In the past few months I’ve been experimenting with many MariaDB instances, so after the initial setup I had to measure the DB performances and spot eventual bottlenecks using Sysbench. The natural choice for the operating system was Centos 6.4 x86_64, it was very odd for me to discover that the Sysbench package was not available from the yum repositories, even though few RPMs were available around the net, none of them were compiled with MariaDB support. Without wasting more time, I realized had to build it by myself from the sourcecode.
1) Make sure you have MariaDB already installed.
2) Install the dev tools and the dependencies to compile Sysbench.
yum -y install MariaDB-devel gcc gcc-c++ autoconf automake make libtool \
zlib zlib-devel openssl-devel
3) Grab Sysbench latest version (0.4.12).
3) Decompress the archive.
tar xvfz sysbench-0.4.12.tar.gz
4) LIBTOOL error free.
Comment AC_PROG_LIBTOOL as follow:
add the following line:
5) Compile and install Sysbench
make && make install
6) Test Sysbench
Missing required command argument.
sysbench [general-options]… –test=<test-name> [test-options]… command
–num-threads=N number of threads to use 
–max-requests=N limit for total number of requests 
–max-time=N limit for total execution time in seconds 
–forced-shutdown=STRING amount of time to wait after –max-time before forcing shutdown [off]
–thread-stack-size=SIZE size of stack per thread [32K]
–init-rng=[on|off] initialize random number generator [off]
–test=STRING test to run
–debug=[on|off] print more debugging info [off]
–validate=[on|off] perform validation checks where possible [off]
–help=[on|off] print help and exit
–version=[on|off] print version and exit
fileio – File I/O test
cpu – CPU performance test
memory – Memory functions speed test
threads – Threads subsystem performance test
mutex – Mutex performance test
oltp – OLTP test
Commands: prepare run cleanup help version
See ‘sysbench –test=<name> help’ for a list of options for each test.
Today I’m proud to announce the release of SmoothSec Version 3.2. This version enhances the usability and performances of the whole IDS system. Along with the upgrade of Snort, Suricata and Pigsty, we are delighted to introduce Sagan HIDS (Host Instruction Detection System) to work in conjunction with Arpwatch as Address Resolution Protocol anomalies detection engine. We would like to highlight the improvement of “smoothsec.first.setup” with the network interfaces detection and Snorby custom login credentials. We have also added a comprehensive set of tools to perform traffic and packet analysis from the command line (e.g. greppcap.py, tcpextract).
SmoothSec documentation wiki: https://github.com/smoothsec/docs/wiki
Community support: http://www.smoothsec.org/community
26-08-2013 SmoothSec 3.2 released
[*] Improvements and fixes
Snorby email reports fixed.
Pigsty stability and performances improved.
Pigsty logs archving.
Snort Version 126.96.36.199
Suricata version 1.4.5
Pigsty Version 0.1.5
[*] New tools
Freepto is a live operating system based on Debian Gnu/Linux and is developed by “AvANa”, the resident hacktivist collective of Forte Prenestino, one of the oldest and most famous social centrer (squat) in Italy. The operating system runs entirely on a USB key, so you can have your favourite tools always with you, “Metadata Anonymisation Toolkit“, “Tor Browser“, “MAC Changer” are among the best-known privacy applications. Even though, there’s already a few privacy enabled Linux distribution around, Freepto has the persistent encrypted partition feature, a unique option that makes it stand out among other similar distributions, this peculiarity allows to save data changes back to the USB encrypted storage device. Freepto aims to be a powerful tool for activists, journalists, Whistleblowers, and normal people that want to protect their privacy.
Surveillance self-defense by https://ssd.eff.org/tech/tor
Please consider to help to translate the documentation from Italian to English.
You need to get the latest Freepto iso and the makefreepto script from:
-b skip badblocks check
-r skip random filling (use only if you know what you are doing)
-w skip dd of binary.img
-i IMAGE put IMAGE on DEVICE (default is binary.img)
-p set password (defaul is “freepto”)
-s set secure random password (default is “freepto”)
WARNING. With this process you can easily destroy data partitions on your
computer. I’m not responsible for any damage or data loss caused by
1) Plug the usb device to your linux computer.
2) Check for the USB device path with dmesg.
[ 2999.423840] sd 6:0:0:0: [sdb] Assuming drive cache: write through
[ 2999.449517] sdb: sdb1
[ 2999.454623] sd 6:0:0:0: [sdb] No Caching mode page present
3) Proceed (BE CAREFUL) to copy the freepto img to the USB device.
./makefreepto -i freepto-IT_0.1.1.img -p <EncryptionPassword> /dev/sdb
Once the process is complete you must get a message like this below.
4) Plug the USB stick into the computer you want to boot up. Make sure your BIOS is set to boot from your USB device. Select Live mode, and in a short wile you will be prompted to enter the encryption password in order to unlock the encrypted persistent partition.
Language, to switch from Italian to your own language you need to change the language system setting. The password for the user “paranoid” is “live”.
To change the language type: sudo dpkg-reconfigure locales
Today I’m delighted to announce a new release of Smoothsec version 3.0.
Smooth-Sec is a fully-ready IDS/IPS (Intrusion Detection/Prevention System) Linux distribution based on Debian 7 (wheezy), available for 32 and 64 bit architecture. The distribution includes the latest version of Snorby, Snort, Suricata, PulledPork and Pigsty. An easy setup process allows to deploy a complete IDS/IPS System within minutes, even for security beginners with minimal Linux experience.
Improvements and fixes:
Debian 7 Wheezy based.
32 and 64 bit iso available.
Snorby V 2.6.2
Snort V 188.8.131.52
Suricata V 1.4.3
Pigsty V 0.1.0
PulledPork V 0.6.1
This is my latest Google Dork that allows to discover the VirtualBox
web interface directly exposed to the internet.
TIP: remember always to password protect (with a strong password)
your phpVirtualBox installation!!!!.
Google dork code:
intitle:"phpVirtualBox – VirtualBox Web Console"
Or direct link: http://is.gd/4jPCco