This time on the show we're tunneling our traffic through multiple servers with proxychains. Plus, safe password keeping and Active Directory authentication for Linux. All that and more this time on Hak5.

Download HD Download MP4

This time on the show we're tunneling our traffic through multiple servers with proxychains. Plus, safe password keeping and Active Directory authentication for Linux. All that and more this time on Hak5.

If you're into Hak5 you'll love our new show by hosts Darren Kitchen and Shannon Morse. Check out http://www.revision3.com/haktip

Whether you're a beginner or a pro, http://www.revision3.com/haktip is essential viewing for current and aspiring hackers, computer enthusiasts, and IT professionals. With a how-to approach to all things Information Technology, HakTip breaks down the core concepts, tools, and techniques of Linux, Wireless Networks, Systems Administration, and more.

And let's not forget to mention that you can follow us on http://www.twitter.com/hak5 and http://www.facebook.com/technolust, http://revision3.com/hak5/follow to the show and get all your Hak5 goodies, including the infamous wifi-pineapple over at http://hakshop.com . If you have any questions or suggestions please feel free to contact us at feedback@hak5.org.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

5 Comments

  • Malachai 2 years ago

    After finding out on Itunes you were doing a show on proxy I was so happy. Just last night i was trynig to understand how they work. from watching the show seen that you need multi connections to different servers. now my question is all the server you connect to are they free or do you have to pay service for them? other thing I have a big thing with privacy and stuff. I say 80% of the time i use the tor network.

    How and where would I get some good servers to connect too? if i have to pay then which service do not share log files to other compay or law groups?

    Thank you.

  • Geit Bent 2 years ago

    thank you for this also loved that movie also another show about rerouting The pretender

  • Stuart Luscombe 2 years ago

    I set up the AD -> Linux hack some time ago. It does require some messing around on both ends to get it going but once you have it set up it works great. I have all Linux users logging in using their AD credentials and even manage groups the same way.

  • In response to your viewer question about using Windows AD credentials to log into Linux machines, Centrify makes it really easy to add Linux machines to a Windows domain. The best part is that the agent is free.