As much as I curse RHEL and CentOS shit, there are some things that are invented quite competently. For example, adding a large number of additional IPs is quite a pleasant task. In general, if I have to add a large number of addresses, I would write a bash script in which to perform the operation in question in a loop that it does not work by hand. При Centos/RHEL хората са го измислили доста приятно range файл. В общи линии създаваме файл /etc/sysconfig/network-scripts/ifcfg-eth0-range0. Here we replace eth0 with the name network adapter if it is not eth0. Then we add the following content
A few days ago I came across holynix. This is a distribution prepared for hacking based on someone Ubuntu with apache installed + mind + php and some page. The goal is to exploit the launched applications and services to reach the root rights. Now I will not describe how services and applications break but how to solve the problem with a non-bootable network. I used virtualbox to run holynix v1. I put my image and vision for a new device on my network – I decided to do it like people don't know what the IP to exploit is, but I did not find one. I restarted and removed the silent start and saw, that during network startup roars, that there is not /var / run /network/ifstate. Решението е елементарно трябва при стартиране на мрежата да се провери дали съществуват съответната директория и ако не да се зaдаде и същото за файлът. Това е тривиална операция в/etc/init.d/networking the following are added at the beginning of the start function 2 order
This is a clear solution, however, we do not have a password for the root user 😀 Now follows the fun part and our first hack 😉 To get the root user in the grub menu we need to do some magic. We have to press esc the menu will be displayed shortly before the system starts. Then with E we enter the menu editing mode in the kernel part we finally add init=/bin/bash and we change ro on rw so that the file system has write permissions during installation after taking the root shell.
Then we fix the file for network interfaces. We need to change /etc/network/interfaces to raise eht1 and take dhcp network settings. Because by default it looks for eth0 and we have a new device that will be initialized with eth1. You restart and should now have a new device on your network.
ps A little hint to break the login part in the password field has sql injection 😉 Have a nice laugh
ps 2 I have used it VirtualBox for visualization in bridge mode for the network.
BackTrack 5 was issued on May 10th. For the first time an official version with Gnome probably the pressure of society said its word 🙂 and due to this fact I decided to install it on my EEE 1000H. After all, Gnome is my favorite graphical environment . Just like the 4th version again, the current one is based on Ubuntu 10.04LTS. Which, in my opinion, is not a disadvantage, let's say the target group is lama hahori 😀 . As usual the basic network manager is wicd, which is generally quite pleasant at least in my opinion it is preferred ( when I need 😉 ), but the eee bugs me that it can't connect to unencrypted wireless networks. Quite unpleasant definitely, with your normal Gnome network manager this problem is absent. The situation is already clear, I have a problem and I have a solution.
In general, I will not focus on the installation and removal of the main pitfall that will happen.. Otherwise the previous ones 2 операции по стандартния начин с apt-get или през synaptic както ви е най комфортно. Така споменах за подводен камък и тои е следния заради съдържанието в /etc/network/interfacesnetwork-manager-a cannot initialize your network adapters. You need to comment on everything unnecessary, including settings with IP addresses. After I cleared the contents of mine, something like this happened
auto read th0 wlan0
This solves the problem with the network manager not working.
Pffff I had never played with such big numbers for subnetting. I will not explain the process itself, there is enough written on the net, how the net mask calculates in which position they move 1 and 0 and from there it is already clear where the network part ends and the host part begins. I had a very interesting teasing task 2 /16-that (that is 255.255.0.0) or for the utterly unenlightened 2 x 65534 host address to split them into 2 region with several networks – one with requirements for 32k hosts, 16k host and 8k hosts which in turn had to be divided into more- 4 equals subnets. The second region had a requirement for 4k hosts, 2k host and 1k host, and again like the previous zone each network of 4 equal subnets 😆 In general I'm pretty good at subnetting but I've never played with networks on such a scale. There was a beautiful big calculation, but at least I gained experience with much larger sizes than dividing / 24-ki, which is done calmly in mind. Now all that is left is to scatter the networks on the devices to make the routations and networks to work 😀 hahaha. The diagram with my devices numbered above 30 as I stopped fighting them – beauty 😎
Sunday was my module exam (end of semester 1) за Cisco CCNA Network Fundamentals. Overall, it has been a lot of reading and learning from September until now. In the end, everything went well, but as usual I am dissatisfied – the good thing is that I took the module, it in itself means nothing, or at least not in Bulgaria, although, that I will be issued a certificate that I know all the fundamental truths about networks according to Cisco. I am dissatisfied, that my score is low – 85%. I was hoping for at least 90% but a chance. However, it is not a failure 😆 . I am somewhat satisfied with the beginning of the really pleasant activities that we only briefly broke down – routing protocols and others. All the dry theory that has been taken will be a thing of the past and the big fun with routers and switches will begin..
It's a little strange to me this week for the first time since September I don't have a whole free week to study after work I will wonder what to do, or not 😈
p.s Male Radiohead just killed me – abnormally strong piece. I only heard good reviews for their latest album.