Friday, June 1, 2012

Recovery Password Root Linux and Some Efforts to Prevention (Update 06-08-12)




How to recovery or change back password root? Sometimes we almost forget about root password or maybe the account suddenly change unexpectedly. With this article, i try figured out the ways to change password root. I set the tips sort from the easier what we can do, with hope this article maybe more can help you (as the reader) when we want change password root.

1. Change Password Root from Bootloader

This is the first step easier to change password root. From the pictures below, the bootloader consist of Grub2, Grub, and Lilo. We can edit/add some script (with rw init=/bin/bash) and execute them. Feel free to see the pictures below.

Monday, February 27, 2012

[Solved] Fatal: Setup Length Exceeds 31 Maximum; Kernel Setup will Overwrite Boot Loader



I have Arch Linux and Backtrack on my laptop. Both of them I think now are the harmonious couple.. I installed more 1 OS (dual boot), because dual boot is more secure than single boot. When 1 OS suddenly get error, we can use other OS for work. There is no guarantee when we use just 1 OS that there is no error, so when work we couldn't calm used just 1 OS.

After we have dual boot (or maybe multi boot), we can manage it from boot loader. The boot loader is the first software program that runs when a computer starts. It is responsible for loading and transferring control before initiating the boot process to the Operation System which we choose. The boot loader consists of GRUB, GRUB2, LILO, or Syslinux.

Friday, December 30, 2011

Mempersiapkan Migrasi Laptop ke Open Source

Sejak ditetapkannya batas sampai akhir 2011, semua instansi pemerintah tidak boleh lagi menggunakan perangkat lunak (software) ilegal. Banyak instansi pemerintah terutama akhir-akhir ini memigrasikan sistem operasi nya ke open source. Latar belakangnya yaitu deklarasi bersama 5 menteri menuju Indonesia Go Open Source (IGOS) pada tahun 2004 oleh Menteri Riset dan Teknologi, Menteri Komunikasi dan Informasi, Menteri Pendayagunaan Aparatur Negara, Menteri Kehakiman dan HAM, serta Menteri Pendidikan Nasional.

Hal ini ditegaskan kembali dengan surat edaran Kementerian Pendayagunaan Aparatur Negara nomor SE/01/03/M.PAN/2009 tentang pemanfaatan perangkat lunak legal dan OSS. Intinya adalah, pertama seluruh instansi pemerintah diwajibkan menggunakan perangkat lunak open source atau legal. Kedua, melakukan monitoring penggunaan perangkat lunak open source atau legal. Ketiga, batas waktu migrasi pada akhir 2011.

Saturday, October 29, 2011

Sharing Internet Modem via Lan on Backtrack (Linux)



To get internet form other computer, first we set our ip, gateway and DNS in our computer.

The text which blue color is our computer (computer A). And the red color is the other computer which connect to the internet (computer I).

1. First, in computer I we look for network information about ppp0.

# ifconfig ppp0
ppp0 Link encap:Point-to-Point Protocol
inet addr:10.77.221.111 P-t-P:192.168.11.10 Mask:255.255.255.255
UP POINTOPOINT RUNNING NOARP MULTICAST MTU:1500 Metric:1
RX packets:21275 errors:4 dropped:0 overruns:0 frame:0
TX packets:21823 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:3
RX bytes:24204058 (24.2 MB) TX bytes:2716284 (2.7 MB)


The conclusion, ip ppp0 computer I is 10.77.221.111.

Thursday, August 25, 2011

The Power of Chroot



First step, we check about partition harddisk,

# fdisk -l

And then,

# mkdir /mnt/mount-path
# mount /dev/sdax /mnt/mount-path
# mount -t proc /proc /mnt/mount-path/proc
# mount -t sysfs /sys /mnt/mount-path/sys
# mount -o bind /dev /mnt/mount-path/dev
# chroot /mnt/mount-path /bin/bash


Now, chroot finished on /mnt/mount-path. For example, to install grub,

# grub-install /dev/sda
# grub-install /dev/sdax


or

# grub-install --root-directory=/mnt/mount-path /dev/sda

For install lilo,
# liloconfig

or just type

# lilo


Friday, July 29, 2011

Conky: Tool for Help Monitoring System (Update 02-17-12)



This is my conky, that help me very much to know about informations from the system. To get it, just install with:

$ sudo apt-get install conky feh

Now, create a file .conkyrc in ~/.conkyrc and fill in with codes which you like. By the way, we can save the code in other place and call it with "conky -c your-file-conky".

For documentations about conky, check this first, http://conky.sourceforge.net/screenshots.html and you won't be disappointed to use it. Hopefully..

Monday, July 25, 2011

Gaining Backdoor Through Sql



1. We go to see DVWA sql injection blind, and the link is:
http://192.168.56.101/dvwa/vulnerabilities/sqli_blind/