Guides

RFID Thief v2.0
avatar

This is an interesting project that shows you how you can create a long range RFID reader.  This is another reason why wireless, no matter how short the range, is insecure.

 

Source: RFID Thief v2.0 – scund00r

Posted in Hacks | Leave a comment

Using iptables to route OpenVPN traffic
avatar

To have your vpn traffic be able to reach the internet you just need to add the following iptable rules:

iptables -A FORWARD -i tun0 -j ACCEPT
iptables -A FORWARD -i tun0 -o eth0 -m state –state RELATED,ESTABLISHED -j ACCEPT
iptables -A FORWARD -i eth0 -o tun0 -m state –state RELATED,ESTABLISHED -j ACCEPT
iptables -t nat -A POSTROUTING -s 192.168.0.0/24 -o eth0 -j MASQUERADE

This would take the tunnel adapter of tun0 and route the traffic through eth0 for the vpn subnet of 192.168.0.0.

Posted in Arch, CentOS, Fedora, Guides, Linux, Networking | Tagged , | Leave a comment

NTFS permissions for Redirected Folders (or Home Directories) | Off Campus
avatar

Source: NTFS permissions for Redirected Folders (or Home Directories) | Off Campus

Posted in Guides | Leave a comment

Maltrail – Malicious Traffic Detection System
avatar

A malicious traffic detection system which can be deployed on your network with ease.

https://www.latesthackingnews.com/maltrail-malicious-traffic-detection-system/

Posted in Linux, Networking | Tagged | Leave a comment

Linux: Keep An Eye On Your System With Glances Monitor
avatar

 

 

This is a simple to install script which will make monitoring you system in real-time very easy.

 

Source: Linux: Keep An Eye On Your System With Glances Monitor

Posted in Linux | Leave a comment