Suramya's Blog : Welcome to my crazy life…

May 8, 2005

Monitor Per protocol/port bandwidth usage

Filed under: Security Tools,Tech Related — Suramya @ 4:16 AM

These programs will generate a per protocol/port bandwidth usage information on a given server:

flowscan

www.ntop.org

– Suramya

May 7, 2005

How to log shell sessions?

Filed under: Security Tools,Tech Related — Suramya @ 4:11 AM

Use a program called script, it makes a typescript of terminal session, meaning it logs everything printed on your terminal. Use `man script` to get more information about it.

– Suramya

How to see which programs are opening ports

Filed under: Computer Security,Security Tools,Tech Related — Suramya @ 4:02 AM

These tools will help you identify which programs are opening what ports on the system.

1. lsof | grep ‘IPv.’

lsof shows the list of open files, piping it through grep and searching for IPv will give you a list of ports used by a program

lsof -i TCP:<PORT>

where PORT is the one you need to know about the program behind it.

2. netstat -anp

Should display open ports, machines connected to the ports as well as which application has that port open.

If you know of any other ways let me know.

– Suramya

May 5, 2005

Remove Backgrounds from images using GIMP

Filed under: Computer Software,Tech Related,Tutorials — Suramya @ 7:04 PM

Newsforge has a good article that explains how to remove the background from an image using GIMP.

Article: Remove Background from images

The Coroner Toolkit

Linux Magazine has a really good article on The Coroner Tool kit which allows a sysadmin to perform forensics analysis on a compromized system.

Article: Linux Magazine
The Coroner Toolkit: Download Page

– Suramya

How to use Netcat

Filed under: Computer Software,Tech Related,Tutorials — Suramya @ 5:19 AM

Often referred to as the ‘Swiss Army Knife of networking,’ netcat is a tool that administrators can use to read and write TCP or UDP data across the network. In addition, it’s extremely useful for network debugging and testing. This article by Vincent Danen at techrepublic.com covers some of the uses of netcat.

– Suramya

April 28, 2005

Forum on computer security

Filed under: Computer Security,Tech Related — Suramya @ 3:11 PM

Cool forum that touches on every aspect of computer security:

security-forums.com

April 27, 2005

Detecting suspicious network traffic with psad

Filed under: Security Tools,Tech Related — Suramya @ 2:21 PM

These are light weight tools that alert you to suspicious network activity by analyzing iptables log files. This article contains information on how to install and configure psad.

– Suramya

April 25, 2005

LDAP Related sites

Filed under: Computer Software,Tech Related — Suramya @ 4:37 PM

LDAP GUI Client: http://luma.sourceforge.net/download.html
Using OpenLDAP: http://www.metaconsultancy.com/whitepapers/ldap.htm

– Suramya

April 24, 2005

Allow non administrators to run Autocad etc

Filed under: Computer Security,Tech Related — Suramya @ 4:58 AM

Some applications like autocad require the current user to be logged in as an administrator in order to use them and as you can imagine thats not a good idea. Esp if this makes you give admin access to users who are likely to install random software and otherwise mess up a perfectly good system.

To avoid this situation follow the following instructions by Anomic Anomaly posted on the Security Basics mailing list:

1. Grab ‘FileMon’ and ‘RegMon’ (both free) from SysInternals
2. Run AutoCad and monitor the changes made to the filesystem and registry.
3. Modify permissions only on those specific areas and give the user access to them
4. Watch your users happily run AutoCad as a User.

– Suramya

« Newer PostsOlder Posts »

Powered by WordPress