This tutorial will provide you with the details required to install configure and run pytbull on Back Track 5.
In our example we will be using pytbull with Back Track 5 in gateway mode.
Back Track 5 requirements and configuration:
- Install BT5 rather than run the live version, you should do this anyway
- Install libopts25 so that tcpreplay will work in BT5
- In our example BT5 will have ip address of 172.16.16.43
#apt-get install libopts25
Download and install pytbull, refer to the pytbull website documentation section:
Edit the config.cfg file for specific settings and paths in BT5. Change the IP to your IP and the interface to your networked interface, in our example the client ip is 172.16.16.43 on eth0.
The sections we are interested in are as follows:
ipaddr = <yourbt5ipadd>
iface = eth0
sudo = /usr/bin/sudo
nmap = /usr/local/bin/nmap
nikto = /pentest/web/nikto/nikto.pl
niktoconf = /pentest/web/nikto/nikto.conf
hping3 = /usr/sbin/hping3
tcpreplay = /pentest/sniffers/tcpreplay/tcpreplay
localhost = 127.0.0.1
ftpuser = fred
ftppasswd = derf
We are now ready to run the pytbull tests and watch our IDS/IPS systems!
Be sure to include the gateway mode switch:
#./pytbull -t <target ip address> --mode=gateway
You should now see all the tests running and your IDS/IPS should be going crazy!
Good article on how to install OSSEC with VMware:
The Linux Terminal Server Project adds thin-client support to Linux servers. LTSP is a flexible, cost effective solution that is empowering schools, businesses, and organizations all over the world to easily install and deploy desktop workstations. A growing number of Linux distributions include LTSP out-of-the-box.
Howto install LTSP in Ubuntu 10.10 (Maverick) – Reuse your Old computers with out hard disk and Thin Clients:
Download and more details at :
Project Honey Pot http://www.projecthoneypot.org is a site and system that you can sign up to for identifying spammers and spambots and it’s free.
The official description is:
Project Honey Pot is the first and only distributed system for identifying spammers and the spambots they use to scrape addresses from your website. Using the Project Honey Pot system you can install addresses that are custom-tagged to the time and IP address of a visitor to your site. If one of these addresses begins receiving email we not only can tell that the messages are spam, but also the exact moment when the address was harvested and the IP address that gathered it.
To participate in Project Honey Pot, webmasters need only install the Project Honey Pot software somewhere on their website. We handle the rest — automatically distributing addresses and receiving the mail they generate. As a result, we anticipate installing Project Honey Pot should not increase the traffic or load to your website.
We collate, process, and share the data generated by your site with you. We also work with law enforcement authorities to track down and prosecute spammers. Harvesting email addresses from websites is illegal under several anti-spam laws, and the data resulting from Project Honey Pot is critical for finding those breaking the law.