Details

This time on the show we're tunneling our traffic through multiple servers with proxychains. Plus, safe password keeping and Active Directory authentication for Linux. All that and more this time on Hak5.

 

Download HD | Download MP4

 

This time on the show we're tunneling our traffic through multiple servers with proxychains. Plus, safe password keeping and Active Directory authentication for Linux. All that and more this time on Hak5.

If you're into Hak5 you'll love our new show by hosts Darren Kitchen and Shannon Morse. Check out http://www.revision3.com/haktip

Whether you're a beginner or a pro, http://www.revision3.com/haktip is essential viewing for current and aspiring hackers, computer enthusiasts, and IT professionals. With a how-to approach to all things Information Technology, HakTip breaks down the core concepts, tools, and techniques of Linux, Wireless Networks, Systems Administration, and more.

And let's not forget to mention that you can follow us on http://www.twitter.com/hak5 and http://www.facebook.com/technolust, http://revision3.com/hak5/follow to the show and get all your Hak5 goodies, including the infamous wifi-pineapple over at http://hakshop.com . If you have any questions or suggestions please feel free to contact us at feedback@hak5.org.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

5 Comments

  • Malachai 3 years ago

    After finding out on Itunes you were doing a show on proxy I was so happy. Just last night i was trynig to understand how they work. from watching the show seen that you need multi connections to different servers. now my question is all the server you connect to are they free or do you have to pay service for them? other thing I have a big thing with privacy and stuff. I say 80% of the time i use the tor network.

    How and where would I get some good servers to connect too? if i have to pay then which service do not share log files to other compay or law groups?

    Thank you.

  • Geit Bent 3 years ago

    thank you for this also loved that movie also another show about rerouting The pretender

  • Stuart Luscombe 3 years ago

    I set up the AD -> Linux hack some time ago. It does require some messing around on both ends to get it going but once you have it set up it works great. I have all Linux users logging in using their AD credentials and even manage groups the same way.

  • In response to your viewer question about using Windows AD credentials to log into Linux machines, Centrify makes it really easy to add Linux machines to a Windows domain. The best part is that the agent is free.

  • Your article is very well-written, and informative. It’s just the kind of information I’ve been looking for my research project. I feel you have touched on some fine valid points.

  • I really like reading a post that can make men and women think.
    Also, thank you for allowing me to comment!

  • I have been browsing on-line greater than three hours these days,
    yet I by no means found any attention-grabbing article
    like yours. It’s lovely price enough for me. In my opinion, if
    all site owners and bloggers made just right content as you probably did, the
    net can be much more useful than ever before.

  • Having picked fast and furious legacy videos out 8 most beautiful females out
    of the mobile game, all types of apps.

  • According to the reports from foreign media, the pattern of game
    industry, but” there are some serious marketing possibilities from your cell phone. There are the desktop versions of this type rarely managing to deliver scores within 6 hours! You are able to compete, even so the tutorial will be able to play it like bluetooth, statue boom beach LAN, GPRS etc. The game has potential to be great fun, and grow in challenges the more you cannot extricate yourself.

  • In addition to this, web applications based on this language
    got the hack boom beach ios recognition of secured web application in virtual arena.

  • Hi this is kinda of off topic but I was wanting to know if blogs use WYSIWYG editors or if you have
    to manually code with HTML. I’m starting a blog soon but have no coding skills so I wanted
    to get advice from someone with experience. Any help
    would be enormously appreciated!

  • When buying games for kids are to be fulfilled.
    Fireball is one of the major services provided to mobile users.
    True HD-IPS + LCDCameraRear/Front13 boom beach hammerman’s hq 10 MP/2.
    On the other hand, these games are free of charge and it will cost
    you USD 4.

  • This article gives clear idea for the new viewers of blogging, that in fact how to
    do running a blog.

  • I am really inspired together with your writing talents and also with the layout in your blog.
    Is that this a paid subject or did you customize it yourself?
    Either way stay up the excellent quality writing, it’s
    uncommon to peer a great blog like this one today..

  • Hi! I know this is kinda off topic however , I’d figured I’d ask.
    Would you be interested in trading links or maybe guest writing
    a blog article or vice-versa? My site discusses a lot of the same
    subjects as yours and I feel we could greatly benefit from each other.
    If you happen to be interested feel free to send me an email.

    I look forward to hearing from you! Wonderful blog by the way!

  • I absolutely love your blog and find a lot of your post’s to
    be just what I’m looking for. can you offer guest writers to write content to suit your needs?
    I wouldn’t mind composing a post or elaborating on a number of
    the subjects you write about here. Again, awesome web log!