注册 登录  
 加关注
   显示下一条  |  关闭
温馨提示!由于新浪微博认证机制调整,您的新浪微博帐号绑定已过期,请重新绑定!立即重新绑定新浪微博》  |  关闭

讀萬卷書,行萬里路

开心快乐的方式有很多种,寻找自己的快乐方式

 
 
 

日志

 
 

BackTrack 5 ARM Edition Quick Start  

2011-09-23 16:32:07|  分类: 我的网络 |  标签: |举报 |字号 订阅

  下载LOFTER 我的照片书  |
This image has been developed and tested on the Motorola Xoom. Your mileage may vary on other devices.
As this image runs in a chroot, you will need to have your device rooted. There are numerous tutorials on the subject online and are not included here.

***Rooting your device will potentially void its warranty and we are not in any way resposible if you brick your device while rooting it.***

### IMPORTANT POINTS ###

1. Since the image runs in a chroot, there is no root password set.
2. There are 2 scripts under /usr/bin/ 'startvnc' and 'stopvnc' that are set to start with the Xoom's default resolution.
3. The current vnc password is set to 'toortoor' and can be changed by running 'vncpasswd'
4. This image is a work in progress and suggestions/tips from the community are always welcome.

### GETTING STARTED ###

1. Once you have downloaded the ARM BT package, save the files in a convenient location. The steps below assume they are in the platform-tools folder of the Android SDK.

2. Go to your platform-tools directory and proceed to make a directory on the device to store BT5:
    ./adb shell
    mkdir /sdcard/BT5
    exit

3. Copy over the busybox install files:
    ./adb push busybox /sdcard/
    ./adb push installbusybox.sh /sdcard

4. Install busybox on the device:
    ./adb shell
    cd /sdcard/
    sh installbusybox.sh
    exit

5. Transfer the required BT5 files to the device:
    ./adb push fsrw /sdcard/BT5/
    ./adb push mountonly /sdcard/BT5/
    ./adb push bootbt /sdcard/BT5/
    ./adb push bt5.img.gz /sdcard/BT5/
    ./adb push unionfs /sdcard/BT5/

6. Uncompress the image and start BT5:
    ./adb shell
    su
    cd /sdcard/BT5
    gunzip bt5.img.gz
    sh bootbt

If all goes well, you'll be in the BT5 chroot:

# sh bootbt
net.ipv4.ip_forward = 1
root@localhost:/# ls /pentest/
backdoors  database     exploits   passwords  scanners  stressing  voip
cisco      enumeration  forensics  python     sniffers  tunneling  web
root@localhost:/#

    


  评论这张
 
阅读(498)| 评论(0)
推荐 转载

历史上的今天

在LOFTER的更多文章

评论

<#--最新日志,群博日志--> <#--推荐日志--> <#--引用记录--> <#--博主推荐--> <#--随机阅读--> <#--首页推荐--> <#--历史上的今天--> <#--被推荐日志--> <#--上一篇,下一篇--> <#-- 热度 --> <#-- 网易新闻广告 --> <#--右边模块结构--> <#--评论模块结构--> <#--引用模块结构--> <#--博主发起的投票-->
 
 
 
 
 
 
 
 
 
 
 
 
 
 

页脚

网易公司版权所有 ©1997-2017