While compiling some earlier versions of bluez, which provides support for core bluetooth layers and protocols, I ran into a minor error. The error complained about no check being available. Read below to see the initial error when running ./configure and how to install the check package to resolve the errors. Installing the check package will fix this problem likely on any platform but for sure on Ubuntu 10.04 since Backtrack Linux is currently built on that platform.
When I need to use Windows either for Microsoft Office products or some other reason I find myself in Notepad++ a lot. Notepad++ is a great free tool that provides a ton of functionality including the ability to easily add plugins, etc. One great feature of Notepad++ is the Regular Expression capabilities when using find/replace. If you wanted to add data to the beginning of each line or add data to the end of each line you can easily do so using find and replace with Regular Expressions enabled as shown in the below examples.
While troubleshooting some issues with pwntcha which is installed by default on Backtrack Linux version 5 R3 I received some errors compiling pwntcha from source. The Imlib2 development files need to be installed before compiling pwntcha from source on Backtrack Linux 5 R3 or Ubuntu 10.04. Below I provide the output from the pwntcha compile errors as well as show the install command for the package that needs to be installed before pwntcha will compile without errors.
Clicking on the genlist menu item in Backtrack Linux opens a terminal window and outputs the genlist help menu at the top. Genlist is a Perl script written to provide an easy way to generate a list of live hosts on a network or set of networks so you can then begin analyzing those hosts. All the genlist Perl script does is call nmap with the -sP switch and parse the results so only the live IP addresses are output and as simple as it seems its a handy little tool if you do penetration testing on a regular basis. Below we describe genlist in more detail and show an example of genlist in action.
The cisco-ocs application available in the Backtrack menu ( Backtrack > Vulnerability Assessment > Network Assessment > Cisco Tools ) is also known as cisco-ocs Mass Scanner. This tool provides a single function which is to scan large ranges of IP’s looking for Cisco devices or really any device listening on TCP port 23, attempts to login using telnet with a password of cisco, then passes the enable command to the Cisco router if its able to login via telnet, uses cisco again for the enable password, and finally reports a success if its able to get to the enable prompt using these exact steps. Unfortunately this is the only function of the tool as you cannot specify a wordlist of passwords to attempt or for that matter you cannot set anything accept for the range of IP addresses to scan. Below we should a couple examples of the Cisco-OCS Mass Scanner working on Backtrack 5 R3.