) Crete some .htacess redirect to submit the user's input directly into the legitimate facebook and complete the rest of the login process 6) Test login process 7) Forge a sample email claiming to be from "facebook.com" with some kind of notification "person x has commented on your photo... etc etc" 8) Ensure the email appears to be from facebook using their legitimate domain etc Amy i on the right track with this? Note: this is all "hypothetically speaking"
  15. Getting Certified

    Looking at doing some network and security certificates. I am looking at doing CCNA as i work for a small wireless broadband ISP. I have been doing some research into CCNA, and i have found this website: CCNA Kits.com That looks pretty good value for me, i am in Australia, but still getting that shipped to Australia and the currency conversion would still get me the kit for around $250. I know you can get the emulators, but i figured the physical routers would be better, plus you can never have enough routers and switches The other certs i have been looking at were: CompTIA A+, Security and Linux Maybe even MCSE and/or MCITP in the long term. What would you suggest/what have you done? Any help on this matter would be greatly appreciated.