Connecting your phone line to Asterisk (Setting up a PBX in your house part 3)

From the previous post, we know that in order to connect your phone line to Asterisk we need FXO ports installed. So, in this post we need to configure our FXO ports (let’s assume that we have only one FXO port here). And then, I will show you a basic dialplan for your home phone. But before that, we need to have something to receive or place a call, right? The best and easiest option is an IP phone or a softphone. I am going for the softphone option here and my choice of a free softphone would be xlite.
Continue reading

Scanning using Nmap

In order to be a good penetration tester (pen tester), one should equip himself/herself with a good scanning ability. By scanning, we mean that we try to find “doors” to sneak in from our authorized targets. We can think about “doors” as ports here.

By knowing what ports are open, we can respectively know what kind of services are active in a system. Scanning can also reveal the running OS, giving us a general picture of our targets.

By scanning, we try to gather as much information as we can regarding the underlying system of our targets so that we can prepare ourselves. We can prepare exploitation tools to utilize as well as the time-line of our penetration strategy. Note that timing is very important here because, as professional pen testers, we want to maximize our time for our clients.

Nmap is one of the most popular tools for scanning. In this tutorial, I am going to show you some basic things you can do with Nmap.
Continue reading