Add GeGeek Toolkit to Hiren’s CD/DVD for the ultimate troubleshooting tool

One of the best sites on the web is GeGeek.  GeGeek has over 300 tools (freeware) that you can download for troubleshooting any computer.   How can it possibly get more powerful?

Use Rufus USB to create a bootable ISO of Hiren’s CD/DVD’s ISO.  See our other article – link.  Once you create the bootable flash drive, copy the GEGeek folder to

Now when booting to your USB drive, you can boot into Windows XP mini and navigate to the flash drive.  Navigate further into the Prorams folder and then into the GEgeek folder.  You can now use any tool you need to troubleshoot or diagnose your computer.

GEGeek Toolkit

Rufus USB boot and Hiren’s Boot ISO

Hiren’s Boot CD is one of the best tools IT personnel can get their hands on.  (See our article on adding the GeGeek Toolkit) WIth the following tools, Hiren’s can help you diagnose, repair and secure your computer -

  • Avira AntiVir
  • ClamWin
  • ComboFix
  • Dr. Web CureIT!
  • Malwarebytes
  • Remove Fake Antivirus
  • RootkitRevealer
  • Spybot – Search and Destroy
  • SuperAntispyware
  • TDSSKiller
  • CloneDisk
  • Copy DMA
  • CopyWipe
  • DiskImage
  • DriveImage XML
  • Drive SnapShot
  • FastCopy
  • G2L Ghost 4 Linux
  • GImage
  • Image for Dos
  • Image for Windows
  • ImgBurn
  • InfraRecorder
  • Macrium Reflect
  • ODIN
  • Partition Image
  • Partition Saving
  • RegBak
  • Raw Copy
  • ShadowCopy
  • SelfImage
  • Seagate DiscWizard
  • Dozens more-  http://www.hiren.info/pages/bootcd

CD/DVDs are becoming rare on laptops and are not easy to carry around.  You can use Rufus USB to make Hiren’s Bootable.  Down Hiren’s and simply use Rufus on a blank 4 gb flash drive.  You will now have dozens of utilities to use on a flash drive you can keep on a key chain or lanyard.

When working on computers, you can easily enter the boot settings and boot to a USB drive.  This may require you to work with UEFI and legacy settings to get it to boot.

Hiren’s will supply you with the tools you need and Rufus will create your bootable USB.

Download for Hiren’s - http://www.hirensbootcd.org/download/

Download for Rufus USB boot - http://rufus.akeo.ie/

Once you download Hiren’s, unzip the file and open Rufus.  Insert a BLANK 4 gb flash drive and navigate to the iso in the unzipped files.  Once you have navigated to the file, click on start.  This will create a bootable Hiren’s USB.

Unzipped files

Rufus

1 Hirens 2 Hirens 3 Hirens 4 Hirens 6 hirens

Want to make more than one bootable USB?   

If you have a bootable USB, you can easily make another by using ImageUSB.

Here’s what you should do -

  1. Install ImageUSB
  2. Insert your source drive

1 usb image tool

3. Select backup
4. Name the image file

USB Image Tool

5. Next highlight the image file and select restore on the target drive4 usb image tool restore

3 USB image tool Restore

You will now have a bootable USB drive

Xirrus Wi-Fi Inspector

My two personal favorite Wi-Fi Inspectors are NetSurveyor and inSSIDer. Another great application is Xirrus Wi-Fi Inspector which is a powerful tool for managing and troubleshooting the Wi-Fi on a Windows XP, Vista, or 7laptop. Built in tests enable you to characterize the integrity and performance of your Wi-Fi connection. Applications include:

  • Searching for Wi-Fi networks
  • Managing and troubleshooting Wi-Fi connections
  • Verifying Wi-Fi coverage
  • Locating Wi-Fi devices
  • Detecting rogue APs

Don’t forget about Vistumbler which offers GPS information.

Updates and HotFixes you may miss in Windows

Microsoft Windows has a great update feature built in.  You may not know it but Microsoft also releases HotFixes and other items that are needed for security, networking, features and other functionality.

How do you find Hotfixes and other items that may need to be downloaded?   You can use a third party utility such as WHDownloader.  (Download here)

WHDownloader is easy to use and brings in both Microsoft Office Products and the latest Windows OS.

Download

Updated List

 

The dangers of using outdated software


 Outdated software contains security flaws which cybercriminals can use as avenues to infiltrate the corporate network.

The dangers of using outdated software.

Protecting your network by pen testing it

This post is for educational purposes and any use of these tools against a network without explicit permission could be illegal.   Metasploit is designed to identify weaknesses in networks and hardware/software on a network.  Do NOT use metasploit for other reasons.

Want to protect your network and the computers in your network?  You can get updates for your operating systems (Linux, Mac, iOS, Android, Windows or whatever) along with updates for third party programs yet you can still be unsecure.    When updating these products, you also have to remember firmware and updates for wireless devices, access points, bridges, firewalls, routers, switches, SCADA devices, robots, mobile devices, printers and any device on your network.

Metasploit

http://www.metasploit.com/download/

Metasploit Community is free and allows for a free scan of your network or server. Although limited (Try Pro for details and Brute Force), Metasploit Community is a first step in finding open services and ports on your operating system, hardware devices such as routers and other devices.   The trick to installing Metasploit is to disable your antivirus or make exceptions to what your antivirus finds.   You should truly install the software inside of a VM (Virtual Machine) so that your computer remains protected.

You can use Metasploit to protect your network by ‘seeing’ what a hacker or malicious person would see.  Truly for network professionals and auditors, this software can help you identify services, ports and weaknesses in your network.

There are several versions of Metasploit – Community, Pro, Express and Framework (Compare Editions)

Metasploit     Metasploit Two

Metasploit Scan Complete     metasploit Hosts

Metasploit Services After Scan

The above scan was in a controlled lab.  Malicious scanning of networks may be illegal.  Read  Penetration Basics on Metasploit’s website.

Tutorials (Videos)

SVCHost Viewer – Find out what program is using it!

Anyone who has hit Ctrl-Alt-Del understands they may have several svchost.exe ‘s running.  What are they?  They relate to networking and some programs use svchost in groups.  This tiny download (14 kb) shows exactly what this file is doing.

Link to Download.

svchostviewer