Command Shell

1. Menampilkan semua IP dalam shell : $ /sbin/ ifconfig
| grep inet
2. Mematikan proses dalam shell : $ kill -9 (nomor PID)
3. Melihat daftar file dalam direktori : $ ls -la
4. Mencari direktori yang ada permittion : $ find / –
type d -perm 777
5. Menjadikan file read only : $ chmod 755
6. Download file : $ wget (website)
7. Download file : $ curl -o (website)
8. Download file : $ lwp- download (website)
9. Memeriksa posisi direktori kita bekerja : $ pwd
10. Masuk ke direktori : $ cd (nama direktori)
11. Menampilkan semua file yg tersembunyi
(drwxrwxrwx) : $ ls -FRla | grep drwxrwxrwx
12. Mencari isi direktori : $ find . -name [nama
direktori] -print
13. Mencari semua ID nobody : $ find / -name *gz* –
user nobody
14. Menampilkan proses background : $ ps -x
15. Menampilkan semua proses background : $ ps -ax
16. Mengganti nama file ato direktori : $ mv (nama
file/dir) (nama file/dir baru)
17. Mencari proses file secara spesifikasi : $ find |
grep (nama file)
18. Menghapus history : $ history -c
19. Menghapus logs history :
$ rm -f /.bash_history / root .bash_history /var/
log/messages
20. Extract file zip : $ tar – zxvf (nama file)
21. Membuat file zip hanya dengan target file/
direktori :
$ tar -zcf (nama file zip) (nama target zip)
22. Membuat file zip dengan target seluruh isi
direktori : $ tar -zcf (nama file zip) (*)

Advertisements

Install Aplikasi Backtrack di Ubuntu

Untuk pengguna Ubuntu yang mau coba aplikasi backtrack….
Untuk pengguna Ubuntu yg pengen coba aplikasi backtrack….!!!
1. Edit file sources.list
#sudo gedit /etc/apt/sources.list
2. Tambahkan repository backtrack
deb http://archive.offensive-security.com pwnsauce main microverse macroverse restricted universe multiverse
3. Lalu Add Key melalui terminal
#sudo wget -q http://archive.offensive-security.com/backtrack.gpg -O- | sudo apt-key add –
4. Perbarui daftar paket:
#sudo apt-get update
5. Install aplikasi backtrack
#sudo apt-get install nama-aplikasi-backtrack

List Aplikasi

 1.1 Information Gathering
o 1.1.1 0trace 0.01
o 1.1.2 Ass
o 1.1.3 dig
o 1.1.4 DMitry
o 1.1.5 DNS-Ptr
o 1.1.6 dnstracer 1.5
o 1.1.7 dnswalk
o 1.1.8 dns-bruteforce
o 1.1.9 dnsenum
o 1.1.10 dnsmap
o 1.1.11 DNSPredict
o 1.1.12 Finger Google
o 1.1.13 Firewalk
o 1.1.14 Fport 2.0 (Windows Executable)
o 1.1.15 Goog Mail Enum
o 1.1.16 Google-search
o 1.1.17 Googrape
o 1.1.18 Gooscan
o 1.1.19 Host
o 1.1.20 InTrace 1.3
o 1.1.21 Itrace
o 1.1.22 Maltego 2.0
o 1.1.23 Metagoofil 1.4
o 1.1.24 Mbenum 1.5.0 (Windows Executable)
o 1.1.25 Netenum
o 1.1.26 Netmask
o 1.1.27 Nmbscan 1.2.4
o 1.1.28 Protos
o 1.1.29 PsTools (Windows Executables)
+ 1.1.29.1 PsInfo
+ 1.1.29.2 PsFile
+ 1.1.29.3 PsList
+ 1.1.29.4 PsGetSID
+ 1.1.29.5 PsLoggedOn
+ 1.1.29.6 PsLogList
o 1.1.30 PStoreView 1.0 (Windows Binary)
o 1.1.31 QGoogle
o 1.1.32 Relay Scanner
o 1.1.33 SMTP-Vrfy
o 1.1.34 Subdomainer 1.3
o 1.1.35 TCPtraceroute 1.5beta7
o 1.1.36 TCtrace
o 1.1.37 Whoami (Windows Executable)
* 1.2 Network Mapping
o 1.2.1 Amap 5.2
o 1.2.2 Angry IP Scanner (ipscan) 3.0-beta3
o 1.2.3 Autoscan 0.99_R1
o 1.2.4 Fierce 0.9.9 beta 03/24/07
o 1.2.5 Fping
o 1.2.6 Genlist
o 1.2.7 Hping
o 1.2.8 Hping2 2.0.0-rc3
o 1.2.9 Hping3 3.0.0-alpha-1
o 1.2.10 IKE-Scan
o 1.2.11 IKEProbe
o 1.2.12 Netcat 0.7.1
o 1.2.13 Netdiscover
o 1.2.14 Nmap
o 1.2.15 NmapFE
o 1.2.16 P0f
o 1.2.17 PSK-Crack
o 1.2.18 Ping
o 1.2.19 Protos
o 1.2.20 ScanLine 1.01 (Windows Executable)
o 1.2.21 Scanrand
o 1.2.22 SinFP
o 1.2.23 Umit
o 1.2.24 UnicornScan
o 1.2.25 UnicornScan pgsql 0.4.6e module version 1.03
o 1.2.26 XProbe2
o 1.2.27 PBNJ 2.04
+ 1.2.27.1 OutputPBNJ
+ 1.2.27.2 ScanPBNJ
o 1.2.28 Zenmap 4.60
* 1.3 Vulnerability Identification
o 1.3.1 Absinthe
o 1.3.2 Bed
o 1.3.3 CIRT Fuzzer
o 1.3.4 Checkpwd
o 1.3.5 Cisco Auditing Tool
o 1.3.6 Cisco Enable Bruteforcer
o 1.3.7 Cisco Global Exploiter
o 1.3.8 Cisco OCS Mass Scanner
o 1.3.9 Cisco Scanner
o 1.3.10 Cisco Torch
o 1.3.11 Curl
o 1.3.12 Fuzzer 1.2
o 1.3.13 GFI LanGuard 2.0
o 1.3.14 GetSids
o 1.3.15 HTTP PUT
o 1.3.16 Halberd
o 1.3.17 Httprint
o 1.3.18 Httprint GUI
o 1.3.19 ISR-Form
o 1.3.20 Jbrofuzz
o 1.3.21 List-Urls
o 1.3.22 Lynx
o 1.3.23 Merge Router Config
o 1.3.24 Metacoretex
o 1.3.25 Metoscan
o 1.3.26 Mezcal HTTP/S
o 1.3.27 Mibble MIB Browser
o 1.3.28 Mistress
o 1.3.29 Nikto
o 1.3.30 OAT
o 1.3.31 Onesixtyone
o 1.3.32 OpenSSL-Scanner
o 1.3.33 Paros Proxy
o 1.3.34 Peach
o 1.3.35 RPCDump
o 1.3.36 RevHosts
o 1.3.37 SMB Bruteforcer
o 1.3.38 SMB Client
o 1.3.39 SMB Serverscan
o 1.3.40 SMB-NAT
o 1.3.41 SMBdumpusers
o 1.3.42 SMBgetserverinfo
o 1.3.43 SNMP Scanner
o 1.3.44 SNMP Walk
o 1.3.45 SQL Inject
o 1.3.46 SQL Scanner
o 1.3.47 SQLLibf
o 1.3.48 SQLbrute
o 1.3.49 Sidguess
o 1.3.50 Smb4K
o 1.3.51 Snmpcheck
o 1.3.52 Snmp Enum
o 1.3.53 Spike
o 1.3.54 Stompy
o 1.3.55 SuperScan
o 1.3.56 TNScmd
o 1.3.57 Taof
o 1.3.58 VNC_bypauth
o 1.3.59 Wapiti
o 1.3.60 Yersinia
o 1.3.61 sqlanlz
o 1.3.62 sqldict
o 1.3.63 sqldumplogins
o 1.3.64 sqlquery
o 1.3.65 sqlupload
* 1.4 Penetration
o 1.4.1 Framework3-MsfC
o 1.4.2 Framework3-MsfUpdate
o 1.4.3 Framework3-Msfcli
o 1.4.4 Framework3-Msfweb
o 1.4.5 Init Pgsql (autopwn)
o 1.4.6 Milw0rm Archive
o 1.4.7 MsfCli
o 1.4.8 MsfConsole
o 1.4.9 MsfUpdate
o 1.4.10 OpenSSL-To-Open
o 1.4.11 Pirana
o 1.4.12 Update Milw0rm
* 1.5 Privilege Escalation
o 1.5.1 Ascend attacker
o 1.5.2 CDP Spoofer
o 1.5.3 Cisco Enable Bruteforcer
o 1.5.4 Crunch Dictgen
o 1.5.5 DHCPX Flooder
o 1.5.6 DNSspoof
o 1.5.7 Driftnet
o 1.5.8 Dsniff
o 1.5.9 Etherape
o 1.5.10 EtterCap
o 1.5.11 File2Cable
o 1.5.12 HSRP Spoofer
o 1.5.13 Hash Collision
o 1.5.14 Httpcapture
o 1.5.15 Hydra
o 1.5.16 Hydra GTK
o 1.5.17 ICMP Redirect
o 1.5.18 ICMPush
o 1.5.19 IGRP Spoofer
o 1.5.20 IRDP Responder
o 1.5.21 IRDP Spoofer
o 1.5.22 John
o 1.5.23 Lodowep
o 1.5.24 Mailsnarf
o 1.5.25 Medusa
o 1.5.26 Msgsnarf
o 1.5.27 Nemesis Spoofer
o 1.5.28 NetSed
o 1.5.29 Netenum
o 1.5.30 Netmask
o 1.5.31 Ntop
o 1.5.32 PHoss
o 1.5.33 PackETH
o 1.5.34 Rcrack
o 1.5.35 SIPdump
o 1.5.36 SMB Sniffer
o 1.5.37 Sing
o 1.5.38 TFTP-Brute
o 1.5.39 THC PPTP
o 1.5.40 TcPick
o 1.5.41 URLsnarf
o 1.5.42 VNCrack
o 1.5.43 WebCrack
o 1.5.44 Wireshark
o 1.5.45 Wireshark Wifi
o 1.5.46 WyD
o 1.5.47 XSpy
o 1.5.48 chntpw
* 1.6 Maintaining Access
o 1.6.1 3proxy
o 1.6.2 Backdoors
o 1.6.3 Matahari
o 1.6.4 CryptCat
o 1.6.5 HttpTunnel Client
o 1.6.6 HttpTunnel Server
o 1.6.7 ICMPTX
o 1.6.8 Iodine
o 1.6.9 NSTX
o 1.6.10 Privoxy
o 1.6.11 ProxyTunnel
o 1.6.12 Rinetd
o 1.6.13 TinyProxy
o 1.6.14 sbd
o 1.6.15 socat
* 1.7 Covering Tracks
o 1.7.1 Housekeeping
* 1.8 Radio Network Analysis
o 1.8.1 802.11 WIFI
+ 1.8.1.1 AFrag
+ 1.8.1.2 ASLeap
+ 1.8.1.3 aircrack-ng
+ 1.8.1.4 airdecap-ng
+ 1.8.1.5 aireplay-ng
+ 1.8.1.6 airmon-ng
+ 1.8.1.7 Airpwn
+ 1.8.1.8 AirSnarf
+ 1.8.1.9 airbase-ng
+ 1.8.1.10 airodump-ng
+ 1.8.1.11 Airoscript
+ 1.8.1.12 Airsnort
+ 1.8.1.13 CowPatty
+ 1.8.1.14 FakeAP
+ 1.8.1.15 Hotspotter
+ 1.8.1.16 Karma
+ 1.8.1.17 Kismet
+ 1.8.1.18 MDK3
+ 1.8.1.19 MacChanger
+ 1.8.1.20 WifiTap
+ 1.8.1.21 Wicrawl
+ 1.8.1.22 WifiZoo
+ 1.8.1.23 Wlassistant
+ 1.8.1.24 SpoonDRV
+ 1.8.1.25 SpoonWEP
o 1.8.2 Bluetooth
+ 1.8.2.1 BTcrack
+ 1.8.2.2 Bluebugger
+ 1.8.2.3 Blueprint
+ 1.8.2.4 Bluesmash
+ 1.8.2.5 Bluesnarfer
+ 1.8.2.6 Btscanner
+ 1.8.2.7 Carwhisperer
+ 1.8.2.8 Frontline
+ 1.8.2.9 Minicom
+ 1.8.2.10 ObexFTP
+ 1.8.2.11 HCIDump
+ 1.8.2.12 Redfang
+ 1.8.2.13 Ussp-Push
+ 1.8.2.14 atshell
+ 1.8.2.15 attest
+ 1.8.2.16 bdaddr
+ 1.8.2.17 bss
+ 1.8.2.18 btftp
+ 1.8.2.19 hcidump-crash
+ 1.8.2.20 hidattack
+ 1.8.2.21 hstest
+ 1.8.2.22 rfcomm
* 1.9 VOIP & Telephony Analysis
o 1.9.1 PcapSipDump
o 1.9.2 PcapToSip_RTP
o 1.9.3 SIPSak
o 1.9.4 SIPcrack
o 1.9.5 SIPdump
o 1.9.6 SIPp
o 1.9.7 Smap
* 1.10 Digital Forensics
o 1.10.1 Allin1
o 1.10.2 Autopsy
o 1.10.3 DCFLDD
o 1.10.4 DD_Rescue
o 1.10.5 Foremost
o 1.10.6 Magicrescue
o 1.10.7 Mboxgrep
o 1.10.8 Memfetch
o 1.10.9 Memfetch Find
o 1.10.10 Pasco
o 1.10.11 Rootkithunter
o 1.10.12 Sleuthkit
o 1.10.13 Vinetto
* 1.11 Reverse Engineering
o 1.11.1 GDB GNU Debugger
o 1.11.2 GDB Console GUI
o 1.11.3 GDB Server
o 1.11.4 GNU DDD
o 1.11.5 Hexdump
o 1.11.6 Hexedit
o 1.11.7 OllyDBG
* 1.12 Services
o 1.12.1 SNORT

Menambahkan Repo Lokal di Linux Backtrack

Ketikan perintah berikut:

root@bt:~# nano /etc/apt/sources.list

# GXRG BACKTRACK REPOSITORY
deb http://bt.gxrg.org/repo/all revolution main microverse non-free testing
deb http://bt.gxrg.org/repo/32 revolution main microverse non-free testing
deb http://bt.gxrg.org/repo/source revolution main microverse non-free testing

# OFFICIAL BACKTRACK REPOSITORY
#deb http://all.repository.backtrack-linux.org revolution main microverse non-free testing
#deb http://32.repository.backtrack-linux.org revolution main microverse non-free testing
#deb http://source.repository.backtrack-linux.org revolution main microverse non-free testing
 
Kemudian tambahkan repo tersebut di atas, kebetulan dari Gunadarma J IT Club.

Mengembalikan Panel di Linux Backtrack GNOME

Mungkin teman-teman pernah dengan tidak sengaja menghilangkan/delete panel di linux, kan biasanya di linux gnome memiliki 2 Panel default yaitu Panel Atas dan Panel Bawah. Berikut cara memperbaikinya dan menampilkan ke Panel defaultnya.

Caranya:
Masuk ke Terminal bisa dengan cara Ctrl + Alt + T
Ketikan Perintah ini di Terminal

gconftool –recursive-unset /apps/panel
rm -rf ~/.gconf/apps/panel
pkill gnome-panel
sudo reboot

Tunggu komputernya setelah restart, kembali deh seperti semula!

Cara Pengaturan IP di Linux

Setiing IP dan Wireless di Linux, kebetulan pakai Backtrack 5

Untuk melihat konfigurasi dari Interface Jaringan kita ketikan perintah ifconfig. Memulai networking biasanya menggunakan WICD tpi sebelumnya ketik dulu di console:
root@bt:~# /etc/init.d/wicd start
lalu klik :
menu — internet — wicd netwok manager

setting ip dynamic:
root@bt:~# dhclient
— interface disini bisa saja eth0 atau eth1 dan kalau untuk wireless wlan5.


Setting IP static
misalnya :
interface – eth0
IP Address – 192.168.1.9/24
Default Gateway – 192.168.1.1
DNS server – 192.168.1.1
maka perintah yang digunakan adalah :

root@bt:~# ifconfig eth0 192.168.1.9/24
root@bt:~# route add default gw 192.168.1.1
root@bt:~# echo nameserver 192.168.1.1 > /etc/resolv.conf

settingan ini akan kembali default bila di reboot, untuk menjadikan permanen maka kita perlu meng-edit file /etc/network/interfaces,

root@bt:~# nano /etc/network/interfaces

auto eth0
iface eth0 inet static
address 192.168.1.9
netmask 255.255.255.0
network 192.168.1.0
broadcast 192.168.1.255
gateway 192.168.1.1

kemudian save dengan menggunakan perintah CTRL+X kemudian jawab y kemudian enter

root@bt:~# update-rc.d networking defaults
root@bt:~# /etc/init.d/networking restart

Install Aplikasi di Backtrack 5

Install Codec Pemutar Musik dan Video
root@bt:~# apt-get install ubuntu-restricted-extras

Pemutar Musik GNOME

Audacious
root@bt:~# apt-get install audacious
Rhythmbox
root@bt:~# add-apt-repository ppa:webupd8team/rhythmbox && sudo apt-get update 
root@bt:~# apt-get install rhythmbox
Pemutar Musik KDE 
Amarok
root@bt:~# apt-get install amarok 
Pemutar Video
VLC
root@bt:~# apt-get install vlc
MPlayer
root@bt:~# apt-get install gnome-mplayer
GIMP Image Editor
root@bt:~# apt-get install gimp
InkSpace
root@bt:~# apt-get install inkscape
Geany (Compiler Programming)
root@bt:~# apt-get install geany
Merekam Aktifitas Desktop
root@bt:~# apt-get install gtk-recordmydesktop
Aplikasi Webcam
root@bt:~# apt-get install cheese
Itulah hal-hal yang diperlukan setelah kita selesai menginstall Linux Backtrack 5, semoga bermanfaat! ^^