perl you need to know system admin
http://www.wdvl.com/Authoring/Languages/Perl/Manage/index.html --- perl for website management
http://www.wdvl.com/Authoring/Languages/Perl/PerlfortheWeb/toc.html -- perl you need to know
http://www.webreference.com/programming/perl/
http://www.wdvl.com/Authoring/Languages/Perl/PerlfortheWeb/toc.html -- perl you need to know
http://www.webreference.com/programming/perl/
xen install windows server
This tutorial will give you details on how to install virtualized windows on xen
pvcreate /dev/sdd
check withe the following command
( pvscan vgscan lvdisplay pvdisplay )
vgcreate VolumeGroup01 /dev/sdd
lvcreate -L50G -n windows1 VolumeGroup01
virt-install --name win2k8 –-hvm --ram 512 --disk path=/dev/VolumeGroup01/windows1,size=10 --network bridge=xenbr0 --vnc --os-variant win2k8 --cdrom /dev/scd1
withe the #xm list command you will see some things like this
[root@KB ~]# xm list
Name ID Mem(MiB) VCPUs State Time(s)
Domain-0 0 19966 16 r----- 7149.7
win2k8 14 4007 1 -b---- 286.9
make sure you have your /etc/xen/win2k8.cfg file like this :
name = "win2k8"
uuid = "5d61b35a-9b6d-3df0-f280-14457280bc79"
maxmem = 512
memory = 512
vcpus = 1
builder = "hvm"
kernel = "/usr/lib/xen/boot/hvmloader"
boot = "d" # changed from c to d
pae = 1
acpi = 1
apic = 1
localtime = 1
on_poweroff = "destroy"
on_reboot = "restart"
on_crash = "restart"
device_model = "/usr/lib64/xen/bin/qemu-dm"
usb = 1
usbdevice = "tablet"
sdl = 0
vnc = 1
vncunused = 1
vnclisten = "192.168.1.134" # this is the Dom0 ip address
keymap = "en-us"
disk = [ "phy:/dev/VolumeGroup01/win2k8,hda,w", "phy:/dev/scd1,hdc:cdrom,r" ]
vif = [ "mac=00:16:36:4d:65:ca,bridge=xenbr0,script=vif-bridge" ]
parallel = "none"
serial = "pty"
now with the vncviewer client on your desktop connect to 5914 ( see how to get the port number )
[root@KB ~]# xm list
Name ID Mem(MiB) VCPUs State Time(s)
Domain-0 0 19966 16 r----- 7149.7
win2k8 14 4007 1 -b---- 286.9
cloning the server use the following command
virt-clone --original=win2k8 --name=win2k8a --file=/dev/VolGroup01/win2k8a
things to learn
Experience with scripting languages (PHP, HTML/HTML5)
Knowledge in OOP and MVC methodologies
Experience with open source databases (MySQL)
Working knowledge of browser front end engineering (Javascript, CSS, DOM)
Experience consuming and creating web services (REST)
Knowledge and experience with Apache web server and other language specific OSS servers
Knowledge of XML, JSON formats
• 1. Good Knowledge of Client server architecture.
• 2. Good knowledge of security vulnerabilities (Eg: OWASP Top 10 vulnerabilities but, not limited only to the Top 10 vulnerabilities)
• 3. Experience in penetration testing and exploiting the vulnerabilities manually.
• 4. Experience on any Vulnerability scanners like Paros, WebScarab, BurpSuite, WebInspect, Nessus etc. Also, should be able to analyze the scan reports for false positives and false negatives.
• 5. Should have sound knowledge on communication protocols like HTTP, SSL, SSH, FTP, SFTP etc.
• 6. Desire to update themselves with the new technology, vulnerabilities and techniques to exploit.
• 7. Experience in Web Service security testing.
• 8. Experience in any scripting languages like shell, python or perl scripting.
• 9. Experience in testing flash application testing is preferred.
• 10. Good knowledge web page description languages like HTTM, XML, PHP etc.
• 11. Knowledge of how encoding and encryption works.
• 12. Should be able to debug logs.
• Network Security testing:
• Good knowledge on all the Communication Layers.
• Good knowledge on SSL, encryption and cipher algorithms
Knowledge in OOP and MVC methodologies
Experience with open source databases (MySQL)
Working knowledge of browser front end engineering (Javascript, CSS, DOM)
Experience consuming and creating web services (REST)
Knowledge and experience with Apache web server and other language specific OSS servers
Knowledge of XML, JSON formats
• 1. Good Knowledge of Client server architecture.
• 2. Good knowledge of security vulnerabilities (Eg: OWASP Top 10 vulnerabilities but, not limited only to the Top 10 vulnerabilities)
• 3. Experience in penetration testing and exploiting the vulnerabilities manually.
• 4. Experience on any Vulnerability scanners like Paros, WebScarab, BurpSuite, WebInspect, Nessus etc. Also, should be able to analyze the scan reports for false positives and false negatives.
• 5. Should have sound knowledge on communication protocols like HTTP, SSL, SSH, FTP, SFTP etc.
• 6. Desire to update themselves with the new technology, vulnerabilities and techniques to exploit.
• 7. Experience in Web Service security testing.
• 8. Experience in any scripting languages like shell, python or perl scripting.
• 9. Experience in testing flash application testing is preferred.
• 10. Good knowledge web page description languages like HTTM, XML, PHP etc.
• 11. Knowledge of how encoding and encryption works.
• 12. Should be able to debug logs.
• Network Security testing:
• Good knowledge on all the Communication Layers.
• Good knowledge on SSL, encryption and cipher algorithms
sendmemail Net::SMTP
#!/usr/bin/perl
use strict;
use warnings;
use Net::SMTP;
use Getopt::Long;
my $from = '' || 'system@server1.com' ;
my $sub = '' || 'this is a testmail';
my $content = '' || 'this is a data';
my $to;
my $relayhost = '' || 'localhost';
GetOptions(
'from|f=s' => \$from ,
'to|t=s' => \$to,
'sub|s=s' => \$sub ,
'content|c=s' => \$content,
'relayhost|h=s' => \$relayhost );
die 'usage: sendmemail.pl--to name@email.com' unless( $to );
my $smtp = Net::SMTP->new("$relayhost",
Debug => 1,
);
$smtp->mail($from);
$smtp->to($to);
$smtp->data();
$smtp->datasend("Subject: $sub");
$smtp->datasend("\n");
$smtp->datasend("\n");
$smtp->datasend("$content");
$smtp->dataend();
$smtp->quit();
use strict;
use warnings;
use Net::SMTP;
use Getopt::Long;
my $from = '' || 'system@server1.com' ;
my $sub = '' || 'this is a testmail';
my $content = '' || 'this is a data';
my $to;
my $relayhost = '' || 'localhost';
GetOptions(
'from|f=s' => \$from ,
'to|t=s' => \$to,
'sub|s=s' => \$sub ,
'content|c=s' => \$content,
'relayhost|h=s' => \$relayhost );
die 'usage: sendmemail.pl--to name@email.com' unless( $to );
my $smtp = Net::SMTP->new("$relayhost",
Debug => 1,
);
$smtp->mail($from);
$smtp->to($to);
$smtp->data();
$smtp->datasend("Subject: $sub");
$smtp->datasend("\n");
$smtp->datasend("\n");
$smtp->datasend("$content");
$smtp->dataend();
$smtp->quit();
Subscribe to:
Posts (Atom)