Configuration Tutorials

 

I’ve documented the configurations of the laptops, desktops, tablets, and pdas created to conduct information security audits and penetration tests.  I’m sharing those documents with you with in the hope that it will be helpful for your audits.

Linux Penetration Testing Laptop Setup v4 (9.20.2011)
Linux Penetration Testing Laptop Setup v3.5
(3.30.2011)
Linux Penetration Testing Laptop Setup v3 (8.16.2010)
Linux Penetration Testing Laptop Setup v2.5 (3.10.2010)
Linux Penetration Testing Laptop Setup v2 (Ubuntu 8.04 LTS outdated)
Linux Penetration Testing Laptop Setup (Ubuntu 7.04 outdated)
This document is what I use to help me get all the tools and utilities installed and configured on the laptop I use to conduct penetration tests during an audit.  It might be helpful to you so I’ve posted it online.

Nokia N810 Wireless Assessment Configuration Tutorial
I created a tutorial on how to setup and configure the Nokia N810 Internet Tablet to conduct a wireless assessment or audit. The tools included in the tutorial include how to setup kismet (oldcore and newcore), aircrack-ng (airbase and aircrack), and btscanner. I’m still working on developing steps to install Metasploit and Karmetasploit for wireless client attacks. The tutorial also details using the internal GPS as well as adding an external wireless adapter.

Windows Penetration Testing Laptop Setup
This is a quick and dirty document to remind me of the main tools that I use when conducting a security audit.

Wireless Hacking Tablet – Ubuntu Hardy Heron
I’ve worked with a Motion Computing tablet for a number of years and have created a document to get it configured for a wireless warwalk with Ubuntu.  The digitizer pen, on screen keyboard, and screen rotation are configured properly.  Kismet with Google Maps and GPS support is configured to conduct a war walk.  Information on configuring Kismet with Google Maps came from http://www.wirelessdefence.org.  Aircrack-ng and Karmasploit are configured for wireless penetration testing.

Wireless Hacking Tablet – Ubuntu Feisty Fawn (outdated)
I’ve worked with a Motion Computing tablet for a number of years and have created a document to get it configured for a wireless warwalk with Ubuntu.  The digitizer pen, on screen keyboard, and screen rotation are configured properly.  Kismet with Google Maps and GPS support is configured to conduct a war walk.  Information on configuring Kismet with Google Maps came from http://www.wirelessdefence.org.

Wireless Hacking Tablet – Fedora Core 4
I’ve created a document for the Motion Computing brand of tablets that configures Fedora Core 4 and gets it working with the digitizer pen, screen rotation, and on screen keyboard.  Fedora Core 4 is the version of linux that works with Karma.  Karma is a wireless attack framework that is a bit dated and requires the old version of the madwifi drivers.  While dated this framework is effective in wireless hacking.  I obtained information and reference in the document http://www.wirelessdefence.org.  An excellent site for getting up and running with wireless hacking.

Compaq/HP Ipaq and Familiar Linux

Handhelds.org has a plethora of information on running linux on a pda.  When I was in NY we used a Compaq 3900 and HP 5500 Ipaq for conducting a wireless warwalk with gps support.  The older line of Ipaqs support a backpack that allowed for two pcmcia cards.  This allowed for a pcmcia wireless card that supported an external antenna and a compact flash GPS card with a pcmcia adapter.
Load Familiar
Ipaq Slimdown
Ipaq Configuration

 Posted by at 8:18 am

  3 Responses to “Configuration Tutorials”

  1. [...] at version 9.10 (Karmic Koala).  The specific brand I use is the Netbook Remix.  See the Configuration Tutorials to download the latest pdf [...]

  2. [...] if you install the tools yourself. You will also have the most current version available. See Configuration Tutorials for the latest [...]

  3. Very nice, these documents are an valuable aid for any aspiring auditor, by the way did you know that reversi captures like the one used on this page are advertising spyware?

 Leave a Reply

(required)

(required)

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>