Jump to content

ZazenSec

Active Members
  • Posts

    17
  • Joined

  • Last visited

  • Days Won

    1

Posts posted by ZazenSec

  1. Virtual machines will still have their own IP addresses so you can filter by that as long as they're on another vlan.

    This *might* work. But I don't have your type of setup so I really can't test it.

    iptables -I FORWARD 1 -s 192.168.1.xx -d 192.168.2.xx -p tcp -m multiport --dports 21,80,443,3389 -j ACCEPT
    
    iptables -I FORWARD 2 -m state --state ESTABLISHED,RELATED -j ACCEPT
    
    iptables -I FORWARD 3 -s 192.168.1.xx -d 192.168.2.xx -p all -j DROP
    

    Pretty much it says if your source is trying to get to this destination, only allow this protocol(TCP) and only allow it to access these ports. If it's anything else trying to get to this IP, drop the traffic.

    And GoDaddy has quite a large infrastructure with some pretty crazy virtual switch and layer 3 switch setups. :P

  2. Guess I'll give this a go.

    Favourite game: KOTOR II

    Favourite OS: Fedora/Win7

    Favourite console: Xbox 360

    Nationality: US

    Accent: The sexy kind

    Sex: Male

    Age: 25...I think

    Race: Messican

    Height: 6'2"

    Status: Taken

    Build: Athletic with some punching bags attached.

    Favourite band: Depends on the mood. Tool/Miles Davis/Sid Phillips/Sevendust/Children of Bodom/Lacuna Coil are all pretty much tied.

    Favourite book: I'm a sucker for Star Wars.

    Favourite author: Don't have one.

    Favourite movie: Who Framed Roger Rabbit?

    Favourite director: Takashi Miike

    Favourite TV Show: Family Guy

    Favourite actor: Johnny Depp

    Favourite actress: Natalie Portman/Kate Beckinsale/Olivia Wilde. :yum:

    Favourite Pinup: I'll just say that I'll take all of the suicide girls.

    Favourite Comedian: I suppose that would be Eddie Izzard.

    Other hobbies: Reptiles, yo-yos, motocross(long live 2 strokes!), snowboarding, mountain biking, running, weight lifting, making emo kids more emo, making little kids think that the Slipknot masks are made from the skin of children that they kidnap in the night.

    Car: 1999 Ford Ranger XLT 4x4

    Occupation: Slacker, consultant, designer

  3. Honestly a deny all access list for it would probably work better, but I don't think DD-WRT has that type of functionality. Another way would be to use the deny feature using the Access Restrictions. But for adding for an IP table, the command would look something like this:

    iptables -I FORWARD -d IP ADDRESS -j DROP

    Or if you wanted it to generate a log to see if someones really trying to get into it, use:

    iptables -I FORWARD -d IP ADDRESS -j logdrop

  4. So, after a bit more research, I have found my answer. I was missing the line:

    using namespace std;

    Which should go directly under "#include <iostream>"

    I'm not quite sure why this tutorial does not contain this information. Not to be deterred, I will continue on my journey.. maybe I'll get a wild hair and rewrite this book using the perl documentation I learned with as a template if I am constantly having to search for answers as I go along. Should someone come behind me and wish to learn, but has any issues, feel free to PM me- I would be more than happy to provide whatever assistance I can.

    I would also like to make note that <iostream.h> is incorrect in C++, this would be correct in C.

    It's an old, pre-standard iostream. Visual Studio used to handle it but yes, it's not something you want to use. If you want some other stuff, hit up youtube and look up StanfordUniversity. They have CS 106 lectures that's mainly on C++ so that may give you some additional insight.

    • Upvote 1
  5. I have been messing with programming and computers since Intellivision and Windows 3.1 era. I have taken TONS of courses and read lots of books and I am still learning each day. You have to start with the basics and build.

    This. Without the basics you'll never fully grasp how things work nor be able to create your own attacks. Learn how computers receive/view/send data through a network. How routers see packets and know how to route them. How web servers interpret data and process requests. I learned a good deal just by learning the OSI model. And learn HOW they work. EG: If someone asks you how a MITM attack works, be able to explain it in detail rather than "You just trick the computers into thinking you're their network/website."

  6. CCNA is good for three years. Not one. And if you want a solid game plan, get your CCNA, then when it comes to recertify go for your CCNP. That will recert your NA and give you the NP which will open your doors that much more. Right now the hotness is in security, cloud computing, and VMs.

×
×
  • Create New...