Skip to content
Question Defense
Technical answers for technical questions
Question Defense
  • Backtrack Linux
    • Backtrack Article Request
  • HTTP ERROR
  • Kali Linux
    • Kali Linux Article Request
  • Privacy Policy
  • Tools
    • Class Of Device – Bluetooth CoD List In Binary And Hex
    • phpMyAdmin Blowfish Secret Generator
  • Documentation
    • check_postgres.pl
    • Linux Man Pages
      • insmod
      • kill
      • Logrotate
      • ls
      • lsmod
      • mail
      • modprobe
      • more
      • mysqldump
      • ntfsprogs
      • ntfsresize
      • pg_dump
      • psql
      • rmmod
      • screen
    • Monarch
      • Monarch Commands
      • Monarch Control
      • Monarch Escalations
      • Monarch Groups
      • Monarch Management of Nagios Hosts
      • Monarch Managing Nagios Contacts
      • Monarch Managing Nagios Hosts
      • Monarch Profiles
      • Monarch Services Template
      • Monarch Time Periods
      • Monarch Tools
  • Tags
  • Contact
Linkedin page opens in new windowTwitter page opens in new window
Search:
Search
  • Backtrack Linux
    • Backtrack Article Request
  • HTTP ERROR
  • Kali Linux
    • Kali Linux Article Request
  • Privacy Policy
  • Tools
    • Class Of Device – Bluetooth CoD List In Binary And Hex
    • phpMyAdmin Blowfish Secret Generator
  • Documentation
    • check_postgres.pl
    • Linux Man Pages
      • insmod
      • kill
      • Logrotate
      • ls
      • lsmod
      • mail
      • modprobe
      • more
      • mysqldump
      • ntfsprogs
      • ntfsresize
      • pg_dump
      • psql
      • rmmod
      • screen
    • Monarch
      • Monarch Commands
      • Monarch Control
      • Monarch Escalations
      • Monarch Groups
      • Monarch Management of Nagios Hosts
      • Monarch Managing Nagios Contacts
      • Monarch Managing Nagios Hosts
      • Monarch Profiles
      • Monarch Services Template
      • Monarch Time Periods
      • Monarch Tools
  • Tags
  • Contact

Tag Archives: 80

You are here:
  1. Home
  2. Entries tagged with "80"

Information Security

genlist – Backtrack – Miscellaneous – Miscellaneous Network – genlist

SecurityBy alexJanuary 6, 2013Leave a comment

Clicking on the genlist menu item in Backtrack Linux opens a terminal window and outputs the genlist help menu at the top. Genlist is a Perl script written to provide an easy way to generate a list of live hosts on a network or set of networks so you can then begin analyzing those hosts.…

Information Security

apache stop – Backtrack – Services – HTTPD – apache stop

SecurityBy alexDecember 12, 2012Leave a comment

The apache stop menu item in Backtrack Linux accomplishes one goal which is to stop the Apache web server. The previous article for apache start would have been enough to explain the basics to anyone using Apache on Backtrack Linux but since my goal is to write an article for every menu item and every…

Information Security

apache start – Backtrack – Services – HTTPD – apache start

SecurityBy alexDecember 11, 2012Leave a comment

Backtrack Linux offers a lot to people of all skill sets and I really appreciate the thought that the developers have put behind making this a operating system platform that is friendly to all. In my experience there are penetration testers or information security enthusiasts of all levels and having Backtrack as a platform to…

Technology Insights

List All IP Addresses Making Port 80 Connections To Linux Server

InsightsBy alexJune 18, 2012Leave a comment

Earlier while analyzing a Linux server it was pointed out to me that the Apache logs were filling up with constant connections requesting domains that were not configured on the server. To me it looked as if a load balancer somewhere was misconfigured and sending traffic to our IP address by mistake but I needed…

Information Security

Backtrack 5: Information Gathering: Network Analysis: Identify Live Hosts: 0trace

SecurityBy alexMarch 30, 20122 Comments

I remember being so happy about 0trace when I started to write some Backtrack related articles because even though 0trace is fairly simple it is really useful to locate the full path to devices you are investigating. In the article below I will explain the necessary 0trace input from the command line, what needs to…

Technology Insights

Start DD-WRT Apache From Command Line, Enable HTTP From DDWRT CLI

InsightsBy alexFebruary 21, 2011Leave a comment

The other day while configuring a Asus RT-N16 wireless router we had installed DD-WRT software on I decided to turn off HTTP access to the web admin interface. After making this change I got pulled away to test something else and never tested it so I was surprised when I attempted to login today and…

Technology Errors

Litespeed Error Log:[ERROR] Swapping directory is not writable:/tmp/lshttpd/swap/

ErrorsBy alexAugust 20, 2010Leave a comment

I booted up a server yesterday that I had not used in quite a long time and had some issues right from the beginning. I remembered the server working the last time it was live so I was assuming I could boot it up and test something on the ruby application that was installed on…

Technology Insights

Restart DD-WRT Web Server Using The Command Line From An SSH Connection

InsightsBy alexNovember 1, 200921 Comments

I have a Linksys WRT54G wireless router running DD-WRT open source firmware. A lot of the work I do requires providing access to clients or coworkers to various devices on my local network. I also view the DD-WRT web interface regularly on the Linksys WRT54G to see what devices it can see on the network…

Technology Insights

Capture Skype VoIP Call Packets On Your Windows XP Computer Using Wireshark

InsightsBy alexOctober 16, 2009Leave a comment

There are various reasons why you may want to log the incoming packets for your Skype messaging client. You can log both calls and instant messages made via your Skype client using Wireshark. Wireshark is a free utility that can be used to log any traffic on your computer.

12
Question Defense
© 2021 question-defense.com
Go to Top