How to Run Backtrack on Android
In this post you will learn how to run the BackTrack 5 operating system
on an Android based device. This method will run BackTrack inside
Android. This method will work on most android phones and/or tablets.
*Please Note* If you dont know what BackTrack is, dont attempt this... !!!!
Some basic info about Backtrack.....
BackTrack provides users with easy access to a comprehensive and
large collection of security-related tools ranging from port scanners to
Security Audit.
The following is not an exhaustive list, but hopefully it will help people see some of the very cool new tools and programs added to Backtrack.
BackTrack includes many well known security tools including:
The following is not an exhaustive list, but hopefully it will help people see some of the very cool new tools and programs added to Backtrack.
BackTrack includes many well known security tools including:
- Metasploit for integration
- Wi-Fi drivers supporting monitor mode (rfmon mode) and packet injection
- Aircrack-ng
- Gerix Wifi Cracker
- Kismet
- Nmap
- Ophcrack
- Ettercap
- Wireshark (formerly known as Ethereal)
- BeEF (Browser Exploitation Framework)
- Hydra
- OWASP Mantra Security Framework, a collection of hacking tools, add-ons and scripts based on Firefox
- Cisco OCS Mass Scanner, a very reliable and fast scanner for Cisco routers with telnet and enabling of a default password.
- A large collection of exploits as well as more commonplace software such as browsers.
Identify Live Hosts:
- dnmap – Distributed NMap
- address6 (The Second “Alive6″ entry) – IPV6 address conversion
Information Gathering Analysis
- Jigsaw – Grabs information about company employees
- Uberharvest – E-mail harvester
- sslcaudit – SSL Cert audit
- VoIP honey – VoIP Honeypot
- urlcrazy – Detects URL typos used in typo squatting, url hijacking, phishing
Web Crawlers:
- Apache_users – Apache username enumerator
- Deblaze – Performs enumeration & interrogation against Flash remote end points
Database Analysis
- Tnscmd10g – Allows you to inject commands into Oracle
- BBQSQL – Blind SQL injection toolkit
Bluetooth Analysis
- Blueranger – Uses link quality to locate Bluetooth devices
Vulnerability Assesment
- Lynis – Scans systems & software for security issues
- DotDotPwn – Directory Traversal fuzzer
Exploitation Tools
- Netgear-telnetable – Enables Telnet console on Netgear devices
- Termineter – Smart Meter tester
- Htexploit – Tool to bypass standard directory protection
- Jboss-Autopwn – Deploys JSP shell on target JBoss servers
- Websploit – Scans & analyses remote systems for vulnerabilities
Wireless Exploitation Tools
- Bluepot – Bluetooth honeypot
- Spooftooph – Spoofs or clones Bluetooth devices
- Smartphone-Pentest-Framework
- Fern-Wifi-cracker – Gui for testing Wireless encryption strength
- Wi-fihoney – Creates fake APs using all encryption and monitors with Airodump
- Wifite – Automated wireless auditor
A Bunch of Password Tools
- Creddump
- Johnny
- Manglefizz
- Ophcrack
- Phrasendresher
- Rainbowcrack
- Acccheck
- smbexec
So lets get started.....
You will need:
- A rooted phone/tablet running Android 2.2+
- A basic understanding of Linux environments
- BusyBox
- Proper ADB/Fastboot drivers on a nearby computer (
- A USB cable for your device
- The modified BackTrack 5 files (downoad here >>
http://www.megaupload.com/
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Step 1 - Preparation
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
1} Download the modified BackTrack files to a computer from the above link.
2) Extract the files to a memorable place on your computer.
3) Launch the Settings app on your device and enable Applications -> Development -> USB debugging.
4) Remove any external storage attached to your device.
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Step 2 - Setting up Files
We are going to copy/paste the bt5 folder to /sdcard on your device. Attempt method 1 first. If this does not work, perform method 2.
Method 1:
1) Browse to the bt5 folder you extracted.
2) Copy the bt5 folder(not the contents) and then browse to your connected device.
3) Navigate into internal storage. You should see a folder called ".android_secure". If you dont see this, open the "sdcard" folder. If you cant see that, you probably dont have a rooted device with proper ADB drivers.
4) Paste the bt5 folder here.
Method 2:
1) Open a command prompt and navigate to your ADB location.
2) Run the following command:
adb push C:\path\to\bt5 \sdcard\bt5
Step 3 - Running BackTrack
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
1) Open a terminal application (I recommend Terminal Emulator)
2) Login as root by typing:
su
3) Double check that busybox is working by running:
busybox ls
This should list a bunch of files and folders.
4) run:
cd /sdcard/bt5
and:
sh bt
5) Enter 'n' when it asks for a VNC session. Dont worry you can still use your GUI but starting it that way can be buggy.
Congratulations, you have done it! If you dont mind working without a graphical interface, you are finished. If you want a GUI continue...
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
1) Make sure that your terminal will run in the backround.
2) Download a VNC application from the Android Market. I would suggest "androidVNC'.
3) After that you have to run 'sh bt' then enter:
startvnc
4) Close your terminal and open your VNC app. Then fill in the form with:
Nickname - (blank)
Password - root
Address - 127.0.0.1
Port - 5901
Username - (blank)
Color Format - Select whichever is best for your device. I use the highest (24bit) but it can slow it down a bit.
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Note :
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
- Backtrack can only connect to the internet via WiFi
- The default VNC/SSH password is 'root'
- Default screen resolution is set to 800x480
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Here's the video tutorial for installing backtrack on android- Video guide
Keep visiting our Facebook page for more stuff .You can also follow this blog on twitter to keep yourself updated on all the latest tricks and trends from the tech world....
No comments:
Post a Comment
comment here......