Showing posts with label hack. Show all posts
Showing posts with label hack. Show all posts

Thursday 13 December 2012

Using Virtual Ethernet Adapters in Promiscuous Mode on a Linux Host


VMware Workstation does not allow the virtual Ethernet adapter to go into promiscuous mode unless the user running VMware Workstation has permission to make that setting. This follows the standard Linux practice that only root can put a network interface into promiscuous mode.

When you install and configure VMware Workstation, you must run the installation as root. VMware Workstation creates the VMnet devices with root ownership and root group ownership, which means that only root has read and write permissions to the devices.

To set the virtual machine's Ethernet adapter to promiscuous mode, you must launch VMware Workstation as root because you must have read and write access to the VMnet device. For example, if you are using bridged networking, you must have access to /dev/vmnet0.

To grant selected other users read and write access to the VMnet device, you can create a new group, add the appropriate users to the group and grant that group read and write access to the appropriate device. You must make these changes on the host operating system as root (su -). For example, you can enter the following commands:

chgrp <newgroup> /dev/vmnet0

chmod g+rw /dev/vmnet0

<newgroup> is the group that should have the ability to set vmnet0 to promiscuous mode.
The command to run vmware workstations ads root is simple: user@user#:~$ sudo vmware start

If you want all users to be able to set the virtual Ethernet adapter (/dev/vmnet0 in our example) to promiscuous mode, run the following command on the host operating system as root:

chmod a+rw /dev/vmnet0


This is another posting showing "how to do computing" for everyday computer usages... For a general public

VMware on Linux : Running in Permiscuous Mode


 VMware on Linux: Promiscuous Mode

When VMware Workstation is hosted under Linux, by default it doesn't allow VM Guests to access the network in Promiscuous mode.  There's an easy fix for this...

If you run something like Wireshark from a VM Guest, you'll see VMware display an error message.

The problem lies with the permissions on the Host.  When VMware is started without root privileges, it doesn't have the permissions necessary to access the /dev/vmnet0 device.

A quick temporary bodge is to use chgrp and chmod on the Host, to tweak the permissions on /dev/vmnet* until the next reboot (where yourgroup is a group that your user account is in - typically admin on my Ubuntu machines):
   chgrp yourgroup /dev/vmnet*
   chmod g+rw /dev/vmnet*

A more permanent fix is to edit /etc/init.d/vmware on the Host, and tweak the ownership and permissions when the device is created, by adding the lines in red:
  # Start the virtual ethernet kernel service
   vmwareStartVmnet() {
      vmwareLoadModule $vnet
      "$BINDIR"/vmware-networks --start >> $VNETLIB_LOG 2>&1
      chgrp yourgroup  /dev/vmnet*
      chmod g+rw /dev/vmnet*

After you restart the Host's VMware daemon ...

   /etc/init.d/vmware stop
   /etc/init.d/vmware start

you'll be able to boot your Guest VM, and use Wireshark or whatever in the Guest.  Just Remember!   Your VM Guest's Network Adapter must be set to BRIDGED (connected directly to the physical network), not NAT (used to share the host's IP address).

Aside: I did think it ought be possible to achieve the same effect a little more cleanly, by creating a file in /etc/udev/rules.d to set the desired ownership and permission modes for /dev/vmnet*.  But nothing I've tried has worked.  Anyone?

Wednesday 14 November 2012

How To Hide & UNHIDE Hard disk Volumes By CMD Command




How To Hide and unhide the hard disk Volumes using CMD Commands :

    First check how many drives are there in my computer and then see which drive holds your secret files.Then make the drive to invisible by following the below steps of using cmd commands,

    start->run->cmd->DISKPART
    DISKPART>list volume (it list available partition volumes)
    select the volume by SELECT VOLUME 1or 2 ..
     Hide the selected volume by REMOVE LETTER C or D or... command.

Note :For Unhide the hidden drive use the command ASSIGN LETTER after selecting the hidden drive.


Now to unhide the partition:
Go to an elevated command prompt=run cmd.exe as administrator

Enter following commands:

DISKPART --- run the diskpart program
LIST DISK ---- list the disks in system
SELECT DISK n ----n is number of disk with hidden volume
DETAIL DISK ----- to make sure you got the right one
LIST VOLUME ------lists the volumes in the system
SELECT VOLUME n ----n is the number of the hidden volume
DETAIL VOLUME ---- to make sure you got the right one
ATTRIBUTES VOLUME CLEAR HIDDEN ---clear the hidden attribute
EXIT --- exit from DiskPart
EXIT --- exit from command shell

Later if you want to hide the volume again then the command is:
ATTRIBUTES VOLUME SET HIDDEN

This is another posting showing "how to do computing" for everyday computer usages... For a general public



Friday 12 October 2012

md5sum.exe introduction


After you download all the Shorten (.shn) files for a particular disc or show, you want to verify that the files are not corrupted or otherwise unusable before you burn them to disc or host them on your file server. We do this by checking the downloaded Shorten (.shn) files against an .md5 file. An .md5 is a simple text file that contains a "fingerprint" of each Shorten file.


When you perform an md5 check, you are comparing the fingerprint from the files you downloaded to the fingerprint of the files on the server you downloaded from. If the md5's (fingerprints) match, you have an uncorrupted Shorten file.



 md5sum.exe - 48KB         88170 Downloads since 9/29/00



  • Windows 95/98/Me: Download md5sum.exe to c:\windows\command

  • Windows NT/2000: Download md5sum.exe to your c:\winnt\system32
  •  

    Open an MS-DOS window and go to the directory of the show you want to check. When you are in that directory, type:
    md5sum -c [filename].md5
     
    You must insert the name of the .md5 file [without the brackets]. Below is an example of a successful md5sum check:
     
     
    On the other hand, if a track does not pass the md5check, you will see the following:
    If any Shorten files do not pass the .md5 check, you should delete the offending file(s), and try re-downloading. Then run the .md5 check again. The file(s) should now pass the .md5 check.

    If the same files fail an .md5 check more than twice, you should contact the FTP Siteop you downloaded the files from and let them know what tracks are giving you a problem. They may be hosting a corrupted track without knowing it.

    Open an MS-DOS window and go to the directory of the show you want to create an .md5 file for. When you are in that directory, type:

    md5sum *.shn > [filename].md5
     
    NOTE: You must insert the name of the .md5 file [without the brackets]. Example:
     
    md5sum *.shn > ph94-06-26d1.md5

    An .md5 file will be created and placed in that directory. Please remember to adhere the etree.org naming scheme when naming .md5 files!

    Please remember to always .md5 check your Shorten files before burning!
      

    Special thanks to bruce@gridpoint.com and the PCP community for compiling this special version of md5sum. Documentation and graphics by Mike Wren.


     

    How to Create a Ansible Lab on your Local Machine using Vagrant in 5 min using ChatGPT - Part 2

    Update the above Vagrantfile Centos 8 servers and add Public IP and dhcp on each server .. To update the provided Vagrantfile for the three ...