VMware Player – Virtual Network Editor

The Virtual Network Editor (vmnetcfg.exe) is not extracted during the installation and it is really needed if you want to mess around with the virtual network settings on the host OS.

It is a problem if you have different network adapters installed, like eg Bluetooth, WiFi, Hamachi etc

Extract cab files

You can extract all files from the installation by using the option /e and a destination folder is supplied

C:\Download\vmware>VMware-player-3.1.3-324285.exe /e .\extract

Change to the subfolder and find the file network.cab, open it in eg Izarch and extract vmnetcfg.exe to the vmware player installation folder. You can also create a shortcut in your list of program files if needed

Currently rated 4.6 by 8 people

via Look sharp | VMware Player – Virtual Network Editor.

This worked.  I didn’t have to install izarch either — 7-zip extracted the .cab files just fine.  I can’t believe vmware didn’t just install the network editor for the player.  What’s up with that?

AirTraf > Home

It is my pleasure to announce that AirTraf project has resulted in founding of a new company, Elixar, Inc.

via AirTraf > Home.

802.11b network analyzer.

Also, from http://www.elixar.com/corporate/history/airtraf-1.0/airtraf_download.php

AirTraf 1.0 is available under the GNU GPL license. If you are not familair with the terms of this license please read it before downloading.  Also please note that AirTraf is currently being released only for the linux operating system.

Offensive Mobile Forensics

There are many different locations containing interesting data on iOS devices. Data often resides in SQLite databases, the chosen format for local storage on mobile devices. The next best place to find sensitive information is in plist, or property list files – these are the primary storage medium for configuration settings in iOS, and they are also a fantastic source of sensitive information. User credentials are often stored here, instead of inside the KeyChain where they should be. Rounding out the top three data sources are binary or binary-encoded files, such as the device’s keyboard cache and pasteboard. Although storage locations commonly change with the release of new iOS firmware, it is fairly simple to poke around the general area and find what you’re looking for.

via Offensive Mobile Forensics.

Similarly to the configuration files for iOS, the XML files storing preferences for Android applications commonly include user credentials and other sensitive information.