Windows

Using built in Windows tool to secure wipe free disk space

So your working and had to make a backup copy of the CEO’s outlook data file onto your local computer. After your work on his or her mailbox you delete the backup.  So you think!  We know this isn’t the true and with the many free and paid tools out today a person would attempt to recover data.

There is where CIPHER comes in.

Cipher is a command-line tool (included with Windows) that you can use to manage encrypted data. It can also be used to clean the white space (unused space) on your hard drive.

Let’s get to using this shall we

First open an command prompt as Administrator.

Type cipher /? to list the syntax for the commands.  As you can see there is a lot this little tool can do.  More on this at another time.

So in my case I wanted to wipe all the free space in volume d:\ of my Windows system.  By typing cipher.exe /w:d <press enter> and I am now able to wipe the free space and any trace of my CEO’s backed up mailbox.

Now just sit back and wait until completed and your done.  Simple and effective.

 

Let’s recap

I wanted to delete the free disk space on my computer to remove the ability of data being recovered.

To do this I opened a command prompt (as administrator)
While in the command prompt typed in cipher /w:d (d being my drive)

Ref: http://support.microsoft.com/kb/298009

Update: 07/05/2017  – You could also start off by being sure that all drives were encrypted with something such as bitlocker before moving critical data onto it.

Win32DiskImager

If you ever needed to clone a USB, SD Memory card, etc. Using Win32DiskImager is a excellent program tool for the job.

Win32DiskImager, enabled you to save and restore raw images to removable media.  I have been using this for my Raspberry Pi installs and other USB Bootable media as a way to quickly backup and restore without having to do full re-installs.

 

 

How to Root Galaxy S4!

This is a video by our buddy Zedomax on rooting the Galaxy S4. This method is only for root access, its not a video on installing custom recovery, so please enjoy and remember to subscribe to his YouTube Channel.

.

This method works on all Qualcomm Galaxy S4 running Android 4.2.2 including:
AT&T SGH-i337, T-Mobile SGH-M919, Sprint SPH-L720, Verizon, US Cellular, Telus, .
Rogers, etc…

For GT-i9500 octa-core S4, see other root method here:
http://www.youtube.com/watch?v=1VZd71…

Download and Step-by-Step tutorial here:
http://galaxys4root.com/galaxy-s4-roo…

For rooting Galaxy S4 on Linux/Ubuntu, please see this video instead:
http://www.youtube.com/watch?v=JIAbdV…
For rooting Galaxy S4 on Mac OSX, please see this video instead:
http://www.youtube.com/watch?v=q5Sluq…

For more awesome info on rooting the Galaxy S4 stop over at http://GalaxyS4Root.com

HowTo: Export Putty Sessions

I just rebuilt my workstation and now on the new system I would like to have all my saved Putty sessions. Putty doesn’t have a built in export feature for this. So I went looking for where Putty store its sessions info.

As there it is. In the registry, like so many other things. Here are some quick steps to do this:

  1. From the run prompt (shortcut keys: WinKey+R) enter regedit,, this opens the registry editor
  2. Locate the following branch: HKEY_CURRENT_USER\Software\SimonTatham\PuTTY\Sessions
  3. On the File menu, click Export
  4. In File name, enter a name for the registry file; In my case I named this Putty_Sessions
  5. Choose a location to save the file; You can now copy this file and import your the sessions data on the new system.

Update: I changed the export to the following

[HKEY_CURRENT_USER\SOFTWARE\SimonTatham]

PowerShell: Get basic network adapter properties

Get-NetAdapter cmdlet returns to you the basic network adapter properties of visible adapters installed on your system. This is a very useful tool to gather some details about your installed network adapters.

More info and features can be found here: http://technet.microsoft.com/en-us/library/jj130867.aspx

 

Get to Network Connections UI by using “ncpa.cpl”

Looking for a quick way to get to your network connections: Control PanelNetwork and InternetNetwork Connections

From the run prompt (shortcut keys: WinKey+R) enter ncpa.cpl. You will immediately open a window that takes you to the network connections UI without traveling thought the network sharing center.

If you want to create a quick shortcut you can file this in the following location: “C:WindowsSystem32ncpa.cpl

This works in Windows 7, Windows 8, Server 2008 (and R2) along with Server 2012

More info: Description of Control Panel (.cpl) Files

So go; Run, you silly boy. And remember

Some Basic Use of Nmap

Nmap (“Network Mapper”) is a free and open source utility for network discovery and security auditing. I along with many other systems and network administrators also find it to be a useful tool for the right job. Nmap can be installed and used in Windows, and mostly common in Linux distributions such as Debian and the well known Ubuntu.

You can get the Windows install form http://nmap.org/ along with the Linux versions.  In Linux (Debian) I simple sudo apt-get install nmap -y and the rest is done in a few seconds.

Now that you have Nmap, what can you do? Here are some examples I use every so often:

~# nmap google.com – gives me info about google.com (Hostname google.com resolves to 11 IPs..)

~# nmap 192.168.1.0/24 – scans my network and return info on machines and service ports listening

~# nmap -sP 192.168.1.100 – attempts to detect if a host is up or down

~# nmap -PN 192.168.1.100 – attempts to detect if a host is up or down (no pings sent)

~# nmap -sT 192.168.1.100 – port scan using TCP

~# nmap -sU 192.168.1.100 – port scan using UDP

~# nmap -O 192.168.1.100 – attempts to identify the remote OS, returns TCP/IP fingerprint

And I could go on, but lets just end these example here and I’m sure you’ll find others.

Run … run, you clever boy … and remember. – Clara Oswald

Extending Windows 8 Trial


I have been using the Windows 8 Enterprise for several months this way for testing rather than backup my data and reinstall the OS just to reinstall my applications, followed by configuration tweaks, which can be time consuming. I have started extending the trail to give me more time.

The process of extending a trial is called ‘rearming’.
Here is how I have done so:

  1. Open the command prompt as (Admin) | Answer Yes to the User Account Control
  2. You can then check your license information by typing slmgr /dli – this provides information on your version and license status.
  3. You could also use the command slmgr /dlv for more detailed information – good to give you status of how long you have before complete expiration of your trial 

If you just want the expiration date info type: slmgr /xpr

And finally what you have been waiting for: The rearm command.
Like the ones I mentioned above all you need to do is type: slmgr /rearm then reboot the computer.

This can be done no more than 3 times of the life of the install of the Windows 8 system. If you time it correctly you could have Windows 8 for free for 270 days. How cool is that.

Info on my test machines:
1 Physical Machine and 2 Virtual Machines (VMware)

Filter netstat results with the Find Command

Here is a simple way to find results you might be looking for when running a command such as netstat on your computer or server. The following example should help you get an idea of how to use this in information gathering

Command Prompt Example - www.jermsmit.com Issuing the following command: “netstat -an | find /I “established” gave me the results above. So play around and discover what you can do. It’s fun, you learn things and who knows. You may find this to be of good use to you.  For example: You want to know how many connections are established to your web server.

Play Minecraft through TOR

This little how-to is more of a way to pass socks proxy parameters to a java app, however my focus here is on doing this with the Java game Minecraft over the TOR Network.

Why you ask? Because I wanted to know if it was possible and if I could do it.

Items Needed:

  1. Minecraft Account
  2. Java Installed (Latest Version)
  3. Minecraft installed and up to the current date.
  4. Windows OS – I’m using Windows 8 at this time

Open notepad and add the following values into it:
@ECHO OFF
cd C:Program Files (x86)Javajre7bin
java -DsocksProxyHost=127.0.0.1 -DsocksProxyPort=9050 –Xmx1024m -jar Minecraft.exe

The above will work with any SOCKS proxy and not limited to TOR. I am using the above as these are the defaults to TOR

Save the file at TOR-Minecraft.bat and run it. If all work as planned you will see the console open followed by the Minecraft UI. You can now connect to any remote server and you should be passing all your data through the TOR network.

Info on Minecraft: https://minecraft.net/

Info on TOR: https://www.torproject.org/

 

 

Did you like this post, please stop by my Facebook Page and give us a Like