In the by few days offensive-security have been toying amongst about Motorola hardware, together with bring managed to larn a basic ready of BackTrack v (+ toolchain) on a Motorola Xoom. The possibilities aspect exciting every bit offensive-security are slow edifice several experimental arm packages. offensive-security squad does non bring much sense amongst the Android OS nor ARM hardware, but together with then far – together with then good. offensive-security volition non hope an ARM loose on May 10th, every bit this novel “experiment” was non planned inwards whatsoever agency – but we’ll produce our best.
BackTrack on Motorola Xoom Screen 1
BackTrack on Motorola Xoom Screen 2
BackTrack on Motorola Xoom Screen 3
BackTrack on Motorola Xoom Screen 4
BackTrack on Motorola Xoom Screen 5
BackTrack on Motorola Xoom Screen 6
As of now, offensive-security bring got a modified version of an Ubuntu 10.04 ARM image, chrooted on a Motorola Xoom. The tablet is running a modified, overclockable heart together with somebody (from 1.0 to 1.5 GHz). The chrooted BackTrack surroundings is running a VNC server, from which you lot tin connect from the tablet itself. When run locally from the Xoom tablet, the VNC session does non lag, together with the affect keyboard together with touchscreen are really workable.
As expected from a chrooted environment, offensive-security are non using whatsoever custom drivers (for now), together with injection together with other related wireless attacks are NOT possible. Here’s a few screenshots nosotros managed to scrounge from our dev box:
offensive-security hope to loose a dev version of this ikon inwards a span of weeks for other Xoom owners to play with. We’ll give-up the ghost on you lot posted !
Share This :
comment 0 Comments
more_vert