12

Linux Deploy

  • Upload
    job

  • View
    99

  • Download
    1

Embed Size (px)

DESCRIPTION

Linux Deploy. This application is open source software for quick and easy installation of the operating system (OS) GNU/Linux on your Android device. The application creates a disk image on the flash card, mount it and - PowerPoint PPT Presentation

Citation preview

Page 2: Linux Deploy

Linux Deploy

This application is open source software for quick and easy installation of the operating system (OS)GNU/Linux on your Android device. The application creates a disk image on the flash card, mount it andinstall there OS distribution. Applications of the new system are run in a chroot environment and working inparallel with platform Android. All changes made on the device are reversible, ie the application and componentscan be removed completely. Installation of a distribution kit is carried out on a network from the officialmirrors online. The application are required superuser rights (ROOT).

Page 3: Linux Deploy

Linux Deploy Features• Supported distributions: Debian, Ubuntu, Arch Linux, Fedora,

openSUSE, Kali Linux, Gentoo• Installation type: file, partition, directory• Supported file systems: ext2, ext3, ext4• Control interface: SSH, VNC, X, framebuffer• Desktop environment: XTerm, LXDE, Xfce, GNOME, KDE• Supported languages: English, Russian

Page 4: Linux Deploy

Prerequisites for Kali• A device running Android 2.1 and above, rooted.• At least 5 GB free space on internal or external storage.• A fast, wireless internet connection.• Patience to wait for a distribution to bootstrap from the network.

Page 5: Linux Deploy
Page 6: Linux Deploy
Page 7: Linux Deploy

Aircrack-ng Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the PTW attack, thus making the attack much faster compared to other WEP cracking tools.In fact, Aircrack-ng is a set of tools for auditing wireless networks.

Page 8: Linux Deploy

Reaver • Reaver implements a brute force attack against Wifi Protected Setup

(WPS) registrar PINs in order to recover WPA/WPA2 passphrases, as described in http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf. • Reaver has been designed to be a robust and practical attack against WPS,

and has been tested against a wide variety of access points and WPS implementations. • On average Reaver will recover the target AP's plain text WPA/WPA2

passphrase in 4-10 hours, depending on the AP. In practice, it will generally take half this time to guess the correct WPS pin and recover the passphrase.

Page 9: Linux Deploy

Metasploit• Validate security risks as part of your vulnerability management

program. • Safely simulate attacks on your network to uncover security issues.• Verify your defenses, security controls and mitigation efforts.• Measure the effectiveness of your security awareness program.• Audit password security beyond Windows and Linux logins.

Page 10: Linux Deploy

NmapNmap ("Network Mapper") is a free and open source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are available for Linux, Windows, and Mac OS X. In addition to the classic command-line Nmap executable, the Nmap suite includes an advanced GUI and results viewer (Zenmap), a flexible data transfer, redirection, and debugging tool (Ncat), a utility for comparing scan results (Ndiff), and a packet generation and response analysis tool (Nping).

Page 11: Linux Deploy

Kali Linux ISO of Doom• Unattended, self-deploying• On reboot after the installation completes, Kali would automagically

connect back to the attacker using a reverse OpenVPN connection• Remote Hardware Backdoor• The “backdoor” would once again be a fully fledged Kali Linux

installation running our reverse bridging VPN connection. The hardware could be a small netbook, an android phone, or a small USB powered ARM device. This device is left at the customer site tucked away in a place it won’t be noticed, allowing you to bypass external defenses.

Page 12: Linux Deploy

Sources• https://play.google.com/store/apps/details?id=ru.meefik.linuxdeploy• http://www.kali.org/how-to/kali-linux-android-linux-deploy/• www.rapid7.com/ (Metasploit)• http://www.offensive-security.com/kali-distribution/kali-linux-iso-of-

doom/