SlideShare a Scribd company logo
1 of 20
Project Report<br />-459105253365on<br />-22459952540<br />Project  by - Nutan Kumar Panda<br />Technology Evangelist ISEH<br />R&D - ATL Guwahati<br />AIR - Automated Image and Restore<br />AIR (Automated Image and Restore) is a GUI front-end to dd/dc3dd designed for easily creating forensic images. <br />Features: <br /> auto-detection of IDE and SCSI drives, CD-ROMs, and tape drives <br /> choice of using either dd or dc3dd <br /> image verification between source and copy via MD5 or SHA1/256/384/512 <br /> image compression/decompression via gzip/bzip2 <br /> image over a TCP/IP network via netcat/cryptcat <br />supports SCSI tape drives <br /> wiping (zeroing) drives or partitions <br />514350411480 splitting images into multiple segments. detailed logging with date/times and complete command-line used <br />76200390525<br />What is Automated Image & Restore<br />Automated Image & Restore (AIR) is an open source application that provides a GUI front end to the dd/dcfldd (Dataset Definition (dd)) command. AIR is designed to easily create forensic disk/partition images. It supports MD5/SHAx hashes, SCSI tape drives, imaging over a TCP/IP network, splitting images, and detailed session logging. To date, the AIR utility has only been developed for use on Linux distributions. In its simplest form, AIR provides a convenient interface to execute the dd set of commands. It eliminates the risk of quot;
fat fingeringquot;
 an error in the shell terminal and ultimately makes using the dd command more user-friendly for those who are not as experienced. Please note that using the AIR front end still requires some basic knowledge of how the dd (or dcfldd) commands work.<br />The dd command has been around for quite a while. It is well known throughout the Unix/Linux community, well documented, and as I can only imagine extensively used. A dd image is a bit by bit image of a source device or file. The uses for dd range from creating and maintaining system backups and restore images to the forensic application of imaging evidence that will be returned to the lab and examined.<br />This tutorial is not designed to teach the use of the dd command; this is well documented and a simple internet search will yield a plethora of results. Instead, the intent of this mini quot;
how-toquot;
 is to introduce users to the AIR front end application, increase overall awareness of the utility, and provide a brief example of creating a dd image using this tool.<br />Setting up AIR<br />The first thing you will want to do is download and install the latest version of the AIR application. The AIR application is available for download at www.sourceforge.net/projects/air-imager.<br />Once you have downloaded the files to your system, decompress, extract, and install the application. [In this example, I have downloaded the .tar.gz package and will display the commands related to this particular file type]<br />-- Make sure you are in a root shell<br />sudo -s<br />-- Check your current directory to make sure you are in the right location to access the package you downloaded<br />pwd<br />-- Decompress and extract (quot;
untarquot;
) the AIR files<br />tar -zxvf /path/air-1.2.8.tar.gz<br />-- If you desire, this is a good time to read the README.txt file<br />-- Switch to your AIR directory<br />cd /path/air-1.2.8<br />-- Run the install script<br />./install-air-1.2.8<br />The AIR GUI<br />Note that AIR does not work on all Linux distributions. Refer to the project information on sourceforge.net and the README.txt file for a list of known supported distibutions - I am using Ubuntu which is not among the list. Ubuntu can still run AIR, however, some functionality is unavailable. Now that you have successfully downloaded and installed the application, run AIR in root shell by typing quot;
airquot;
 in the terminal. AIR will run through a series of checks and the GUI will launch automatically.<br />Take a moment to familiarize yourself with the AIR GUI. Note how the buttons and options relate to various dd commands that can be used in the terminal.<br />Creating a dd Image Using AIR<br />For this exercise, we will create a dd image of a .jpg in the root folder and copy it to a CD-ROM. AIR will run the commands behind the scenes that will create the image and copy it to the CD-ROM. (In a real scenario, this .jpg could very easily represent a compromised hard drive or other piece of evidence).<br />The OllyDbg debugger is a machine level debugger created by Oleh Yuschuk for the 80x86. This machine-level debugger works with a variety of different assemblers including HLA, MASM, TASM, FASM, and NASM.<br />VoIPER  is a VoIP security testing toolkit incorporating several VoIP fuzzers and auxilliary tools to assist the auditor. It can currently generate over 200,000 SIP tests and H.323/IAX modules are in development. The primary goal of VoIPER is to create a toolkit with all<br />required testing functionality built in and to minimise the amount of effort an auditor<br />has to put into testing the security of a VoIP code base.<br />Run `python fuzzer.py -h` to get an explanation of any of the command line options. To get a list of valid fuzzer names run `python fuzzer.py -l` and for information on what a particular fuzzer does run `python fuzzer.py -l FUZZERNAME` <br />Versions 0.06 and under have an issue with protocol based crash detection (-c 1 or -c 2). As a result you have the following options if you don't want to be plagued with false positives: <br />,[object Object]
Use level 1, (-c 1). This uses the same type of inband, protocol based crash detection as level 2 but instead of pausing the fuzzer it just logs the crash details when a crash occurs and keeps fuzzing. This avoids you having to restart the fuzzer when a false positive occurs but it also means the fuzzer won't be paused when an actual crash occurs. This will result in every request that is sent to a dead target being logged (so basically thousands of crash log files). You can discern which caused the actual crash as it will be the earliest request logged in the continuous linear sequence of crash log files.
Use level 3, (-c 3). This is what I always use if possible. It uses out of band, process based crash detection and is not susceptible to false positives. On the down side it requires you to set up crash detection script running on the target computer but that is just a case of running a single command and passing a few extra paramaters to VoIPER.
This issue is resolved in version 0.07 but some VoIP applications have an annoying habit of not responding as they should while being fuzzed. As a result, it is recommended to use process based crash detection (-c 3) when at all possible. Macchanger - MAC Changer <br />Synopsis<br />macchanger [options] device <br />Description<br />macchanger is a Linux utility for viewing/manipulating the MAC address for network interfaces. <br />Options<br />macchanger accepts the following options: <br />-h, --help <br />Show summary of options. <br />-V, --version <br />Show version of program. <br />-e, --endding <br />Don't change the vendor bytes. <br />-a, --another <br />Set random vendor MAC of the same kind. <br />-A <br />Set random vendor MAC of any kind. <br />-r, --random <br />Set fully random MAC. <br />-l, --list[=keyword] <br />Print known vendors (with keyword in the vendor's description string) <br />-m, --mac XX:XX:XX:XX:XX:XX <br />Set the MAC XX:XX:XX:XX:XX:XX<br />Example<br />macchanger -A eth1 <br />Wireshark   Wireshark is the network analyzer. This very powerful tool provides network and upper layer protocols informations about data captured in a network.Like a lot of other network programs, Wireshark uses the pcap network library to capture packets. The Wireshark strength comes from:- its easiness to install.- the simplicity of use of its GUI interface.- the very high number of functionality available.Wireshark was called Ethereal until 2006 when the main developer decided to change its name because of copyright reasons with the Ethereal name, which was registered by the company he decided to leave in 2006. Install everything that it comes with. WinPcap is a driver that Wireshark needs in order to run. It will be automatically installed when you install wireshark. You can find more information about WinPcap at winpcap.polito.it. <br />Now that we have Wireshark installed lets open it up, so I can show you how to use it. Wireshark should have made a folder somewhere in your start menu called Wireshark. Go ahead and run Wireshark. <br />Wireshark lets you<br /> quot;
seequot;
 the data that is traveling across your network. <br />You can quot;
seequot;
 what ports a program is using.<br /> You can basically see all the traffic on your network.<br />You can see what comes in and what is going out of your router. <br />You can see so much that it becomes a problem. You end up getting too much data. To fix this Wireshark comes with two very useful filters that we will go over here. The filters allow you to sort the traffic that you have captured making it much easier to read. Well lets start by clicking the Capture link at the top of your screen. Then click Options in the menu that drops down. <br />This is the window that allows you to define how to start capturing data with Wireshark. You can use the Interface drop down box to select which network card to capture data from. There will only be one option here, if you only have one ethernet card. Later on we will modify this page a bit. Now we need to tell Wireshark what to capture. Click on the Capture Filter button.<br />Put First Capture Filter into the Filter Name box. I want you to enter host followed by your ip address into the Filter String box. If you ip address is 192.168.1.2, the Filter String box would contain the following.host 192.168.1.2 We are telling Wireshark to capture everything coming from and going to your ip address. So we will get a log of all the traffic that is coming from or going to your computer. When you have finished those two changes click the Ok button at the bottom of this page. <br />You should now be back at the Capture Options window. Then click the Start button at the bottom of the screen. <br />You are now see packets as they are being sent to and from your computer. You might see a lot of traffic or just a little traffic depending upon how much is going on on your network. If you do not see any packets, try opening up a web page. If you still do not see captured data, then you probably have the wrong Interface selected on the Capture options window. When you have a couple packets, click the Capture option at the top of the screen and then Stop option in the menu that drops down. <br />Wireshark has captured some data as you can see on your screen. There are three frames here. I have labeled them as Frame 1, Frame 2, and Frame 3 in the picture above. Frame 1 shows you an overview of what packets came in and when out of your network. Frame 2 shows more detailed information about a selected packet. Frame 3 shows the hex data of the packet. We only really care about frame 1. <br />The source column tells us where the data was coming from and the destination column tells us where the data was going to. Both of these columns will always have ip addresses in them. The protocol column tells us what protocol that packet was sent with. Which is useful when trying to figure out what ports/procotols a program uses. The info box contains the information that we really need. The info box lists specific requests made over the network. It also lists what ports the data traveled on.<br /> Notice that every time a port is listed it is listed as a pair of ports. Data always travels on ports. It is send out of the source ip address on a port, and then received on the destination ip address on a port. These ports are rarely the same. Keeping that in mind, it is easy to see why there are two ports listed in the info box. The first port is the source port. Notice the > which you can think of as the word to. <br />From the first port > to the second port. I hope that I have explained enough to give you a general feel for the program. Check out the help section of the program for more capture filter options. Notice that there is also a filter box above the data you have captured. This is the dISPlay filter. It works like the capture filter, but allows you to filter data that has already been captured. Click the help button in the dISPlay filter window for examples of how to use it. <br />Snort(IDS/IPS)  is a free and open source network intrusion prevention system (NIPS) and network intrusion detection system (NIDS) capable of performing packet logging and real-time traffic analysis on IP networks. Snort was written by Martin Roesch and is now developed by Sourcefire, of which Roesch is the founder and CTO. Integrated enterprise versions with purpose built hardware and commercial support services are sold by Sourcefire.<br />Snort performs protocol analysis, content searching/matching, and is commonly used to actively block or passively detect a variety of attacks and probes, such as buffer overflows, stealth port scans, web application attacks, SMB probes, and OS fingerprinting attempts, amongst other features. The software is mostly used for intrusion prevention purposes, by dropping attacks as they are taking place. Snort can be combined with other free software such as sguil, OSSIM, and the Basic Analysis and Security Engine (BASE) to provide a visual representation of intrusion data.<br />Konqueror is a web browser and file manager that provides file-viewer functionality to a wide variety of things: local files, files on a remote ftp server and files in a disk image. It is designed as a core part of the KDE desktop environment. It is developed by volunteers and can run on most Unix-like operating systems and on Windows systems, too. Konqueror, along with the rest of the components in the KDEBase package, is licensed and distributed under the GNU General Public License version 2.<br />The name quot;
Konquerorquot;
 is a reference to the two primary competitors at the time of the browser's first release: quot;
first comes the Navigator, then Explorer, and then the Konquerorquot;
. It also follows the KDE naming convention: the names of most KDE programs begin with the letter K. <br />Konqueror came with the version 2 of KDE, released on October 23, 2000. It replaces its predecessor, KFM (KDE file manager).<br />Konqueror uses a very capable HTML rendering engine called KHTML. This engine is implemented as a KPart and as such, it can be easily used by other KDE programs. KHTML is also used by the Apple browser Safari. <br />Features of the HTML rendering component in KDE 3.4: <br />HTML 4.01 compliance.<br />ECMAscript 262 support (JavaScript). Notice that ECMAscript can still give problems because websites can detect browsers and choose to ignore Konqueror. Spoofing as another browser will often make sites work anyway.<br />Ability to house Java applets.<br />Cascading Style Sheets: <br />CSS 1: supported<br />CSS 2.1: supported (paged media only partially supported)<br />CSS 3 Selectors: supported<br />CSS 3 (other): Details about the visual media support can be found here. <br />DOM1, DOM2 and partially DOM3 support in ECMAScript and native C++ bindings.<br />Full support for bidirectional scripts (arabic and hebrew).<br />SSL support (requires OpenSSL).<br />Konqueror provides all the functionalities one will expect from a modern file manager, including navigation of the filesystem, file/folder copying, renaming, deletion and creation and application launching.<br />It is also able to display graphic image files and generate an image gallery web page from them. In addition. Konqueror is a standards-compliant web-browser and is perfectly capable of browsing the WWW on the Internet - just enter the website to go to in the Konqueror location bar.<br />The most obvious advantage of Konqueror (for people using KDE) is the great integration with the rest of KDE. And the article you mentioned isn't really that convincing. Of course, KHTML does support XHTML. And the rant about Konqueror being not only a browser but quot;
a file manager, a web browser, a universal document viewer and a fully customizable applicationquot;
 is pretty flawed as the first comment points out. Konqueror is actually just a shell for various KParts (comparable to plugins). Those KParts have specific tasks (e.g. there's the KHTML part which renders HTML, there's the file manager part, there are multiple document viewer parts, etc.) and this makes Konqueror a lightweight but still very versatile application.<br />
Backtrack Manual Part4
Backtrack Manual Part4
Backtrack Manual Part4
Backtrack Manual Part4
Backtrack Manual Part4
Backtrack Manual Part4
Backtrack Manual Part4
Backtrack Manual Part4
Backtrack Manual Part4
Backtrack Manual Part4
Backtrack Manual Part4
Backtrack Manual Part4
Backtrack Manual Part4
Backtrack Manual Part4
Backtrack Manual Part4
Backtrack Manual Part4

More Related Content

What's hot

Embedding Linux On The Encore Simputer
Embedding Linux On The Encore SimputerEmbedding Linux On The Encore Simputer
Embedding Linux On The Encore SimputerSatpal Parmar
 
Reverse engineering – debugging fundamentals
Reverse engineering – debugging fundamentalsReverse engineering – debugging fundamentals
Reverse engineering – debugging fundamentalsEran Goldstein
 
Enterprise ids-columbus securitysummit-02
Enterprise ids-columbus securitysummit-02Enterprise ids-columbus securitysummit-02
Enterprise ids-columbus securitysummit-02policydoc
 
Dvb Pc Tv Stars Pci Usb Faq
Dvb Pc Tv Stars Pci Usb FaqDvb Pc Tv Stars Pci Usb Faq
Dvb Pc Tv Stars Pci Usb FaqSais Abdelkrim
 
Windows Command Line Tools
Windows Command Line ToolsWindows Command Line Tools
Windows Command Line Toolslove4upratik
 
ARM Trusted FirmwareのBL31を単体で使う!
ARM Trusted FirmwareのBL31を単体で使う!ARM Trusted FirmwareのBL31を単体で使う!
ARM Trusted FirmwareのBL31を単体で使う!Mr. Vengineer
 
The Nightmare Fuzzing Suite and Blind Code Coverage Fuzzer
The Nightmare Fuzzing Suite and Blind Code Coverage FuzzerThe Nightmare Fuzzing Suite and Blind Code Coverage Fuzzer
The Nightmare Fuzzing Suite and Blind Code Coverage FuzzerJoxean Koret
 
Software update for IoT: the current state of play
Software update for IoT: the current state of playSoftware update for IoT: the current state of play
Software update for IoT: the current state of playChris Simmonds
 
Bypassing anti virus scanners
Bypassing anti virus scannersBypassing anti virus scanners
Bypassing anti virus scannersmartacax
 
Fedora Atomic Workshop handout for Fudcon Pune 2015
Fedora Atomic Workshop handout for Fudcon Pune  2015Fedora Atomic Workshop handout for Fudcon Pune  2015
Fedora Atomic Workshop handout for Fudcon Pune 2015rranjithrajaram
 
Dc10 beale-attackdefendunix
Dc10 beale-attackdefendunixDc10 beale-attackdefendunix
Dc10 beale-attackdefendunixPriya Kelkar
 
Trusted firmware deep_dive_v1.0_
Trusted firmware deep_dive_v1.0_Trusted firmware deep_dive_v1.0_
Trusted firmware deep_dive_v1.0_Linaro
 

What's hot (18)

Embedding Linux On The Encore Simputer
Embedding Linux On The Encore SimputerEmbedding Linux On The Encore Simputer
Embedding Linux On The Encore Simputer
 
Networking 101
Networking 101Networking 101
Networking 101
 
Basics to Configure NW Device
Basics to Configure NW DeviceBasics to Configure NW Device
Basics to Configure NW Device
 
Backtrack Manual Part2
Backtrack Manual Part2Backtrack Manual Part2
Backtrack Manual Part2
 
Reverse engineering – debugging fundamentals
Reverse engineering – debugging fundamentalsReverse engineering – debugging fundamentals
Reverse engineering – debugging fundamentals
 
Enterprise ids-columbus securitysummit-02
Enterprise ids-columbus securitysummit-02Enterprise ids-columbus securitysummit-02
Enterprise ids-columbus securitysummit-02
 
Dvb Pc Tv Stars Pci Usb Faq
Dvb Pc Tv Stars Pci Usb FaqDvb Pc Tv Stars Pci Usb Faq
Dvb Pc Tv Stars Pci Usb Faq
 
Windows Command Line Tools
Windows Command Line ToolsWindows Command Line Tools
Windows Command Line Tools
 
5th
5th5th
5th
 
ARM Trusted FirmwareのBL31を単体で使う!
ARM Trusted FirmwareのBL31を単体で使う!ARM Trusted FirmwareのBL31を単体で使う!
ARM Trusted FirmwareのBL31を単体で使う!
 
The Nightmare Fuzzing Suite and Blind Code Coverage Fuzzer
The Nightmare Fuzzing Suite and Blind Code Coverage FuzzerThe Nightmare Fuzzing Suite and Blind Code Coverage Fuzzer
The Nightmare Fuzzing Suite and Blind Code Coverage Fuzzer
 
Software update for IoT: the current state of play
Software update for IoT: the current state of playSoftware update for IoT: the current state of play
Software update for IoT: the current state of play
 
Bypassing anti virus scanners
Bypassing anti virus scannersBypassing anti virus scanners
Bypassing anti virus scanners
 
JUNOS EX-Switching
JUNOS EX-SwitchingJUNOS EX-Switching
JUNOS EX-Switching
 
Fedora Atomic Workshop handout for Fudcon Pune 2015
Fedora Atomic Workshop handout for Fudcon Pune  2015Fedora Atomic Workshop handout for Fudcon Pune  2015
Fedora Atomic Workshop handout for Fudcon Pune 2015
 
Dc10 beale-attackdefendunix
Dc10 beale-attackdefendunixDc10 beale-attackdefendunix
Dc10 beale-attackdefendunix
 
Chp10 sw constr
Chp10 sw constrChp10 sw constr
Chp10 sw constr
 
Trusted firmware deep_dive_v1.0_
Trusted firmware deep_dive_v1.0_Trusted firmware deep_dive_v1.0_
Trusted firmware deep_dive_v1.0_
 

Viewers also liked

פרוייקט סאנשיין - ברושור חדש
פרוייקט סאנשיין - ברושור חדש פרוייקט סאנשיין - ברושור חדש
פרוייקט סאנשיין - ברושור חדש sunshineisrael
 
Bioplastics, Lifecycle and Recycling System
Bioplastics, Lifecycle and Recycling SystemBioplastics, Lifecycle and Recycling System
Bioplastics, Lifecycle and Recycling SystemSungmy Kim
 
презентация детской организации смид
презентация детской организации смидпрезентация детской организации смид
презентация детской организации смидSkorodum
 
Plastic water bottle waste - are you ready to digest it?
Plastic water bottle waste - are you ready to digest it?Plastic water bottle waste - are you ready to digest it?
Plastic water bottle waste - are you ready to digest it?Vladimir Dragiev
 
Project sunshine Israel - 2011
Project sunshine Israel -  2011Project sunshine Israel -  2011
Project sunshine Israel - 2011sunshineisrael
 
презентация детской организации смид
презентация детской организации смидпрезентация детской организации смид
презентация детской организации смидSkorodum
 
Saptarshi banerjee strategies of uti and hdfc mutual funds
Saptarshi banerjee strategies of uti and hdfc mutual fundsSaptarshi banerjee strategies of uti and hdfc mutual funds
Saptarshi banerjee strategies of uti and hdfc mutual fundsshivaraj2050
 
отчёт по самообразованию ведерниковой н.а
отчёт по самообразованию ведерниковой н.аотчёт по самообразованию ведерниковой н.а
отчёт по самообразованию ведерниковой н.аSkorodum
 
презентация детской организации смид
презентация детской организации смидпрезентация детской организации смид
презентация детской организации смидSkorodum
 
Saurabh nagar 05-roi and csd road mapin low per capita market
Saurabh  nagar 05-roi and csd road mapin low per capita marketSaurabh  nagar 05-roi and csd road mapin low per capita market
Saurabh nagar 05-roi and csd road mapin low per capita marketshivaraj2050
 
Propuesta final antofagasta british school
Propuesta final antofagasta british schoolPropuesta final antofagasta british school
Propuesta final antofagasta british schoolSergio Papasideris
 
презентация детской организации смид
презентация детской организации смидпрезентация детской организации смид
презентация детской организации смидSkorodum
 
ברכות לרגל חג הפסח - פרוייקט סאנשיין
ברכות לרגל חג הפסח - פרוייקט סאנשייןברכות לרגל חג הפסח - פרוייקט סאנשיין
ברכות לרגל חג הפסח - פרוייקט סאנשייןsunshineisrael
 
Satish musti 04-customer satisfaction towards supermarket
Satish musti 04-customer satisfaction towards supermarketSatish musti 04-customer satisfaction towards supermarket
Satish musti 04-customer satisfaction towards supermarketshivaraj2050
 

Viewers also liked (16)

פרוייקט סאנשיין - ברושור חדש
פרוייקט סאנשיין - ברושור חדש פרוייקט סאנשיין - ברושור חדש
פרוייקט סאנשיין - ברושור חדש
 
Bioplastics, Lifecycle and Recycling System
Bioplastics, Lifecycle and Recycling SystemBioplastics, Lifecycle and Recycling System
Bioplastics, Lifecycle and Recycling System
 
презентация детской организации смид
презентация детской организации смидпрезентация детской организации смид
презентация детской организации смид
 
Plastic water bottle waste - are you ready to digest it?
Plastic water bottle waste - are you ready to digest it?Plastic water bottle waste - are you ready to digest it?
Plastic water bottle waste - are you ready to digest it?
 
Project sunshine Israel - 2011
Project sunshine Israel -  2011Project sunshine Israel -  2011
Project sunshine Israel - 2011
 
презентация детской организации смид
презентация детской организации смидпрезентация детской организации смид
презентация детской организации смид
 
Saptarshi banerjee strategies of uti and hdfc mutual funds
Saptarshi banerjee strategies of uti and hdfc mutual fundsSaptarshi banerjee strategies of uti and hdfc mutual funds
Saptarshi banerjee strategies of uti and hdfc mutual funds
 
отчёт по самообразованию ведерниковой н.а
отчёт по самообразованию ведерниковой н.аотчёт по самообразованию ведерниковой н.а
отчёт по самообразованию ведерниковой н.а
 
презентация детской организации смид
презентация детской организации смидпрезентация детской организации смид
презентация детской организации смид
 
Saurabh nagar 05-roi and csd road mapin low per capita market
Saurabh  nagar 05-roi and csd road mapin low per capita marketSaurabh  nagar 05-roi and csd road mapin low per capita market
Saurabh nagar 05-roi and csd road mapin low per capita market
 
Gira institucional ppt 2016
Gira institucional ppt 2016Gira institucional ppt 2016
Gira institucional ppt 2016
 
Propuesta final antofagasta british school
Propuesta final antofagasta british schoolPropuesta final antofagasta british school
Propuesta final antofagasta british school
 
презентация детской организации смид
презентация детской организации смидпрезентация детской организации смид
презентация детской организации смид
 
Backtrack Manual Part7
Backtrack Manual Part7Backtrack Manual Part7
Backtrack Manual Part7
 
ברכות לרגל חג הפסח - פרוייקט סאנשיין
ברכות לרגל חג הפסח - פרוייקט סאנשייןברכות לרגל חג הפסח - פרוייקט סאנשיין
ברכות לרגל חג הפסח - פרוייקט סאנשיין
 
Satish musti 04-customer satisfaction towards supermarket
Satish musti 04-customer satisfaction towards supermarketSatish musti 04-customer satisfaction towards supermarket
Satish musti 04-customer satisfaction towards supermarket
 

Similar to Backtrack Manual Part4

It04 roshan basnet
It04 roshan basnetIt04 roshan basnet
It04 roshan basnetrosu555
 
How to Use GSM/3G/4G in Embedded Linux Systems
How to Use GSM/3G/4G in Embedded Linux SystemsHow to Use GSM/3G/4G in Embedded Linux Systems
How to Use GSM/3G/4G in Embedded Linux SystemsToradex
 
26.1.7 lab snort and firewall rules
26.1.7 lab   snort and firewall rules26.1.7 lab   snort and firewall rules
26.1.7 lab snort and firewall rulesFreddy Buenaño
 
lamp technology
lamp technologylamp technology
lamp technologyDeepa
 
Deepa ppt about lamp technology
Deepa ppt about lamp technologyDeepa ppt about lamp technology
Deepa ppt about lamp technologyDeepa
 
Freeware Security Tools You Need
Freeware Security Tools You NeedFreeware Security Tools You Need
Freeware Security Tools You Needamiable_indian
 
Parallel port programming
Parallel port programmingParallel port programming
Parallel port programmingmangal das
 
HoneyNet SOTM 32 - Windows Malware Analysis
HoneyNet SOTM 32 - Windows Malware AnalysisHoneyNet SOTM 32 - Windows Malware Analysis
HoneyNet SOTM 32 - Windows Malware AnalysisChetan Ganatra
 
Computer technicians-quick-reference-guide
Computer technicians-quick-reference-guideComputer technicians-quick-reference-guide
Computer technicians-quick-reference-guideShathees Rao
 
Prizm Installation Guide
Prizm Installation GuidePrizm Installation Guide
Prizm Installation Guidevjvarenya
 
OSTU - Quickstart Guide for Wireshark (by Tony Fortunato)
OSTU - Quickstart Guide for Wireshark (by Tony Fortunato)OSTU - Quickstart Guide for Wireshark (by Tony Fortunato)
OSTU - Quickstart Guide for Wireshark (by Tony Fortunato)Denny K
 
Ubuntu Core 技术详解
Ubuntu Core 技术详解Ubuntu Core 技术详解
Ubuntu Core 技术详解Rex Tsai
 
Ubuntu getting started
Ubuntu getting startedUbuntu getting started
Ubuntu getting startedErnesto Celis
 

Similar to Backtrack Manual Part4 (20)

snortinstallguide
snortinstallguidesnortinstallguide
snortinstallguide
 
It04 roshan basnet
It04 roshan basnetIt04 roshan basnet
It04 roshan basnet
 
How to Use GSM/3G/4G in Embedded Linux Systems
How to Use GSM/3G/4G in Embedded Linux SystemsHow to Use GSM/3G/4G in Embedded Linux Systems
How to Use GSM/3G/4G in Embedded Linux Systems
 
26.1.7 lab snort and firewall rules
26.1.7 lab   snort and firewall rules26.1.7 lab   snort and firewall rules
26.1.7 lab snort and firewall rules
 
Best free tools for w d a
Best free tools for w d aBest free tools for w d a
Best free tools for w d a
 
Best free tools for win database admin
Best free tools for win database adminBest free tools for win database admin
Best free tools for win database admin
 
lamp technology
lamp technologylamp technology
lamp technology
 
Deepa ppt about lamp technology
Deepa ppt about lamp technologyDeepa ppt about lamp technology
Deepa ppt about lamp technology
 
56_Implementation
56_Implementation56_Implementation
56_Implementation
 
Linux
LinuxLinux
Linux
 
Freeware Security Tools You Need
Freeware Security Tools You NeedFreeware Security Tools You Need
Freeware Security Tools You Need
 
Parallel port programming
Parallel port programmingParallel port programming
Parallel port programming
 
HoneyNet SOTM 32 - Windows Malware Analysis
HoneyNet SOTM 32 - Windows Malware AnalysisHoneyNet SOTM 32 - Windows Malware Analysis
HoneyNet SOTM 32 - Windows Malware Analysis
 
App armor structure
App armor structureApp armor structure
App armor structure
 
Computer technicians-quick-reference-guide
Computer technicians-quick-reference-guideComputer technicians-quick-reference-guide
Computer technicians-quick-reference-guide
 
Prizm Installation Guide
Prizm Installation GuidePrizm Installation Guide
Prizm Installation Guide
 
OSTU - Quickstart Guide for Wireshark (by Tony Fortunato)
OSTU - Quickstart Guide for Wireshark (by Tony Fortunato)OSTU - Quickstart Guide for Wireshark (by Tony Fortunato)
OSTU - Quickstart Guide for Wireshark (by Tony Fortunato)
 
Ubuntu Core 技术详解
Ubuntu Core 技术详解Ubuntu Core 技术详解
Ubuntu Core 技术详解
 
Ubuntu getting started
Ubuntu getting startedUbuntu getting started
Ubuntu getting started
 
Software and its types
Software and its typesSoftware and its types
Software and its types
 

More from Nutan Kumar Panda

More from Nutan Kumar Panda (13)

Pentesting ReST API
Pentesting ReST APIPentesting ReST API
Pentesting ReST API
 
Dark Arts Of Social Engineering
Dark Arts Of Social EngineeringDark Arts Of Social Engineering
Dark Arts Of Social Engineering
 
OSINT Black Magic: Listen who whispers your name in the dark!!!
OSINT Black Magic: Listen who whispers your name in the dark!!!OSINT Black Magic: Listen who whispers your name in the dark!!!
OSINT Black Magic: Listen who whispers your name in the dark!!!
 
Rapid Android Application Security Testing
Rapid Android Application Security TestingRapid Android Application Security Testing
Rapid Android Application Security Testing
 
Win 8 password cracking
Win 8 password crackingWin 8 password cracking
Win 8 password cracking
 
Backtrack Manual Part10
Backtrack Manual Part10Backtrack Manual Part10
Backtrack Manual Part10
 
Backtrack Manual Part9
Backtrack Manual Part9Backtrack Manual Part9
Backtrack Manual Part9
 
Backtrack Manual Part8
Backtrack Manual Part8Backtrack Manual Part8
Backtrack Manual Part8
 
Backtrack Manual Part6
Backtrack Manual Part6Backtrack Manual Part6
Backtrack Manual Part6
 
Backtrack Manual Part5
Backtrack Manual Part5Backtrack Manual Part5
Backtrack Manual Part5
 
Backtrack Manual Part3
Backtrack Manual Part3Backtrack Manual Part3
Backtrack Manual Part3
 
Backtrack manual Part1
Backtrack manual Part1Backtrack manual Part1
Backtrack manual Part1
 
Google Hack
Google HackGoogle Hack
Google Hack
 

Recently uploaded

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 

Backtrack Manual Part4

  • 1.
  • 2. Use level 1, (-c 1). This uses the same type of inband, protocol based crash detection as level 2 but instead of pausing the fuzzer it just logs the crash details when a crash occurs and keeps fuzzing. This avoids you having to restart the fuzzer when a false positive occurs but it also means the fuzzer won't be paused when an actual crash occurs. This will result in every request that is sent to a dead target being logged (so basically thousands of crash log files). You can discern which caused the actual crash as it will be the earliest request logged in the continuous linear sequence of crash log files.
  • 3. Use level 3, (-c 3). This is what I always use if possible. It uses out of band, process based crash detection and is not susceptible to false positives. On the down side it requires you to set up crash detection script running on the target computer but that is just a case of running a single command and passing a few extra paramaters to VoIPER.
  • 4. This issue is resolved in version 0.07 but some VoIP applications have an annoying habit of not responding as they should while being fuzzed. As a result, it is recommended to use process based crash detection (-c 3) when at all possible. Macchanger - MAC Changer <br />Synopsis<br />macchanger [options] device <br />Description<br />macchanger is a Linux utility for viewing/manipulating the MAC address for network interfaces. <br />Options<br />macchanger accepts the following options: <br />-h, --help <br />Show summary of options. <br />-V, --version <br />Show version of program. <br />-e, --endding <br />Don't change the vendor bytes. <br />-a, --another <br />Set random vendor MAC of the same kind. <br />-A <br />Set random vendor MAC of any kind. <br />-r, --random <br />Set fully random MAC. <br />-l, --list[=keyword] <br />Print known vendors (with keyword in the vendor's description string) <br />-m, --mac XX:XX:XX:XX:XX:XX <br />Set the MAC XX:XX:XX:XX:XX:XX<br />Example<br />macchanger -A eth1 <br />Wireshark Wireshark is the network analyzer. This very powerful tool provides network and upper layer protocols informations about data captured in a network.Like a lot of other network programs, Wireshark uses the pcap network library to capture packets. The Wireshark strength comes from:- its easiness to install.- the simplicity of use of its GUI interface.- the very high number of functionality available.Wireshark was called Ethereal until 2006 when the main developer decided to change its name because of copyright reasons with the Ethereal name, which was registered by the company he decided to leave in 2006. Install everything that it comes with. WinPcap is a driver that Wireshark needs in order to run. It will be automatically installed when you install wireshark. You can find more information about WinPcap at winpcap.polito.it. <br />Now that we have Wireshark installed lets open it up, so I can show you how to use it. Wireshark should have made a folder somewhere in your start menu called Wireshark. Go ahead and run Wireshark. <br />Wireshark lets you<br /> quot; seequot; the data that is traveling across your network. <br />You can quot; seequot; what ports a program is using.<br /> You can basically see all the traffic on your network.<br />You can see what comes in and what is going out of your router. <br />You can see so much that it becomes a problem. You end up getting too much data. To fix this Wireshark comes with two very useful filters that we will go over here. The filters allow you to sort the traffic that you have captured making it much easier to read. Well lets start by clicking the Capture link at the top of your screen. Then click Options in the menu that drops down. <br />This is the window that allows you to define how to start capturing data with Wireshark. You can use the Interface drop down box to select which network card to capture data from. There will only be one option here, if you only have one ethernet card. Later on we will modify this page a bit. Now we need to tell Wireshark what to capture. Click on the Capture Filter button.<br />Put First Capture Filter into the Filter Name box. I want you to enter host followed by your ip address into the Filter String box. If you ip address is 192.168.1.2, the Filter String box would contain the following.host 192.168.1.2 We are telling Wireshark to capture everything coming from and going to your ip address. So we will get a log of all the traffic that is coming from or going to your computer. When you have finished those two changes click the Ok button at the bottom of this page. <br />You should now be back at the Capture Options window. Then click the Start button at the bottom of the screen. <br />You are now see packets as they are being sent to and from your computer. You might see a lot of traffic or just a little traffic depending upon how much is going on on your network. If you do not see any packets, try opening up a web page. If you still do not see captured data, then you probably have the wrong Interface selected on the Capture options window. When you have a couple packets, click the Capture option at the top of the screen and then Stop option in the menu that drops down. <br />Wireshark has captured some data as you can see on your screen. There are three frames here. I have labeled them as Frame 1, Frame 2, and Frame 3 in the picture above. Frame 1 shows you an overview of what packets came in and when out of your network. Frame 2 shows more detailed information about a selected packet. Frame 3 shows the hex data of the packet. We only really care about frame 1. <br />The source column tells us where the data was coming from and the destination column tells us where the data was going to. Both of these columns will always have ip addresses in them. The protocol column tells us what protocol that packet was sent with. Which is useful when trying to figure out what ports/procotols a program uses. The info box contains the information that we really need. The info box lists specific requests made over the network. It also lists what ports the data traveled on.<br /> Notice that every time a port is listed it is listed as a pair of ports. Data always travels on ports. It is send out of the source ip address on a port, and then received on the destination ip address on a port. These ports are rarely the same. Keeping that in mind, it is easy to see why there are two ports listed in the info box. The first port is the source port. Notice the > which you can think of as the word to. <br />From the first port > to the second port. I hope that I have explained enough to give you a general feel for the program. Check out the help section of the program for more capture filter options. Notice that there is also a filter box above the data you have captured. This is the dISPlay filter. It works like the capture filter, but allows you to filter data that has already been captured. Click the help button in the dISPlay filter window for examples of how to use it. <br />Snort(IDS/IPS) is a free and open source network intrusion prevention system (NIPS) and network intrusion detection system (NIDS) capable of performing packet logging and real-time traffic analysis on IP networks. Snort was written by Martin Roesch and is now developed by Sourcefire, of which Roesch is the founder and CTO. Integrated enterprise versions with purpose built hardware and commercial support services are sold by Sourcefire.<br />Snort performs protocol analysis, content searching/matching, and is commonly used to actively block or passively detect a variety of attacks and probes, such as buffer overflows, stealth port scans, web application attacks, SMB probes, and OS fingerprinting attempts, amongst other features. The software is mostly used for intrusion prevention purposes, by dropping attacks as they are taking place. Snort can be combined with other free software such as sguil, OSSIM, and the Basic Analysis and Security Engine (BASE) to provide a visual representation of intrusion data.<br />Konqueror is a web browser and file manager that provides file-viewer functionality to a wide variety of things: local files, files on a remote ftp server and files in a disk image. It is designed as a core part of the KDE desktop environment. It is developed by volunteers and can run on most Unix-like operating systems and on Windows systems, too. Konqueror, along with the rest of the components in the KDEBase package, is licensed and distributed under the GNU General Public License version 2.<br />The name quot; Konquerorquot; is a reference to the two primary competitors at the time of the browser's first release: quot; first comes the Navigator, then Explorer, and then the Konquerorquot; . It also follows the KDE naming convention: the names of most KDE programs begin with the letter K. <br />Konqueror came with the version 2 of KDE, released on October 23, 2000. It replaces its predecessor, KFM (KDE file manager).<br />Konqueror uses a very capable HTML rendering engine called KHTML. This engine is implemented as a KPart and as such, it can be easily used by other KDE programs. KHTML is also used by the Apple browser Safari. <br />Features of the HTML rendering component in KDE 3.4: <br />HTML 4.01 compliance.<br />ECMAscript 262 support (JavaScript). Notice that ECMAscript can still give problems because websites can detect browsers and choose to ignore Konqueror. Spoofing as another browser will often make sites work anyway.<br />Ability to house Java applets.<br />Cascading Style Sheets: <br />CSS 1: supported<br />CSS 2.1: supported (paged media only partially supported)<br />CSS 3 Selectors: supported<br />CSS 3 (other): Details about the visual media support can be found here. <br />DOM1, DOM2 and partially DOM3 support in ECMAScript and native C++ bindings.<br />Full support for bidirectional scripts (arabic and hebrew).<br />SSL support (requires OpenSSL).<br />Konqueror provides all the functionalities one will expect from a modern file manager, including navigation of the filesystem, file/folder copying, renaming, deletion and creation and application launching.<br />It is also able to display graphic image files and generate an image gallery web page from them. In addition. Konqueror is a standards-compliant web-browser and is perfectly capable of browsing the WWW on the Internet - just enter the website to go to in the Konqueror location bar.<br />The most obvious advantage of Konqueror (for people using KDE) is the great integration with the rest of KDE. And the article you mentioned isn't really that convincing. Of course, KHTML does support XHTML. And the rant about Konqueror being not only a browser but quot; a file manager, a web browser, a universal document viewer and a fully customizable applicationquot; is pretty flawed as the first comment points out. Konqueror is actually just a shell for various KParts (comparable to plugins). Those KParts have specific tasks (e.g. there's the KHTML part which renders HTML, there's the file manager part, there are multiple document viewer parts, etc.) and this makes Konqueror a lightweight but still very versatile application.<br />