Diary of a Network Geek

The trials and tribulations of a Certified Novell Engineer who's been stranded in Houston, Texas.

8/24/2005

PERL OS Detection

Filed under: Apple,Fun Work,Geek Work,Linux,MicroSoft,Novell,PERL — Posted by the Network Geek during the Hour of the Tiger which is terribly early in the morning or 5:10 am for you boring, normal people.
The moon is a Third Quarter Moon

This is sort of the long way around, but…
Well, I have a dream. I dream of a single, giant PERL script that does a complete server inventory, no matter what version of operating system it’s running. Why? Look at my resume. Notice how many times I’ve changed jobs? Every time I hit a new gig, I look at their server documentation, if they have any, and ask how old it is. 80% of the time, no one knows how old it is. The rest of the time, it’s so old and out of date as to be totally irrelevant. Of course, no matter the state of their documentation, it always falls to me to create it or update it. Hence my quest for a single, glorious PERL script that checks everything that matters on an individual server and drops it into a report, or at least a text file that I can make into a report.
The biggest stumbling block to my vision of this splendiferous chunk of code has almost always been the first one: figuring out which operating system the target is running. Well, not any more. No, my faithful readers, including my ex-wife and her new meal-ticket, now I give you Step One in Uncle Jim’s Master Plan for Network Domination.
PERL OS Version checker

Well, at least yesterday wasn’t a total waste.

8/1/2005

PERL Scripts for Windows

Filed under: Fun Work,Geek Work,MicroSoft,PERL — Posted by the Network Geek during the Hour of the Tiger which is terribly early in the morning or 5:11 am for you boring, normal people.
The moon is a Third Quarter Moon

Oh, how sweet is this!?
So, I was looking around the other day for a PERL script that would send me an SMTP mail notification from a Windows 2000 server at a remote location, so that I’d know what their IP address had been changed to after a reboot. (It’s a long story, but it involves a VNC server, a cable-router, and a bad power grid.) And, whenever I search for this kind of thing, I go to my backup/long-term memory archive, Google, and do a search. Guess what I found? A whole set of web pages at Microsoft dedicated to Windows-centric system admin and monitoring PERL scripts. Oh, I think I’m in heaven!
I’ve been looking for this kind of thing for ages and ages. I have no idea why I never found it until now, but, well, here it is! Now, I can develop that massive, PERL-based auditing system that I’ve always dreamed of having! YEA!

3/14/2005

How Would You Do It?

Filed under: Advice from your Uncle Jim,Deep Thoughts,Fun,Fun Work,Geek Work,Life, the Universe, and Everything,Linux,PERL,Personal,The Network Geek at Home — Posted by the Network Geek during the Hour of the Hare which is in the early morning or 7:05 am for you boring, normal people.
The moon is a Third Quarter Moon

Attack someone’s network or website, that is.
Okay, this has been on my mind lately, not because I’ve done any actual hacking recently, since: a) that would be illegal and b) I haven’t done that sort of thing in, well, years. No, I’ve been thinking about it because, according to a friend of mine, at least one fan (short for “fanatic”) seems to think that I am not only capable of doing such things, but that I, in fact, have. And recently, too! As the French say, “It is to laugh…” So, as a thought experiment (that’s a mental exercise for you vocabulary impaired), here’s how I’d go about doing this, if I were, in fact, to do “ownz” someone’s “box”.
First off, I wouldn’t use a computer that I own, that can be traced to my ownership, or that uses an IP address that has ever been associated with my name. There are several ways around this, of course, including IP spoofing, anonymous remailers and other redirectors, and a compromised, third-party’s machine. That last one is the best, and, ironically, the easiest method. Surprised? You shouldn’t be. Compromised Windoze machines are a dime a dozen. There are hordes of script kiddies out there just hammering away at every weak Windoze machine they can ping. Also, there are more and more insecure Linux machines floating around out there, too. (Have you applied all the latest patches to your penguin box?) Or, if you know of any systems that you left behind at an unhappy employment situation, that are still vulnerable, you can use them. Usually, a corporation will have a nice, fat data pipe which makes your “job” faster and easier. Of course, if they have half a brain, after you leave, they’ll change all the passwords, but sometimes someone slips. (The last place I knew of like that from my own past finally, after three years, changed the passwords as part of an upgrade.) Or, you could simply go to a coffee house that offers free Internet access via a wireless network. Every time you change coffee houses, you change IPs. And, while I normally am just fine with industrial-strength institutional coffee, a nice cafe au lait from Cresent City is always nice. Or, according to this article on Slashdot, Panera Bread Company is a good place to find a free wifi link.
So, now you have one or more launching platforms from which to case your mark. (That there’s criminal slang that means “look at your ultimate hacking goal”.) What do you use to look for a way in? Well, there’s three that I’d recommend, based on reviews; Snacktime, Nessus and NMAP. Of the three, NMAP is, arguably, the more robust and well known. In fact, NMAP was used in The Matrix movies. Now, that, my faithful readers, is “geek cred”! Though Snacktime is interesting to me because it’s PERL-based. Now, if you’re not familiar with these three tools, just stop reading and go play with your IIS 6.0 webserver. We’re about to talk “big boy” stuff here and you just won’t be up to it. So, if you’re still man enough to be following this, you’d load up your lookeeloo tool of choice on your remote launch platform at this point and get a fingerprint of your target system’s OS.
Now, we get to the meat of this little mental exercise… Okay, you’ve got your “open door”, or “doors”, as it were, into your target system. At this point it’s a matter of taking the information from the nice, clean results that NMAP, or whatever, gives you and applying your exploit. What and how you do that really depends on what you’re attacking, but it’s pretty much a paint-by-numbers affair now, thanks to the legions of script kiddies that keep us up to date. Right, root access (or Administrator, if your target is foolish enough to run Windoze). Now what? Well, that sort of depends, doesn’t it? Do you want data? Start a background transfer to a third party that you can collect later. (Use ftp, tftp, or, for loads of sneaky fun, telnet, to transfer your data. Many admins disable logs on these protocols because they don’t think they’re running. Double check.) Want to install something? Go for it! (Try a keylogger. Now you’ll get loads of target passwords to compromise other machines for further adventures!) Just want to crash the system? You should have skipped all this hassle and just hit your target with a DDoS attack from your many compromised machines, stupid. (Incidentally, for you Windoze admins out there, the entire Code Red scare you sloppy bastards caused was all about a Distributed Denial of Service “issue”. )

Of course, this is all very illegal and somewhat morally questionable as well, so I would NOT do it. What’s more, I would not recommend that anyone else attack, hack, assault, fold, spindle or mutilate any system other than your own. In short, the Network Geek, RyuMaou.com and Jim Hoffman (yes, we’re all the same entity) does not in any way endorse any of the above listed activities, except the cafe au lait from Cresent City. In fact, I suggest that you do NOT do anything that I’ve written about in this entry, including flinging wild accusations that cannot be proven. That’s called “libel”, or, if you say it instead of write it “slander”. That’s against the law, too, the last time I checked.


Advice from your Uncle Jim:
"The Constitution of America only guarantees pursuit of happiness; you have to catch up with it yourself."
   --Gill Robb Wilson

1/17/2005

Why blog?

Filed under: Art,Career Archive,Criticism, Marginalia, and Notes,Dog and Pony Shows,Geek Work,Life, the Universe, and Everything,PERL,Personal,The Network Geek at Home — Posted by the Network Geek during the Hour of the Hare which is in the early morning or 7:16 am for you boring, normal people.
The moon is a Third Quarter Moon

Hmm, that’s a good quesiton….
A friend asked me why I blog the other day and it really got me thinking. Why do I blog?

Well, the reasons have changed over the years. Originally, I started “blogging” to chronicle my search for a job here in Houston. Well, it was also a way to try and drive traffic to my website so that the search engines would find my resume. That was almost five years ago, back before there was such a thing as blogging software. In the early days, I hand-coded every page and uploaded it. As one might imagine, I tried to make every “post” count back then. It was a real hassle! But, I kept posting things about my work. Often, I found myself out on the road doing strange things or going odd places for my work and I wrote about it. I tried to focus on the technical side of things, but every so often, I would throw in something strange about my personal life, like getting married.
Then, back in September of 2002, I heard about Moveable Type, which was the first really good blogging application. It ran on PERL and MySQL, which were things I wanted to learn, so it seemed like a good choice. And, it was. I was able to post more often and more easily than ever before. And, I was out of work, again, so I moved from work war stories back to the seemingly endless search for work. It was the Summer after Enron and IT work was hard to come by, so I started posting more and more about my own personal thoughts, hopes and dreams. The blog started to become much more personal. It was a place to vent my frustrations, though I did so carefully as I was ever mindful that a future employer might read my postings.
Somewhere in there, I also started my other blog on Fantasist.net. There I posted things that were purely fun for me. Nothing but cool science and fantasy stuff, some of my fiction and poetry, and just plain cool or weird things. It was there that I originally started posting my “Fun Friday” links. That carried over here and I’ve done my best to maintain that to this day.
Now, I’ve upgraded to WordPress and blogging couldn’t be easier or more fun. I’m still carefull about what I post. I have a fairly varied audience, some of which include family that might be under the age of 18, so I do my best to be intelligent without being insulting to too many people. I do my best to keep the profanity and “adult material” to a minimum, too, for the same reasons.

So, why do I keep posting? Well, I can always use the traffic, even if I am the #1 hit for “CNE Resume” on Google. But, mainly, it gives me a place to think out loud when no one is around for me to talk to about things. Blogging let’s me share my thoughts and dreams and, sometimes, fears with a larger world. A larger world that often responds with surprising kindness and sympathy, I might add. It’s my way of reaching out to fellow geeks who are stuggling with their own careers or lives and offer a bit of hope that they’re not alone.
Also, it’s a way for me to create a bit of immortality. To feel like a part of me will go on beyond my own limited life. To get my words and thoughts out into a larger world so that I might be remembered and understood.
So, why do you all read my blog? And, if you keep one, why do you blog?

10/19/2004

VMWare on Linux

Filed under: Fun Work,Geek Work,Linux,Novell,PERL — Posted by the Network Geek during the Hour of the Hare which is in the early morning or 7:20 am for you boring, normal people.
The moon is a Third Quarter Moon

Oh, this is cool.

Okay, so I’ve been doing a lot of work on Linux lately. Not only for the bootable ZENWorks imaging system, but just plain Linux stuff.
Last week, I set up a Red Hat AS2.1 machine for use as an FTP server, but, just as I was starting this for the folks who need it inhouse, they start talking about needing a Windows 2000 server to run some specialized print server for eMatrix, which is what the FTP server was for. So, my boss suggests that we use VMWare for Linux. Brilliant! Of course, most people are running VMWare on a Win32 machine and emulating Linux, but we think outside the box. No problem, I get it all installed and running, though the first time I ran the VMWare PERL script that set up the program, it failed. No reason for it to fail, as far as I could tell, because it ran the second time. Great, so I get it all installed an running and let the boss know. Then, he asks me, so what are we going to manage this machine with? Er…. VNC, I guess.
Right, so I get that setup on the Windows machine in VMWare without a hitch. Getting it installed on Red Hat wasn’t a problem, but getting it running…. Well, thankfully, I finally figured out that the Real VNC website has the answer on a page called Native X display Support. The only thing is I need to edit XF86Config-4 instead of XF86Config. No problem! Now the VNC server autostarts. And the boss asks me if I can get the VMWare session to automatically launch at reboot. Er…. Well, I can see what Google turns up!
What I eventually came up with was a shell script I called “xvmstart” that was as follows:

#!/bin/sh
# Written by JKH on 10-13-04
. /usr/bin/vmware -x /vmcfg/Windows2000Server/Windows2000Server.vmx

(Where vmcfg is where you stored your configurations for the virtual machines. Oh, and if the last line wraps around, that should be a three line script.)
I saved that file in /root/.kde/Autostart and rebooted. As soon as I logged in, BAM! VMWare loaded like a charm. So, now, I had to make this badboy autologin… Er, back to Google.
I finally found a forum that told me I had to edit /usr/share/config/kdm/kdmrc to set AutoLoginEnable=true and AutoLoginUser=skippy (or, whatever you want to autologin as). KerPlow! A fully automated solution brought to you by Linux, Google, VMWare, VNC, and me, the Network Geek.

I love my job!

9/9/2004

Cool Solutions: DFMail.pl

Filed under: Fun Work,Geek Work,News and Current Events,Novell,PERL,Personal — Posted by the Network Geek during the Hour of the Snake which is just before lunchtime or 11:29 am for you boring, normal people.
The moon is a Third Quarter Moon

A few comments about my Cool Solutions solution.

First, it’s best to run this as “perl –noscreen dfmail.pl”. Of course, this assumes that you copied this to your sys:perl\scripts directory first. I’ve gotten several e-mail (already!) about “errors”. Those shouldn’t show up with the –noscreen option. In fact, I think they’re just informational messages because I used the “-w” option in the first line of the script. That means “show warnings” to the PERL interpreter. If you remove that, just the “-w”, the script should run without those problems.
Second, you have to have the settings right on your mail server or it won’t send mail! If you’re getting a message that says “failed to connect”, or something similar, that’s what’s happening.

To be honest, I was somewhat suprised to see that this old thing had gone up on Novell’s Cool Solutions website. I actually wrote this stinker last year and posted an entry about it in February. I sent this to them about two months ago and just heard back. I had totally forgotten that I’d even sent it!
Anyway, it’s a pretty “quick and dirty” solution to an ugly problem at my old job. I ended up not even using it because we were so strapped for disk space that I had to actually delete PERL from those servers. Anyway, it’s a free monitoring tool that uses the “duct tape of the Internet”, PERL. You can see the actual entry here. If you like it, vote for it!

UPDATE: J�rgen Schmitz from Germany discovered that PERL version 5.06, which is native on netware 6 if you haven’t done any upgrades, etc., needs UCSExt changed to Perl2UCS
So, replace the first couple of lines with:
use Socket;
use strict;
use Perl2UCS;

my $server = Perl2UCS->new(“UCX:Server”) or die “Can’t get UCX:Server object”;
my $sname = $server->{“NAME”} or die “Can’t get NAME from ucx:server
object”;
my $volume_mgr = Perl2UCS->new(“ucx:volumemgr”) or die “Can’t get
ucx:volumemgr”;

That should do it!

8/13/2004

Novell Training Cruises!

Filed under: Fun,Fun Work,Geek Work,Novell,PERL — Posted by the Network Geek during the Hour of the Hare which is in the early morning or 7:24 am for you boring, normal people.
The moon is a Third Quarter Moon

It’s like a GeekCruise, but just for Novell Geeks!

A co-worker told me about Gioffre Consulting, who run training classes for Novell products on cruise ships. It’s just like the infamous “PERL Whirl” which I’ve seen advertised in the PERL Journal before, but with really cool Novell classes instead. And, get this, they’re just as expensive as a regular Novell class! Well, okay, you might have to pay some extra airfare to get to New York, but still, the rest is the same. How cool would that be!?! A Novell cruise…. Ah, heaven…..

Ah, well, it may be Friday, but I’m still stuck at the office! Maybe next year!

5/26/2004

More New Job News…

Filed under: Career Archive,Criticism, Marginalia, and Notes,Geek Work,Linux,Novell,PERL,Personal — Posted by the Network Geek during the Hour of the Monkey which is mid-afternoon or 4:36 pm for you boring, normal people.
The moon is a Third Quarter Moon

Sort of….

Okay, not really. I know I’m their “only candidate” and I know they’re talking to my head hunters, but that’s it. I’m fairly certain that the guy I’d be reporting to wants to hire me. We hit it off fairly well and he seems like a good guy. (He also has red hair like my current good boss. Coincidence?) So…
So, that must mean that it’s coming down to the “doh, re, mi”. The “cabbage”. The “green”. In short, MONEY. And, isn’t that always the way? I’ve actually tried three times now to get hired on at this company, because they’re a growing, dynamic, stable company that believes in technology and it all comes down to a few thousand dollars. The hell of it is, I’d work for less, if I could. I really would. The job is that good, at least on paper. But, honestly, I’ve given them my rock-bottom, “I’m starvin’ here!” price. God, I hope it’s low enough.

The real ugly part of it all is that now I find myself thinking,”What else could I possibly bring to the table to make me worth it?”. Like 10+ years of hard-core, hands-on experience with Novell isn’t enough, right? Like teaching myself PERL and Linux isn’t evidence of my ability to get in to it and figure it out? Like my years of supervisory experience doesn’t count for something? (Okay, maybe that actually doesn’t. I hated being a supervisor…)
Well, I do tend to play it low-key in interviews. I tend to not tout myself too much, lest I get in too far over my head. Besides, it’s the Scotty Factor. If I can surprise them the first week or two, I usually find that I quickly develop the reputation for being a miracle worker. You get more interesting projects when people think of you as the miracle worker.
So, here I am, to keyed up to do anything useful, questioning my own value as an IT worker, blogging to take the edge off.

God I want this job so bad I could vomit.

Tags: , , ,

3/9/2004

Review: Advanced Perl Programming

Filed under: Fun Work,Geek Work,PERL,Personal,Review,Things to Read — Posted by the Network Geek during the Hour of the Hare which is in the early morning or 7:10 am for you boring, normal people.
The moon is a Third Quarter Moon

It’s beyond me today, but…

Well, let’s just say this gives me something to shoot for in my PERL goals. I found Advanced Perl Programming on the discount shelf of a local bookstore, so I snapped it up, but it’s going to take me a while to “get” everything in this book. I mean, they’re talking about really advanced database access, incorporating C programs, and making GUI interfaces with Tk. That’s way, way beyond the little bit of text processing that I’ve managed with my own PERL efforts. Still, I’ve always felt that getting in “over my head” and fighting my way to the top, so to speak, is the best way for me to learn anything of value. And, it does tend to keep me challenged. So, while I love where this book is going, I probably need to stick with the PERL Cookbook. But, I’ll get there eventually. I swear it.

2/24/2004

End of a Web Era

Filed under: Art,Criticism, Marginalia, and Notes,Fun Work,Geek Work,News and Current Events,PERL,Personal,The Network Geek at Home — Posted by the Network Geek during the Hour of the Hare which is in the early morning or 7:22 am for you boring, normal people.
The moon is a Third Quarter Moon

Webmonkey is dead.

Or, at least it’s dying. According to this article on Wired News, almost eight years as the place to go to teach yourself HTML and related web coding, Webmonkey is shutting down. I learned some of my first PERL here, not to mention a lot of what I know about style sheets. Their tutorials made my sad, little web skills what they are today. I still use their reference materials when I’m looking up things like web color codes and special characters, not to mention their very handy Unix cheat sheet.
Well, all good things must come to and end, I suppose. I sure hope my wife puts some of the same kind of usefull information on her section of this website.

« Previous PageNext Page »

Powered by WordPress
Any links to sites selling any reviewed item, including but not limited to Amazon, may be affiliate links which will pay me some tiny bit of money if used to purchase the item, but this site does no paid reviews and all opinions are my own.