Now we can create tunnel devices to use for the VPN tunnel back to base, like tunctl -t tun0 -f /dev/net/tun Set ‘tun0’ persistent and owned by uid 0 We may be happy running OpenConnect inside the chroot environment, but for eventual integration with the core product it will need to be able to run in the “host” ChromiumOS too. However, note that there is a little fancy footwork involved in actually using OpenConnect, because our chroot environment is essentially an entire Linux filesystem - with its own /etc, and so on and so forth. Now, we can install OpenConnect in a similar fashion - in fact, we’ll need to apt-get install openconnect uml-utilities in order to also get a tunnel device management utility we need called tunctl. Here we are adding some useful additional packages to our test Chromebook using apt-get, just as we might on any other Ubuntu system… However, many Chromebooks come with quite small SSDs, so watch out when pulling in additional software! So now we can enter our chroot environment (which is actually encrypted by default, using a key requested from the user as part of the Crouton setup process - so perhaps not as insecure as I may have implied), and start installing and even building packages just as we would on a normal Ubuntu Linux distribution. It’s absolutely trivial to install, although you should note that the Chromebook’s Aura window manager doesn’t know what to do with windows spawned by random applications - hence Dave recommends that you start a new X session with a conventional window manager/desktop like Xfce. Google’s Dave Schneider has helpfully produced Crouton, the “Chromium OS Ubuntu Chroot Environment” (there are other examples out there using Tinycore and Arch Linux), which lets us run a full copy of Ubuntu Linux via chroot. Now, how do we get the OpenConnect package onto our Chromebook, to provide a free workalike for Cisco’s An圜onnect? (Cisco also have a packaged Linux client, but if we can make the open source client work then it is more likely to be embedded in ChromiumOS and thence ChromeOS) Crouton to the Rescue See the end of this post for more on the latter. There are also the fun and profit elements, of course… If you have hacker tendencies, then hopefully this post will give you some interesting insights along the former theme. Both of these are supported by open source clients, but these haven’t been integrated with ChromiumOS yet. Two particular bugbears for me are that we use the Cisco An圜onnect VPN system and VMware View for our Virtual Desktop Environment for legacy Windows apps. This is important to me with my IT manager’s hat on, because there are still a few rough edges to the ChromeOS product that make it awkward in my environment. After you have switched into developer mode your Chromebook will run whatever you want it to, and you can open up a Linux shell in a browser tab (Chromebooks are running a cut down Linux distribution after all) simply by hitting Ctrl-Alt-T. There are now a lot of Chromebooks out there - so what can we do with them? Let’s see… Enter Developer ModeĬonveniently, Chromebooks have a developer mode, which lets you bypass all the normal checks and balances that Google use to ensure that rogue software does not run on ChromeOS devices. You may recall me noting that the Chromebook has been Amazon’s top selling laptop for the whole of Q4 2012. Kali Linux is developed by Offensive Security and previously by BackTrack.Hacking the Chromebook for Fun and Profit Kali Linux is the most widely known Linux distro for ethical hacking and penetration testing. These distros provide multiple tools that are needed for assessing networking security and other similar tasks. Here’s a list of various Linux distributions focusing on security. But today we are going to have a look at a list of some of the best Linux distros to learn hacking and penetration testing.īefore we see the best Linux distros for hackers, I would recommend you to check out the online hacking courses at our shop. In a previous article, we explored some weird Ubuntu distributions. Some are designed for specific tasks in mind and others suit different interfaces. There are countless Linux distros for various purposes. Whether you want to pursue a career in information security, are already working as a security professional, or are just interested in the field, a decent Linux distro that suits your purposes is a must. Looking for the best Linux distro to learn hacking?
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |