How to compile and install Sysbench for MariaDB under Centos 6.4

facebooktwittergoogle_plusredditpinterestlinkedinmailby feather

In the past few months I’ve been experimenting with many MariaDB instances, so after the initial setup I had to measure the DB performances and spot eventual bottlenecks using Sysbench. The natural choice for the operating system was Centos 6.4 x86_64, it was very odd for me to discover that the Sysbench package was not available from the yum repositories,  even though few RPMs were available around the net, none of them were compiled with MariaDB support. Without wasting more time, I realized had to build it by myself from the sourcecode.

Here’s how:

1) Make sure you have MariaDB already installed.

2) Install the dev tools and the dependencies to compile Sysbench.

yum -y install MariaDB-devel  gcc gcc-c++ autoconf automake make libtool \
zlib zlib-devel openssl-devel

3) Grab Sysbench latest version (0.4.12).

3) Decompress the archive.

tar xvfz sysbench-0.4.12.tar.gz

4) LIBTOOL error free.

cd sysbench-0.4.12

Comment AC_PROG_LIBTOOL as follow:


add the following line:


5) Compile and install Sysbench


./configure –bindir=/usr/local/bin

make && make install

6) Test Sysbench

$which sysbench


Missing required command argument.
sysbench [general-options]… –test=<test-name> [test-options]… command

General options:
–num-threads=N            number of threads to use [1]
–max-requests=N           limit for total number of requests [10000]
–max-time=N               limit for total execution time in seconds [0]
–forced-shutdown=STRING   amount of time to wait after –max-time before forcing shutdown [off]
–thread-stack-size=SIZE   size of stack per thread [32K]
–init-rng=[on|off]        initialize random number generator [off]
–test=STRING              test to run
–debug=[on|off]           print more debugging info [off]
–validate=[on|off]        perform validation checks where possible [off]
–help=[on|off]            print help and exit
–version=[on|off]         print version and exit

Compiled-in tests:
fileio – File I/O test
cpu – CPU performance test
memory – Memory functions speed test
threads – Threads subsystem performance test
mutex – Mutex performance test
oltp – OLTP test

Commands: prepare run cleanup help version

See ‘sysbench –test=<name> help’ for a list of options for each test.


SmoothSec 3.2 is out!

facebooktwittergoogle_plusredditpinterestlinkedinmailby feather

Today I’m proud to announce the release of SmoothSec Version 3.2. This version enhances the usability and performances of the whole IDS system. Along with the upgrade of Snort, Suricata and Pigsty, we are delighted to introduce Sagan HIDS (Host Instruction Detection System) to work in conjunction with Arpwatch as Address Resolution Protocol anomalies detection engine. We would like to highlight the improvement of “smoothsec.first.setup” with the network interfaces detection and Snorby custom login credentials. We have also added a comprehensive set of tools to perform traffic and packet analysis from the command line (e.g., tcpextract).


SmoothSec documentation wiki:

Community support:


26-08-2013 SmoothSec 3.2 released

[*] Improvements and fixes
Snorby email reports fixed.
Pigsty stability and performances improved.
Pigsty logs archving.

[*] Upgrades
Snort Version
Suricata version 1.4.5
MariaDB 5.5.32
Pigsty Version 0.1.5

[*] New tools
python idstools
python tcpextract

Freepto, a portable privacy-aware live operating system on encrypted USB drive.

facebooktwittergoogle_plusredditpinterestlinkedinmailby feather


Freepto is a live operating system based on Debian Gnu/Linux and is developed by “AvANa”, the resident hacktivist collective of Forte Prenestino, one of the oldest and most famous social centrer (squat) in Italy. The operating system runs entirely on a USB key, so you can have your favourite  tools always with you, “Metadata Anonymisation Toolkit“, “Tor Browser“, “MAC Changer” are among the best-known privacy applications. Even though, there’s already a few privacy enabled Linux distribution around, Freepto has the persistent encrypted partition feature, a unique option that makes it stand out among other similar distributions, this peculiarity allows to save data changes back to the USB encrypted storage device. Freepto aims to be a powerful tool for activists, journalists, Whistleblowers, and normal people that want to protect their privacy.

Surveillance self-defense by


Please consider to help to translate the documentation from Italian to English.

Freepto installation:

You need to get the latest Freepto iso and the makefreepto script from:


-b         skip badblocks check
-r         skip random filling (use only if you know what you are doing)
-w         skip dd of binary.img
-i IMAGE   put IMAGE on DEVICE (default is binary.img)
-p         set password (defaul is “freepto”)
-s         set secure random password (default is “freepto”)

WARNING. With this process you can easily destroy data partitions on your
computer. I’m not responsible for  any damage or data loss caused by
this procedure.

1) Plug the usb device to your linux computer.

2) Check for the USB device path with dmesg.


[ 2999.423840] sd 6:0:0:0: [sdb] Assuming drive cache: write through
[ 2999.449517]  sdb: sdb1
[ 2999.454623] sd 6:0:0:0: [sdb] No Caching mode page present

3) Proceed (BE CAREFUL) to copy the freepto img to the USB device.

./makefreepto   -i freepto-IT_0.1.1.img -p <EncryptionPassword>  /dev/sdb

Once the process is complete you must get a message like this below.


4) Plug the USB stick into the computer you want to boot up. Make sure your BIOS is set to boot from your USB device. Select Live mode, and in a short wile you will be prompted to enter the encryption password in order to unlock the encrypted persistent partition.

Freepto desktop.


Language, to switch from Italian to your own language you need to change the language system setting. The password for the user “paranoid” is “live”.

To change the language type: sudo dpkg-reconfigure locales

SmoothSec 3.0 is out

facebooktwittergoogle_plusredditpinterestlinkedinmailby feather


Today I’m delighted to announce a new release of Smoothsec version 3.0.

Smooth-Sec is a fully-ready IDS/IPS (Intrusion Detection/Prevention System) Linux distribution based on Debian 7 (wheezy), available for 32 and 64 bit architecture. The distribution includes the latest version of Snorby, Snort, Suricata, PulledPork and Pigsty. An easy setup process allows to deploy a complete IDS/IPS System within minutes, even for security beginners with minimal Linux experience.

Improvements and fixes:

Debian 7 Wheezy based.
32 and 64 bit iso available.
Snorby V 2.6.2
Snort V
Suricata V 1.4.3
Pigsty V 0.1.0
PulledPork V 0.6.1

phpVirtualBox Google Dork

facebooktwittergoogle_plusredditpinterestlinkedinmailby feather

This is my latest Google Dork that allows to discover the VirtualBox
web interface directly exposed to the internet.

TIP: remember always to password protect (with a strong password)
your phpVirtualBox installation!!!!.

Google dork code:

[sourcecode language=”bash”]

intitle:"phpVirtualBox – VirtualBox Web Console"


Or direct link:

Happy hacking.