Posts Tagged ‘Networking’
October 12th, 2012
I usually use “setup” to do the firewall setup for permissive or not and setting of SELINUX, etc….
But on a minimal install you don’t have access to setup command, which is my favorite
2 | - bash : setup: command not found |
So how to install it in minimal install ?
1 | yum –y install setuptool |
2 | yum –y install system-config-network* |
3 | yum -y install system-config-firewall* |
4 | yum –y install system-config-securitylevel-tui |
5 | yum –y install system-config-keyboard |
(thanks JoVeN for spell mistake)
For system services utility install ntsysv (as Perico suggested in the user comments)

That’s it….!! Enjoy
August 27th, 2010
Network security is a completely changing area; new devices like IDS (Intrusion
Detection systems), IPS (Intrusion Prevention systems), and Honeypots are modifying the
way people think about security. Companies are spending thousand of dollars on new
security devices, but forgetting the basic, the first line of defense: the border router.
Although a lot of people may think that routers don’t need to be protect, they are
completely wrong. A lot of secure problems appear all time against this kind of device
and most of them are vulnerable. Read the rest of this entry »
August 11th, 2010
010 | if (! defined $src_host or ! defined $src_port or ! defined $dst_host or ! defined $dst_port ) { |
011 | print "Usage: $0 <source host> <source port> <dest host> <dest port>\n" ; |
019 | my $src_host = ( gethostbyname ( $src_host ))[4]; |
020 | my $dst_host = ( gethostbyname ( $dst_host ))[4]; |
022 | socket (RAW, AF_INET, SOCK_RAW, 255) || die $!; |
023 | setsockopt (RAW, 0, 1, 1); |
025 | my ( $packet ) = makeheaders( $src_host , $src_port , $dst_host , $dst_port ); |
026 | my ( $destination ) = pack ( 'Sna4x8' , AF_INET, $dst_port , $dst_host ); |
027 | send (RAW, $packet ,0, $destination ); |
031 | local ( $src_host , $src_port , $dst_host , $dst_port ) = @_ ; |
038 | my $tcp_headerlen = "5" ; |
039 | my $tcp_reserved = 0; |
040 | my $tcp_head_reserved = $tcp_headerlen . |
051 | my $tcp_all = $null . $null . |
052 | $tcp_urg . $tcp_ack . |
053 | $tcp_psh . $tcp_rst . |
054 | $tcp_syn . $tcp_fin ; |
060 | my ( $tcp_pseudo ) = pack ( 'a4a4CCnnnNNH2B8nvn' , |
061 | $tcp_len , $src_port , $dst_port , $syn , $ack , |
062 | $tcp_head_reserved , $tcp_all , $tcp_win , $null , $tcp_urg_ptr ); |
064 | my ( $tcp_checksum ) = &checksum( $tcp_pseudo ); |
069 | my $ip_ver_len = $ip_ver . $ip_len ; |
071 | my ( $ip_tot_len ) = $tcp_len + 20; |
072 | my $ip_frag_id = 19245; |
073 | my $ip_frag_flag = "010" ; |
074 | my $ip_frag_oset = "0000000000000" ; |
075 | my $ip_fl_fr = $ip_frag_flag . $ip_frag_oset ; |
079 | my ( $pkt ) = pack ( 'H2H2nnB16C2na4a4nnNNH2B8nvn' , |
080 | $ip_ver_len , $ip_tos , $ip_tot_len , $ip_frag_id , |
081 | $ip_fl_fr , $ip_ttl , $tcp_proto , $zero_cksum , $src_host , |
082 | $dst_host , $src_port , $dst_port , $syn , $ack , $tcp_head_reserved , |
083 | $tcp_all , $tcp_win , $tcp_checksum , $tcp_urg_ptr ); |
093 | my ( $len_msg , $num_short , $short , $chk ); |
094 | $len_msg = length ( $msg ); |
095 | $num_short = $len_msg / 2; |
097 | foreach $short ( unpack ( "S$num_short" , $msg )) { |
100 | $chk += unpack ( "C" , substr ( $msg , $len_msg - 1, 1)) if $len_msg % 2; |
101 | $chk = ( $chk >> 16) + ( $chk & 0xffff); |
102 | return (~(( $chk >> 16) + $chk ) & 0xffff); |