Example syntax for Secure Copy (scp)
What is Secure Copy?
scp allows files to be copied to, from, or between different hosts. It uses ssh for data transfer and provides the same authentication and same level of security as ssh.
Examples
Copy the file "foobar.txt" from a remote host to the local host
$ scp your_username@remotehost.edu:foobar.txt /some/local/directory
Copy the file "foobar.txt" from the local host to a remote host
$ scp foobar.txt your_username@remotehost.edu:/some/remote/directory
Copy the directory "foo" from the local host to a remote host's directory "bar"
$ scp -r foo your_username@remotehost.edu:/some/remote/directory/bar
Copy the file "foobar.txt" from remote host "rh1.edu" to remote host "rh2.edu"
$ scp your_username@rh1.edu:/some/remote/directory/foobar.txt \
your_username@rh2.edu:/some/remote/directory/
Copying the files "foo.txt" and "bar.txt" from the local host to your home directory on the remote host
$ scp foo.txt bar.txt your_username@remotehost.edu:~
Copy multiple files from the remote host to your current directory on the local host
$ scp your_username@remotehost.edu:/some/remote/directory/\{a,b,c\} .
$ scp your_username@remotehost.edu:~/\{foo.txt,bar.txt\} .
scp Performance
By default scp uses the Triple-DES cipher to encrypt the data being sent. Using the Blowfish cipher has been shown to increase speed. This can be done by using option -c blowfish in the command line.
$ scp -c blowfish some_file your_username@remotehost.edu:~
It is often suggested that the -C option for compression should also be used to increase speed. The effect of compression, however, will only significantly increase speed if your connection is very slow. Otherwise it may just be adding extra burden to the CPU. An example of using blowfish and compression:
$ scp -c blowfish -C local_file your_username@remotehost.edu:~
Monday, May 30, 2011
Tuesday, May 24, 2011
How to intall Mrtg on Slackware 13.1
in this section we learn how to install MRTG program that help us to see network devices how use bandwidth,CPU usage ....
we need to configure and run 3 service that work directly by Mrtg : apache web server -running SNMP at least a password between MRTG <==(Community)==> SNMP that call it community!
------------------------------------
Step I
for running apache web server :
1)chmod +x /etc/rc.d/rc.httpd
2) /etc/rc.d/rc.httpd start
3) ps -A | grep httpd <== check truely running
-------------------------------------
Step II
in this step running SNMP ( Simple Network Monitoring Protocol )
on command line Write :
1)snmpconf push Enter
1.a-chose 1 (snmpd.conf)
1.b-chose 1 (Access control Setup)
1.c-chose 3 (snmp V1/V2 Read only community )
{tell which IP can access snmp : 127.0.0.1}
1.d- chose OIO and enter
for exit this part : finished,finished and Quit
now Move snmp.conf /etc/snmp
mv snmp.conf /etc/snmp
chmod +x /etc/rc.d/rc.snmpd
/etc/rc.d/rc.snmpd start
ps -A | grep snmp
------------------------------------------------
Step III
Install MRTG with Source and compile it ;)
1-download it
we need to configure and run 3 service that work directly by Mrtg : apache web server -running SNMP at least a password between MRTG <==(Community)==> SNMP that call it community!
------------------------------------
Step I
for running apache web server :
1)chmod +x /etc/rc.d/rc.httpd
2) /etc/rc.d/rc.httpd start
3) ps -A | grep httpd <== check truely running
-------------------------------------
Step II
in this step running SNMP ( Simple Network Monitoring Protocol )
on command line Write :
1)snmpconf push Enter
1.a-chose 1 (snmpd.conf)
1.b-chose 1 (Access control Setup)
1.c-chose 3 (snmp V1/V2 Read only community )
{tell which IP can access snmp : 127.0.0.1}
1.d- chose OIO and enter
for exit this part : finished,finished and Quit
now Move snmp.conf /etc/snmp
mv snmp.conf /etc/snmp
chmod +x /etc/rc.d/rc.snmpd
/etc/rc.d/rc.snmpd start
ps -A | grep snmp
------------------------------------------------
Step III
Install MRTG with Source and compile it ;)
1-download it
Wednesday, May 18, 2011
how to install Utorrent on Slackware 13.1
really simple :
Install "uTorrent" on terminal
1. get the file:
wget http://download.utorrent.com/linux/utorrent-server-3.0-25053.tar.gz
2. extract it
tar zxvf utorrent-server-3.0-25053.tar.gz
3. go into the folder created
cd utorrent-server-3.0-21701
4. run the program
./utserver
5. open a website to the machine on port 8080
http://someip:8080/gui/
6. u:admin pass: by default does not have
Enjoy it
Install "uTorrent" on terminal
1. get the file:
wget http://download.utorrent.com/linux/utorrent-server-3.0-25053.tar.gz
2. extract it
tar zxvf utorrent-server-3.0-25053.tar.gz
3. go into the folder created
cd utorrent-server-3.0-21701
4. run the program
./utserver
5. open a website to the machine on port 8080
http://someip:8080/gui/
6. u:admin pass: by default does not have
Enjoy it
Tuesday, October 6, 2009
usfull toll
# iptraf - a command line tool, Interactive Colorful IP LAN Monitor
# netstat - a command line tool, print network connections, routing tables, interface statistics, masquerade connections, and multicast memberships
# netstat - a command line tool, print network connections, routing tables, interface statistics, masquerade connections, and multicast memberships
Usefull commands
# netconfig - A menu based program that will help in configuring your network.
# pppsetup - A menu based program that helps in connecting to the Internet via a dial up modem.
# xwmconfig - Choose your default window manager.
# liloconfig - Setup and install LiLO to the boot drive.
# xorgcfg - Setup the configuration for X Windows. It will automatically generate the xorg.conf file which is saved in the /etc/X11/ directory.
# alsaconf - Automatically detects the sound cards and configures the sound.
# pppsetup - A menu based program that helps in connecting to the Internet via a dial up modem.
# xwmconfig - Choose your default window manager.
# liloconfig - Setup and install LiLO to the boot drive.
# xorgcfg - Setup the configuration for X Windows. It will automatically generate the xorg.conf file which is saved in the /etc/X11/ directory.
# alsaconf - Automatically detects the sound cards and configures the sound.
Sunday, September 13, 2009
Metasploit
part I Windows VNC Injection :
i all,
When using a VNC Injection payload, and obtaining a full access on the
victim machine after an exploit, a command shell is spawned on the
remote machine with a pretty visible blue background. Is there anyway
to stop this ?. I tried modifying the following code in
framework\modules\payloads\stages\windows\vncinject.rb
register_advanced_options(
[
OptBool.new('DisableCourtesyShell',
[
false,
"Disables the Metasploit Courtesy shell",
false
])
], VncInject)
changing false parametres to true offcourse, but i cannot seem to hide
the command shell.
Any ideas ?
i all,
When using a VNC Injection payload, and obtaining a full access on the
victim machine after an exploit, a command shell is spawned on the
remote machine with a pretty visible blue background. Is there anyway
to stop this ?. I tried modifying the following code in
framework\modules\payloads\stages\windows\vncinject.rb
register_advanced_options(
[
OptBool.new('DisableCourtesyShell',
[
false,
"Disables the Metasploit Courtesy shell",
false
])
], VncInject)
changing false parametres to true offcourse, but i cannot seem to hide
the command shell.
Any ideas ?
Subscribe to:
Posts (Atom)