Month: November 2009

DIG command explained with examples in Linux

In this post I am going to teach How to use DIG and with examples. DIG is one of the most important tool in debugging DNS server related issues. Some points to be noted about DIG. 1.DIG full-form/abbreviation is Domain Information Groper 2.DIG can work on command line or as well in batch mode 3.DIG supports Internationalized Domain Name(IDN) convections too. 4.DIG is more advanced than older tools such as nslookup and host commands. 5.DIG output have so much information than any other tool, such as Question/Answer/Authority sections (which we are going to discuses in this post) Usage1 : Using...

Read More

11 Basic Linux NMAP command Examples for System administrators

Learn nmap with examples NMAP(Network Mapping) is one of the important network monitoring tool. Which checks for what ports are opened on a machine. Some important to note about NMAP NMAP abbreviation is network mapper NMAP is used to scan ports on a machine, either local or remote machine (just you require IP/hostname to scan). NMAPis can be installed on windows, Sun Solaris machines too. NMAPcan be used to scan large networks, remember I am saying large networks. NMAPcan be used to get operating system details such as open ports, software used for a service and it’s version no, vendor of network card and up time of that system too(Don’t worry we will see all these things in this post. Please do not try to use NMAP on machines which you don’t have permission. Can be used by hackers to scan for systems for vulnerability. Just a funny note : You can see this NMAP used by Trinity in Matrix-II movie, when she tries to hack in to electric grid super computer. Note : MAN pages of NMAP is one of the best man pages I have come across. It is explained in such a way that even new user can understand what each option do and one more thing is that, it even have examples in to on how to use NMAP in different situations, when you have...

Read More

How To Use IPtables to Block ICMP (Internet Control Message Protocol) Requests?

How to use IPtables to block ICMP (Internet Control Message Protocol) requests? Ans : To do this we have understand why we require this thing should be done. When Hackers try to hack in to any machine first thing they will do is a basic ping test. Code :#ping target-machine If this is succeed they will come to a conclusion that system is up and they can go forward and they can do DDOS attacks or try to find some other open ports using NMAP command.Code :#nmap target-machineSo if you are exposing a machine to outer world from your network, first disable incoming ping requests to your machine as follows.So this can be done by two ways through IPtables 1. Reject the ICMP packets. 2. Drop the ICMP packets. In the above mentioned methods best thing is to drop the ICMP packets, by doing this we are not giving any clue to hacker whether the system is alive or not. Where as if we do reject definitely hacker will come to know that ICMP packets are blocked and the system is live. Step1 : Executing following command to drop all the incoming ICMP packets #iptables –A INPUT –p icmp –icmp-type echo-request –j DROP Let me explain this command -A is to append this rule to already existing one. INPUT specifies that it’s a Step2 : Save this changes to...

Read More

Over 16,000 readers, Get fresh content from “The Linux juggernaut”

Email Subscribe

ABOUT ME..!

My photo
My name is Surendra Kumar Anne. I hail from Vijayawada which is cultural capital of south Indian state of Andhra Pradesh. I am a Linux evangelist who believes in Hard work, A down to earth person, Likes to share knowledge with others, Loves dogs, Likes photography. At present I work at Bank of America as Sr. Analyst Systems and Administration. You can contact me at surendra (@) linuxnix dot com.