Archive for the 'Security' Category

 

 

Feb 18 2016

SSH, Default Shell and Command History on AS400

Published by under AS400,SSH

QSHELL and PASE on IBM i are nice tools but remain quite limited with the fixed size 5250 window with no scroll bars. Let’s see how to make it better with a secure SSH connection and a few tricks.  Launch SSH Daemon Considering SSH is installed on your AS400 ie 5733SC1 (OpenSSH, OpenSSL, zlib) in […]

No responses yet

May 06 2015

How to Deny / Force VLAN Access to a Mac Address on Cisco

Published by under Cisco,Security

Different methods exists to filter out mac addresses on a switch such as:– port security,– mac access lists or even– 802.1x port-based authentication with Radius. Mac access ACL require a higher end switch while 802.1x authentication is a pretty heavy setup and needs to manage a mac address database on a Radius server.Port security allows […]

No responses yet

Dec 31 2009

Linux Remote Console from HP iLO Interface

Published by under Linux,SSH

iLO is a management interface supporting SSH, available on HP Proliant servers. It provides interesting features such as remotely powering the server on and off.But it is also possible to access Linux iLO remote console and reboot in single mode from a remote network. How handy is that!?  Enable Serial Console in BIOS While booting […]

2 responses so far

Sep 04 2009

Configure WPA on Linux Howto

Published by under Linux,Security

WPA encryption is not much hassle to set up and is way more secure than WEP if you use a strong pre-shared key.   First off, we’ve got a wifi interface that can be displayed with iwconfig (from the wireless tools): [root@db ~]# iwconfig lo no wireless extensions. eth0 no wireless extensions. ath0 IEEE 802.11g […]

No responses yet

Aug 09 2009

How to crack a WEP key and decrypt live traffic

Published by under Linux,Security

Cracking a WEP key is extremely easy and is a matter of a few seconds. Truth? Pretty much… We are going to decrypt traffic in real time as well without even needing to connect to the wireless access point. All steps will be run under root super-user as interfaces state needs to be changed.  Aircrack Installation […]

One response so far

Next »