Home
PDF KNOPPIX HACKS
Contents
1. Figure 1 2 Running Knoppix from a virtualized host with Qemu Get Knoppix Knoppix can be downloaded from the Knoppix mirrors or purchased from an online site This book includes a copy of Knoppix 5 1 1 DVD from 2007 01 04 KNOPPIX_V5 1 1DVD 2007 01 04 EN which was the last release in the 5 1 series All of the hacks have been tested and written in terms of this release but most hacks should work fine across newer releases Get the Latest Version Even though new major versions of Knoppix are released every year or so new incremental releases occur very frequently These incremental versions have the latest updates to all the software on the disk the latest Linux ker nels and sometimes new features New software updates offer bug fixes and new and improved features New kernel updates often mean better hardware support if an older version of Knoppix doesn t boot on your com puter the latest release of Knoppix might give you better results Sometimes new features are added in incremental releases in the form of improved hardware detection extra Knoppix configuration tools or new cheat codes Hack 4 In general if you need to address a problem with your Knoppix disk the latest release might fix it 6 Chapter 1 Boot Knoppix Get Knoppix Download Knoppix To obtain the latest version of Knoppix download the CD or DVD image from one of Knoppix s mirrors or send away for a copy If you have an unmetered
2. Further Reading e http en wikipedia org wiki Cryptography e http en wikipedia org wiki GNU_Privacy_Guard e http en wikipedia org wiki Public_key_infrastructure e http en wikipedia org wiki Steganography Forensics The benefit of a live bootable CD for gathering digital evidence can t be measured It makes forensics analysis possible for the amateur enthusiast rather than incurring the expense of hiring a professional A good example of this is in data recovery As more people store larger and larger data sets following the boom in digital photography and multimedia you hear almost daily about some poor soul who s lost family pictures on a failing hard drive Now with some practice you can perform recovery tech niques that not long ago were the dominion of the expert or professional If you are reading this because you intend to catch some employee out or an evil cracker who has breached your machine then stop and hire a professional Whilst you may be able to discover the information you need using a D LY approach expect it to be of zero use in any level of criminal investigation The legal value of real world forensics has more to do with procedure and traceability than actual tech nical expertise The primary hero of open source forensics is the Autopsy Sleuthkit combo Currently maintained by Brian Carrier Autopsy Sleuthkit evolved from the original The Coroners Toolkit Hack 57 Whether you simply need to re
3. share path remote_host options The remote _host can be a particular hostname IP or an IP with wildcards so if you want to share mnt hda1 with the entire 192 168 0 subnet add the following line to etc exports mnt hda1 192 168 0 rw To mount an NFS share remotely you must also allow the remote connec tions to portmap and mountd in etc hosts allow As discussed previously Knoppix also uses etc hosts allow to allow remote connections to inetd ser vices If you haven t already done so back up etc hosts allow and copy a version back and add the following two lines to enable NFS access for your local subnet portmap 192 168 0 ALLOW mountd 192 168 0 ALLOW Now that all of the configuration files are prepared make sure that any file systems that must be mounted are mounted and start the portmap and NFS services sudo etc init d portmap start sudo etc init d nfs kernel server start If you want to monitor NFS mount attempts be sure to start the syslog dae mon and read any error messages in case a connection request is refused Wardrive with Knoppix Use Knoppix effectively as a wireless site survey tool that captures GPS coordinates along with data Kismet Mike Kershaw the author of Kismet declares the following at http www kismetwireless net Kismet is an 802 11 layer2 wireless network detector sniffer and intrusion detection system Kismet will work with any wireless card that sup
4. x OGGPLAY a f usr share sounds shutdown ogg then case 1smod in sound 0GGPLAY q p 64 usr share sounds shutdown ogg gt dev null 2 gt amp 1 amp sleep 7 esac elif f usr share sounds shutdown wav a x PLAY then case 1smod in sound PLAY usr share sounds shutdown wav gt dev null 2 gt 81 amp sleep 7 esac Hi 348 Chapter 9 Knoppix Remastered HACK Keep Your Custom Disk Up to Date 112 There are a lot more tweaks you can do once you develop experience with the scripts Knoppix uses to start the desktop environment Read through the 45xsession script to find other ways you can tweak your desktop i 12 Keep Your Custom Disk Up to Date After you customize your Knoppix disk make sure it has the latest and greatest packages Release early and release often has been the mantra for many open source projects Debian unstable has over 18 000 packages now so there s a good chance that every day or two there will be an update to some package you are using on your CD When the time comes to remaster it s also a good time to update all the packages on your system With Debian this process is pretty easy The first step to updating the packages on your system is to grab the most current list of packages your package repositories have to offer Inside your remastering chroot environment Hack 109 run the following root ttypo apt get update stabl
5. Figure 3 7 The Synaptic package manager window which means that there are literally thousands of packages available to install from this program There are often updates to these package repositories as new versions of software are released so before you do anything else you will want to get the very latest list of packages and their versions To do so click the Reload button at the top of the window Synaptic will download and update its local database of packages with these new versions Once it is finished you are ready to install packages Install Packages To install a package in Synaptic find its entry in the package list You can either scroll down manually or if you know the name of the package you can start typing in that list to highlight it If you aren t sure about the cate gory or the name of a particular program you can also search within Synap tic for it Click the Search button and then type a keyword related to the package you want to search for in the window that appears Synaptic will then show a filtered list of packages that matched the search This makes it 108 Chapter 3 Tweak Your Desktop Browse the Web Anonymously easy to quickly find the packages you need without scrolling through the thousands of available packages After you identify the package you want to install right click on it and select Mark for Installation If you want to install more than one package mark them all for inst
6. For printers that are shared on the network with Windows printer sharing select SMB shared printer instead of Local Printer If this printer requires a special username or password to access it the next window allows you to set those options You are then asked to enter the workgroup server name and printer name to use see Figure 2 7 If you aren t sure what the correct printer name is click Scan and the wizard scans the network for open printer shares If you have another CUPS server configured on the network select Remote CUPS server The next window lets you define a username and password if the remote printer requires it and afterwards you are prompted to enter the IP address or hostname for your CUPS server The wizard then scans that server and presents you with any shared printers that it discovers 44 Chapter 2 Use Your Knoppix Desktop Configure Your Printer Configure KDE Control Module SMB Printer Settings Workgroup Server Printer Comment Login lt anonymous gt U Scan Q A Figure 2 7 The SMB printer configuration window The rest of the steps are common regardless of how your printer is con nected The next window see Figure 2 8 displays a full list of printer manu facturers Find the manufacturer of your printer in the left panel and pick the specific model or the model closest to yours if your exact model isn
7. HACK 26 Create Persistent Knoppix Settings Network settings LAN Modem ISDN ADSL Select this option to save special network specific directories and set tings stored under etc so they will be reloaded the next time the machine is booted Choose this option if you had to make any special changes to your network settings such as setting up a wireless PPPoE or dial up connection Graphics subsystem settings XF86Config This option saves the configuration files under etc X11 and reloads them on reboot Check this option to save direct edits you have made to your XF86Config file to get your graphics environment to load Other system configuration printer etc This option saves some other miscellaneous configuration settings including those for printers and other peripherals Saveconfig s default is to select all these options except for saving desktop files If you plan to use Knoppix on many machines with different hardware and network configurations you might want to just select the first option Personal configuration so that desktop data and program settings will be saved but network and graphics settings will be detected on each new machine you come to After you select which settings to save and click OK Knoppix provides a list of all the available writable media you can store your settings to This includes any hard drives on your system floppy drives and any USB or other removable storage currently conn
8. Rescue Files from Damaged Hard Drives Ctrl C Also dd_rhelp generates nice ASCII output that shows you where it is on your drive and which bad blocks it has discovered So your drive has the click of death and some files are missing Don t panic You should still be able to recover most or all of your data First you need something to store the disk image on You are using Knoppix so you can save the image to any drive that Knoppix supports including locally mounted drives USB drives and remote file servers This drive must be large enough to hold a complete image of the failing disk partition so even if you have 7 GB free on a 10 GB drive you still need 10 GB of space on a sec ond drive to back up the image Boot Knoppix Knoppix includes dd_rescue but it doesn t include dd_rhelp so browse to http www kalysto org utilities dd_rhelp index en html and download the latest version of the dd_rhelp tool to your home directory Open a terminal extract the files from the dd_rhelp version tar gz file that you have downloaded and change to the directory it creates Then compile the program and run make install to copy the new dd_rhelp binary to your local usr local bin directory knoppix ttypo knoppix tar xzf dd_rhelp 0 06 tar gz knoppix ttypo knoppix cd dd_rhelp 0 0 6 knoppix ttypo dd_rhelp 0 0 6 configure amp amp make checking for a BSD compatible install usr bin install c checking whether build environment is san
9. The Present Today with thousands of Knoppix downloads per day and with about a dozen derivatives each with a special focus group language or supported architecture it seems that my experiment has gotten a little out of hand I m trying my best to keep up with the technical development and I provide reg ular updates of the download edition and add new features and gimmicks And occasionally there are Special Editions like the LinuxTag Confer ence DVD which contains a maxi edition of Knoppix with a lot more soft ware than the CD version By saying this I m probably fitting the clich that says programmers are nat urally lazy in writing documentation but lucky for me it seems that others are now writing manuals and documentation for Knoppix which means I can stay focused on development It s really useful to have a book at hand that not only contains technical information about the structure of a sys tem but also explains some of its components in detail and I have learned a lot from this book about Knoppix In particular I ve learned that some things are not really as complicated as I thought they were Had I read this book earlier I probably would have created Knoppix differently xii Foreword There are so many things you can do with Knoppix The primary design is to use Knoppix as a desktop system platform for tasks such as office work using OpenOffice org for example and Internet connectivity po
10. Tips and Tools for Using the Linux Live CD to Hack Repair and Enjoy Your PC Kyle Rankin O REILLY Foreword by Klaus Knopper creator of Knoppix KNOPPIX HACKS Other Linux resources from O Reilly Related titles Hacks Series Home Linux Books Resource Center go REILLY NETWORK Conferences O REILLY NETWORK safari Bookshelf Linux Cookbook Linux Network Linux Desktop Hacks Administrator s Guide Linux in a Nutshell Linux Server Hacks Linux Multimedia Hacks Ubuntu Hacks hackszine com is a community site for developers and power users of all stripes Readers learn from each other as they share their favorite tips and tools for Mac OS X Linux Google Windows XP and more linux oreilly com is a complete catalog of O Reilly books on Linux and Unix and related technologies You ll also find links to news events articles weblogs sample chapters and code examples oreillynet com is the essential portal for developers inter ested in open and emerging technologies including new platforms programming languages and operating systems O Reilly brings diverse innovators together to nurture the ideas that spark revolutionary industries We special ize in documenting the latest tools and systems translating the innovator s knowledge into useful skills for those in the trenches Visit conferences oreilly com for our upcoming events Safari Bookshelf s
11. because you might inadvertently remove a package you need to keep by removing a package on which it depends Be especially aware of which dependencies will be removed when you remove library packages packages usually start ing with lib because they typically have many other pro grams that depend on them You can also check which packages depend on a certain package with the apt cache command root ttypo apt cache rdepends wine uniq wine 342 Chapter 9 Knoppix Remastered Trim the Fat Reverse Depends winetools libc6 This example pipes the output through the uniq command because the reverse dependencies option in apt cache often generates multiple lines with the same package name so with the uniq command you see only unique packages that depend on this package Please Sir Want to Remove More After removing programs that you know you won t need there still might be ways to trim down the system by removing programs known as orphans Orphans are packages usually libraries that have no other packages depending on them Knoppix includes Debian s tool called deborphan for this purpose To list all of the orphaned libraries on your system sorted by their size run the following root ttypo deborphan z sort n By default deborphan lists only libraries not other types of packages The reason for this is that generally a library s only purpose is to have other pro grams use and depend on it Whe
12. drwxr xr x 16 0 0 0 2048 1084817810 1075129507 1076277991 4096 4 000 mnt hda1 var yp 61440 32190110 16877 drwxr xr x 3 0 0 0 2048 1084817810 1084660839 1084660839 4096 4 000 mnt hda1 var yp binding 61440 33599814 16877 drwxr xr x 2 0 0 0 2048 1084817810 1005606373 1076277977 4096 4 282385F892919eb4135dd333096fa06 mnt hda1 var yp Makefile 61440 33599692 33188 rw r r 1 0 0 0 16868 1084660839 1084009530 1084660839 4096 33 8407552a8b0c1447940b81Fc1ad57a4 mnt hda1 var yp nicknames 61440 33599934 33188 rw r r 1 0 0 0 185 1084722449 1003331481 1076277978 4096 1 body S Similar to body this database contains only SUID files file set to run as root for quick reference command_out As grave robber runs it executes certain system programs such as df dpkg rpm and Isof to grab extra information about the system The out put from these commands is stored in individual files in this directory conf_vault Stores a copy of any files that grave_robber finds interesting including configuration files and other critical files and directories The index html file in the root of this directory links to each of these files in an easy to view HTML format pcat icat Stores images of running processes recovered during the scan named by the ID process and the date and time the image was made When you scan a corpse you receive images of y
13. http www apple com macosx bootcamp275275275 Follow Apple s instructions for installation of Boot Camp as the software may have changed since the time of this writing pix on your particular Mac You might want to try booting Knoppix first without BootCamp if you don t already have it installed RK It s possible that you won t need BootCamp to boot Knop After BootCamp is installed and your Mac has rebooted getting Knoppix going is simplicity itself Just slot the Knoppix disc in and turn on the machine while holding down the C key on the keyboard The Mac will boot from its optical drive and in a few short seconds you ll be presented with the familiar Knoppix boot prompt All the Knoppix cheat codes will work so you can pass it a screen parameter to get a usable screen resolu tion You may need to also pass it the nofirewire cheat code to get your Mac to boot depending on what devices are on your firewire device chain It s as easy as that to get your Intel based Mac booting Knoppix Now that you ve got your Mac running Knoppix you should be able to use most of the hacks in this book without trouble Once Knoppix is booted you may notice that Knoppix won t automatically mount any hfsplus partitions on the Mac At this time writing to hfsplus partitions is still somewhat risky but by default Knoppix mounts partitions as read only so you should be safe To mount an hfsplus partition first be sure that
14. s9 Stan KNOPPIX Terminal Server CS Sun SSH Server T Stan SYSLOG me Stan Samba Server 1 Find Fies D Help E AA Home Personal Fes PEEEILITEI E Figure 8 1 Launching an openMosix terminal server Now select some miscellaneous options Secure Disables the root access on client systems which means that the default user knoppix won t be able to su to root Textmode Boots the clients in text mode thus giving more memory for the migrat ing processes Using textmode is the same as specifying 2 as an extra boot option Hack 4 Masq Sets the master node as a masquerading forwarding server so that your clients can connect to the Internet rest of the network DNS Sets up a caching nameserver Squid Sets up a web proxy cache Finally you get the option to specify any extra Knoppix cheat codes that you want to use on your clients After the Knoppix cheat codes are chosen the terminal server starts 318 Chapter 8 Knoppix Reloaded Distribute the Load with ClusterKnoppix Boot Your Clients The next step is to boot your clients from the network This step will be very simple or require a bit of extra work depending on whether your client sup ports PXE or requires Etherboot PXE If you are using PXE this step is easy Select PXE in your BIOS and then boot the client If you specified the correct network card driver in the terminal server setup the client now boots ClusterKnoppix You can pat yoursel
15. t have to do any special tricks to change system settings just write to the configuration file as you would with any other Linux system You can actually very easily see at any point what files have changed since the system has booted Just explore the parti tion ramdisk and you will see a subset of the root filesys tem with any modified directories or files If you make a copy of the ramdisk directory you will get a handy snap shot of all the changed files 74 Chapter 3 Tweak Your Desktop Create Persistent Knoppix Settings Create Persistent Knoppix Settings Knoppix has the capability of saving changes you have made during your session to floppies USB drives or other removable media Use this ability to create a Knoppix setup that you can take to any computer One of the great things about Knoppix is that it all resides on a single disk so you can take the same desktop environment and programs with you to any accessible computer One problem however is that a CD or DVD is read only media so any configuration changes you make or any special set tings you might change to get Knoppix to work on your hardware are lost the moment you shut down the computer If you have a USB drive a floppy drive or some other writable media Knoppix has automated the process of keeping changes you make to Knoppix persistent across reboots You even have the option of saving every file you add which means you can take your data with
16. 120 122 Gentoo 124 126 navigating installers 113 118 single boot systems 118 120 Morphix 278 multimedia codecs 111 Nvidia 3D drivers 100 103 packages 108 Privoxy 110 pydance 90 RPM packages 245 Tor 110 instant messaging 64 settings copying 85 Institute for Security and Open Methodologies ISECOM 289 Intel based systems running on 273 275 interfaces 63 anonymous browsing 109 111 DRI 191 firewall options 144 kiosks configuring for 86 Kismet 163 LISa networks 138 Internet connecting 55 with GPRS Bluetooth 57 62 Freeduc 280 navigating 62 65 Internet submenu 31 IP masquerading 143 378 Index iptables command 143 IRC 64 settings copying 85 ISECOM Institute for Security and Open Methodologies 289 isolinux 286 J john 303 joining communities 332 networks wardriving 165 joysticks 49 JUMP 325 K K Desktop Environment see KDE K menu navigating 30 33 K3b 54 KAtomic 50 KB knowledge base nessus tool 171 KBattleship 50 KDE K Development Environment 28 Control Center 32 languages modifying 12 Control center appearance and themes 35 38 customizing desktops 34 38 Info Center 189 krdc 130 LISa 138 Morphix 278 settings copying 80 KDevelop 97 99 Kdrive X servers 282 kernels configuring 193 copying 246 md module 226 openMosix 315 321 source trees adding 101 updating 6 Kershaw Mike 158 keyboard mapping modifying 12 keys
17. A new name will then be assigned to the testing branch The advantages to this distinction are that you can choose to follow either a group of packages such as Lenny which means you will eventually be running the stable release or you can choose to follow a branch by its name If you are using the testing branch you can continue to use the testing branch even when the Lenny packages become stable The exception to this naming rule is the unstable branch It will always have the nickname of Sid after the boy in the movie Toy Story who broke all of the toys and that name does not move up the list as packages stabilize This chapter discusses the state of the current Knoppix hard drive installer knoppix installer and provides a few installation scenarios that provide a complete guide to installing Knoppix on a single boot setup and as a dual boot setup with Windows As you ll soon see installing Knoppix is easy even for new Linux users Mer Explore the Knoppix Installer 40 Learn the ins and outs of the Knoppix installer before installing Knoppix was originally intended to run just from the CD but early on users wanted to transfer the system to their hard drives once they discovered how well the CD recognized and worked with their computer At first this involved a complicated set of commands run from a shell to copy the CD to Chapter 4 Install Linux with Knoppix 113 HACK 40 Explore the Knoppix Installer the hard
18. Is a tarpit This is a different approach that rather than focusing on tracking attacker activities uses some TCP magic to make scanning your network as hard as possible It works by taking over unused IP addresses on a network and creating virtual machines that answer to connection attempts Although this won t stop attackers it will slow down their progress to such an extent that they will be hitting their key boards in frustration Previously trivial activities like port scanning start to take ridiculously or unfeasibly long times to complete When the world was bombarded with the Code Red worm a while back labrea tarpits served as an effective means to slow down its propagation As a simple example let s create a shell that logs everything in the back ground to a dated log file It is important to realize that this in itself is not a honeypot It is however a useful theoretical example of a honeypot s essen tial components This example also has the added advantage of being useful in the real world as you will often find yourself needing to log your shell ses sions We set up the shell by knoppix ttypo knoppix consh all activity is logged to home knoppix conf ttylog play back log files with replay DATE_tty log timing DATE_tty log Now we type some commands so that our log file has something in it Type exit to close the shell then check what log files were created knoppix ttypo knoppix ls home
19. Java Perl Python PHP Ruby Lua Tcl Awk and A Editors XEmacs Vim jed joe kate nedit and zile Scientific publishing Extended LaTeX support with several frontends xemacs kile and lyx and numerous extensions and tools for LaTeX and BibTeX Office software OpenOffice org KOffice Gnumeric and tools like the Gimp Networking Ethereal portmap netcat ethercap bittorent nmap squid and a host of wireless tools and drivers General tools Apache MySQL PHP and more Chapter 8 Knoppix Reloaded 323 HACK 104 HACK 104 Analyze Quantian Quantian is not limited to these applications Quantian also provides instant openMosix clustering with fully automatic configuration see Hack 103 as well as the ability to let other machines boot over the network in the openmosixterminalserver mode and become additional cluster nodes More over through the addition of suitable libraries and applications for the pvm and lam mpich message passing interfaces Quantian also provides Beowulf clustering support Both openMosix and Beowulf styles of distributed com puting can be combined for example multiple pvm or mpi node clients can be started on a single host in order to let openMosix spread the load most efficiently across the cluster see Figure 8 3 AS Mi Shei pr SO sreilwe ew 15 v Elle View Config Colector Help sane AR tetesh 5 3s F oponMosixcolector status id chustemodes load ba
20. Knoppix Hacks the image of a pocket knife Hacks 100 Industrial Strength Tips and Tools and related trade dress are trademarks of O Reilly Media Inc Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks Where those designations appear in this book and O Reilly Media Inc was aware of a trademark claim the designations have been printed in caps or initial caps While every precaution has been taken in the preparation of this book the publisher and author assume no responsibility for errors or omissions or for damages resulting from the use of the information contained herein Small print The technologies discussed in this publication the limitations on these technologies that technology and content owners seek to impose and the laws actually limiting the use of these technologies are constantly changing Thus some of the hacks described in this publication may not work may cause unintended harm to systems on which they are used or may not be consistent with applicable user agreements Your use of these hacks is at your own risk and O Reilly Media Inc disclaims responsibility for any damage or expense resulting from their use In any event you should take care that your use of these hacks does not violate any applicable laws including copyright laws RepKover s This book uses RepKover a durable and flexible lay flat binding ISBN 978 0 596 51493
21. Knoppix has added an extra feature to its install tool to make even the upgrade process simpler With the Knoppix upgrade feature all you need to upgrade an old install of Knoppix is the latest Knoppix release Boot your system from the Knoppix disk and then type sudo knoppix installer to start the Knoppix installer The installer will detect your installed Knop pix system and the very first option you see will be Update Starts the package updater Select that and Knoppix will prompt you for which disk to update Choose the device that corresponds to your root partition likely dev hdal or dev sda1 Knoppix will set up your system behind the scenes to allow it to be updated directly from the CD and then launch the kpackage package management tool While this program can install RPM 126 Chapter 4 Install Linux with Knoppix Update a Knoppix Install from the CD and DEB packages as well as manage the packages that are on the system you won t use these options to update Knoppix instead click a special option Special gt Apt Debian gt Upgrade A new window will appear and run through the full list of software that needs to be updated You can moni tor the progress of the update tool through this window but for the most part you can sit back and let the tool update the system The benefit to this method is that you can update directly from the disk and don t have to download packages from the Internet Plus if you
22. LZMA compression 286 M Macintosh Intel based systems 273 275 mail servers postfix configuring 151 testing 153 see also email mailing lists 331 mainmodule directories 357 management clusters 324 contact OpenOffice org 42 43 Debian packages 243 244 DVD only window managers 68 70 KDE 28 LVM see LVM 380 Index packages 107 configuring APT 123 remastering 338 PIM 43 power disabling 20 Smart Boot Manager 3 software projects 97 99 Theme Manager 35 windows FluxBox 291 modifying default 346 MapDesk 325 MapLab 325 mapping GIS Knoppix 325 326 keyboards modifying 12 wardriving 164 see also GPS MapServer 325 masquerading IP 143 Master Boot Records see MBRs master CD file systems creating 339 mathematics Freeduc 280 Quantian 323 MBRs Master Boot Records grub restoring to 203 205 lilo restoring to 202 restoring and backing up 205 207 md kernel module 226 MD5sum 8 mdadm tool 227 230 234 memory CDs remastering 335 detecting 20 optimizing 14 RAM see RAM Memtest86 23 26 memtest86 286 menus Bookmarks 32 installers 114 options 115 K Menu navigating 30 33 Lock Session 33 Log Out 33 Quick Browser 32 Run Command 33 Widget Style 37 menusSwitch User 33 methods cpio 224 find 224 rsync 224 Microsoft Office 39 see also office tools migrating to hard drives 223 225 RAID 230 235 Minesweeper 50 miniroot gz file 195 m
23. PN P A Y 010 N 006 Hing networks Shell No 2 Figure 5 4 Kismet default screen Notice that Kismet has Group filters and that Probe Networks has a num ber of elements There is a default Linksys access point with factory settings in red In the bottom pane there are various other alerts as they occur In this case I have a client that is probing networks 162 Chapter 5 Put Knoppix in Your Toolbox Wardrive with Knoppix Figure 5 5 shows the network details for a selected network All of the fields are self explanatory pia Session Edit View Bookmarks Settings Help Shell No 2 Figure 5 5 Kismet network details An interesting feature of Kismet is the ability to lock onto a network Select a network and then hit the L key to lock on to stop the channel hopping and set monitoring only to the selected network s channel To resume hopping press H Once you finish running Kismet you can close the program by hitting Ctrl Q By default logs are written to the var log kismet directory as Kismet runs You can change this in the configuration files If you re in your persis SB storage drive this directory may tent home directory and it s a small U fill up quickly In an example run I have IW Y 1 IW Y 1 IW Y 1 IW Y 1 IW Y 1 IW Y 1 PRPRPRPRP PR root root root root root root root 0 May root 0 May root 81
24. QTParted tool 209 sounds disabling 348 thin clients 97 statistics GPS combining with wardriving 159 Quantian 323 S T D Security Tools Distribution 290 314 steganography tools 294 stegbreak 294 stegdetect 294 storage assigning 150 styles modifying 35 Widget Style menu 37 submenus Development 30 Editors 31 Emulators 31 Games 31 Graphics 31 Help 31 Internet 31 KNOPPIX 31 Lost and Found 32 Multimedia 31 Office 31 Settings 31 System 32 Toys 32 Utilities 32 see also menus sudo command 71 sudo passwd command 183 support hardware xix peripheral devices using 46 49 svga module 17 swap partitions 114 creating 118 swapon command 336 Switch User menu 33 Sylpheed 282 symlinks 241 Synaptic 107 synchronizing KPilot 43 servers 248 syslinux 286 system files copying 192 194 restoring 267 269 system freezes 212 System option 79 System submenu 32 systemroot folder Windows 256 Index 387 T tables partitions 205 tar command 221 223 tarballs copying 101 Target Selection tab nessus tool 171 TCP Tools S T D 306 tcpdump 305 tepkill 307 tcpreplay 307 technology Freeduc 280 television 326 329 Terminal Server booting from 94 96 TerraView 325 testing Bit Fade 26 branch Debian 112 burnBX test 25 clusters 321 hardware compatibility 186 192 mail servers 153 memory Memtest86 23 26 wiki platforms 200 text 47 Damn Sm
25. These cheat codes give you the added benefit of freeing up the disk drive for other uses particularly handy if you have only a single disk drive in a system you can play music or burn CDs DVDs while using Knoppix The toram cheat code instructs Knoppix before it does anything else to cre ate a large ramdisk and copy the complete CD there A ramdisk is a virtual hard disk that your operating system creates by setting aside a certain Chapter 1 Boot Knoppix 13 HACK 6 Free Your CD to Make Knoppix Run Faster amount of your RAM When you boot with this cheat code Knoppix warns you that it might take some time to copy the full image and provides a progress bar while the image is copying The Knoppix CD image is approxi mately 700 MB by itself so this option is only for those of you with 1 GB or more RAM in your system even after copying the CD to RAM Knoppix still needs a good portion of the RAM for loading applications and writing tem porary files To load the entire DVD to RAM you will need at least 4 4 GB available Knoppix will detect whether you have enough RAM for this cheat code as it boots and if you don t have enough it alerts you that it ran out of space and cannot complete the copy and drops back to loading directly from the CD ROM If you don t happen to have large amounts of RAM in your system you can still free up your CD ROM drive by using the tohd cheat code Similar to the toram cheat code this cheat
26. also known as striping combines the storage and speed of two drives into a single larger drive RAID 0 provides no redundancy how ever so if one drive fails all of the data is lost For this example there are two regular Linux partitions dev hdal1 and dev hdb1 of approximately the same size To create a RAID 0 array from these two partitions type the following sudo mdadm create dev mdo auto yes level 0 raid devices 2 dev hda1 dev hdb1 mdadm array dev mdo started Chapter 6 Repair Linux 227 HACK 76 Create Linux Software RAID RAID 1 RAID 1 also known as mirroring uses two or more partitions essen tially as mirrors of each other so every byte written to one partition is simul taneously written to the other partitions RAID 1 provides protection from drive failure if a single partition fails any other partition on the array still contains all the data and when the failed partition is replaced all of the mir rored data is automatically written to the new partition by the RAID pro gram To create a RAID 1 array across dev hdal and dev hdb1 the command is very similar to the command for a RAID 0 except that you type level 1 to specify RAID 1 sudo mdadm create dev mdo auto yes level 1 raid devices 2 dev hda1 dev hdb1 mdadm array dev mdo started RAID 5 RAID 5 also known as striping with parity combines three or more similarly sized drives into a single larger drive Any d
27. and choose the scanner you wish to use from the resulting menu Xscanimage does not provide as many scanning options as Kooka but all image crop ping and rotation can be handled directly in the GIMP itself You can manipulate the image within the GIMP and save it into one of the many file formats that the GIMP supports Digital Cameras You can also manipulate images from your digital camera with little to no extra configuration in Knoppix For digital cameras that work as a generic USB storage device under Windows they show up as a removable drive simply plug in and power on the camera and a new hard drive icon appears Chapter 2 Use Your Knoppix Desktop 47 HACK 16 HACK 16 Use Peripheral Devices on your desktop allowing you to view your images directly from the camera default so to delete or edit any of these images directly from the camera right click on the hard drive icon and select Change read write mode Sir Remember that Knoppix mounts filesystems as read only by You can open the images with the GIMP or one of the other image editing applications included in Knoppix crop or edit the images how you prefer and save them back onto the camera or some other storage device Remem ber to unmount the camera before unplugging it from the computer or powering it off by right clicking on the hard drive icon and selecting Unmount This ensures that all changed files have been completely writ ten to the c
28. and Mozilla It was aimed at office users with more recent machines Even so a normal Morphix Gnome ISO still doesn t fill up the whole 650 MB CD ROM and recent versions weigh in at around 500 MB Morphix KDE Although primarily focused on GTK Gnome the Morphix crew acknowledges that users might prefer KDE instead and looking at the number of derivatives a lot of users do Morphix KDE contains the whole KDE suite of programs as well as Mozilla and other applica tions Morphix KDE sits in between LightGUI and Gnome when it comes to size and fills up approximately 400 MB of space on your CD ROM Morphix Game An oddball in Morphix this flavor contains the very light IceWM and a very large number of open source games BZflag Frozen Bubble Free craft and many many others are sure to entertain the kids or entertain the kid in you for quite a few hours Normally Morphix Game also includes one or more demo versions or free full versions of commercial Linux games adding to the fun Gaming on Linux a rarity This hasn t been the case for many years no matter which kind of games you enjoy All the official Morphix live CDs contain the Morphix installer This tool allows users to easily install their Morphix or derivative live CD to a hard disk The Morphix installer is also built in a flexible manner so that deriva tives can even rebrand the Morphix installer although the source itself is licensed under the GNU GPL A graph
29. base of users and is widely supported by many applications platforms as a centralized means to authenticate credentials Further Reading e http en wikipedia org wiki RADIUS e http en wikipedia org wiki FreeRADIUS Cryptography Cryptography is the process of garbling data so only a legitimate user can read it The real magic of modern cryptography is in the keys used to un garble the data There is no point in encrypting data if the key can be Chapter 8 Knoppix Reloaded 293 HACK 101 HACK 101 Full Protection with S T D trivially intercepted or guessed This is where PKI Public Key Infrastruc ture comes in PKI allows you to have one key for encrypting the public key and another completely different key for decrypting the private key This way you can freely share your public key allowing people to encrypt data for only you while you closely guard your decryption key The core encryption library and command line tool used under Linux for encryption and key generation is openssl Gnu Privacy Guard gpg is included as the open source replacement for PGP Pretty Good Privacy and works in a similar fashion Super FreeSWAN is compiled into the custom kernel to provide IPSEC VPN support Obviously there are other ways to encrypt data that do not rely on PKI Whilst these methods are not as secure they do have a certain cool factor about them One example is steganography tools perhaps better known as st
30. chmod a x home knoppix restore sudo home knoppix restore Desktop recover deleted_files txt After the script is finished executing change to the directory you specified in RESTOREDIR and you should see a mirror of the filesystem for all of the deleted files For instance if I ran this I would see a home knoppix Desktop restore home directory and under it other restored files and directories RK Even though fls lists a file and icat restores it the file still might be empty or incomplete if some of its blocks were overwritten by other files When that happens unfortu nately there isn t much recourse Again if you accidentally delete a file the best action is to immediately unmount or otherwise turn off the computer TaJ Rescue Files from Damaged Hard Drives F W7 4 When your hard drive is damaged or is on its last legs use Knoppix to recover what s left on the drive and attempt to restore it Hard drives continue to get larger and more complicated and at least in the desktop IDE market hard drives seem to be getting less and less reliable If you don t believe me search the Internet for IBM Deathstar referring to problems in the 60GXP and 75GXP series of hard drives While a three year warranty guarantees you a replacement drive if your drive fails there is no way to receive replacement data When your hard drive starts to fail you Chapter 6 Repair Linux 217 HACK 72 Rescue Files from Dam
31. don t have to bother with any extra routing for that network If both net works are already set to use this machine as the default gateway then you are finished Either of these scenarios might be the case if you drop in Knop pix to replace a router and assign it the same IP addresses as the previous router If a network does not use the Knoppix machine as its gateway you must add a route to the actual gateway on that subnet This route tells the gateway to route any traffic going to the other subnet through the Knoppix router To add a route through the Knoppix router requires root access to the network s default gateway In our example the default gateways are 192 168 0 1 and 142 Chapter 5 Put Knoppix in Your Toolbox Create an Emergency Router 192 168 1 1 respectively so on 192 168 0 1 run the following command as root root ttypo root route add net 192 168 1 0 netmask 255 255 255 0 gw 192 168 0 5 On 192 168 1 1 run root ttypo root route add net 192 168 0 0 netmask 255 255 255 0 gw 192 168 1 5 Once you set up these new routes machines on either side can ping each other and your route is complete Network with NAT Performing IP masquerading or NAT with Knoppix is as simple as configur ing it as a standard router if not simpler NAT is commonly used to share a single public IP address like you might get from a DSL or cable provider with a local network behind the NAT router For NAT to work all
32. e Authentication e Cryptography e Forensics e Firewall e Honeypot e IDS e Network Utilities e Password Tools e Servers e Sniffers e TCP Tools e Tunnels e Vulnerability Assessment e Wireless Tools e OpenMosix e Usermode Linux Each of these disciplines has its own dedicated shell to separate the tool families as far as possible This allows a much simpler access to just the tools you need for the job at hand The shells are accessible via the FluxBox appli cation menu For example you can find the Password Tools Shell in the FluxBox menu or you can access the Password Tools via the console at usr bin pwd tools The vast majority of tools are executed through command line only and therefore are only available via the shell Obviously covering every tool in S T D is not within the scope of this arti cle To give you a good taste of what can be achieved we have included some very simple examples in the following sections Hopefully this will help you on your way and inspire you to set out on your own We also include a number of URLs that can be used as starting points for further reading We love Wikipedia so we rely heavily on it We find it usu ally provides a well written topic summary and is more reliable in the long term than linking directly to project home pages which tend to move and change hands 292 Chapter 8 Knoppix Reloaded Full Protection with S T D We refer to both hackers and cracker
33. hdb It is important that hdb be the same size or greater than the size of hda when you copy the image 180 Chapter 5 Put Knoppix in Your Toolbox Clone Hard Drives otherwise only some of your files are copied or the worst case the image does not mount To perform the disk to disk copy open a terminal and run the following command sudo dd if dev hda of dev hdb This command takes some time depending on size and speed of your disks and unfortunately dd does not provide a fancy progress meter If you don t want to copy a complete drive but just copy a partition from one system to another you add the particular partition number you want to use Similar to copying a disk to another disk make sure that the partition that you are copying to is the same size or larger than the partition you are copying from This command copies the first partition from dev hda to the first partition of dev hdb sudo dd if dev hda1 of dev hdb1 Like with a disk to disk copy this takes some time to complete although generally cloning entire disks or partitions with dd is faster than doing file for file copies with tar or cpio You also have the option to store a complete disk image to a file This enables you to create a complete snapshot of a hard drive that you can reim age back to the drive to restore it to a certain state This can be particularly useful in the case of computer forensics Hack 57 when you want to create
34. however make sure that the CD image you have cre ated is small enough to fit on the CD or your DVD image is small enough to fit on a DVD Even if it doesn t fit you can still test the image using the bootfrom cheat code To test the image reboot the computer and add knoppix bootfrom dev hda1 knoppix iso at the boot prompt Replace hda1 with your partition In fact to make sure everything is how you want it I recommend testing your CD images this way before using up CDs 340 Chapter 9 Knoppix Remastered HACK Trim the Fat 110 Trim the Fat i Knoppix has been able to squeeze a lot of useful tools on a single CD image When you want to add your tools to the mix you must use some tricks to keep the total file size low enough to fit on a CD So you ve gone through all the steps and finally your remastered CD is fin ished You are about to reach over for a blank CDR when you notice your CD image is 740 MB Welcome to the challenge Klaus Knopper faces with every release keeping almost 2 GB of great software compressed under 700 MB The Knoppix 3 4 release was delayed for some time partially because some of the popular packages in Knoppix like KDE and OpenOffice org had continued to increase in size To get everything to fit Klaus had to remove the complete KOffice suite along with TeX and a few other packages Even though these days you could always move to the Knoppix DVD image if you need more space you still c
35. outbound traffic your S T D to pass whilst simultaneously dropping all inbound traffic everyone else Let s manually start the blockall script from the command line to protect our S T D box If working remotely to your host via SSH or a similar remote access protocol immediately add a rule allowing all traffic from your own IP address Many a security tester has had to make the trip of shame after they block themselves from their own box First check that the current firewall rulebase is empty knoppix ttypo knoppix sudo iptables L Chain INPUT policy ACCEPT target prot opt source destination Chain FORWARD policy ACCEPT target prot opt source destination Chain OUTPUT policy ACCEPT target prot opt source destination Now activate the blockall script knoppix ttypo knoppix sudo usr bin fw blockall Check that the current firewall rulebase now contains rules to block traffic knoppix ttypo knoppix sudo iptables L Chain INPUT policy ACCEPT Chapter 8 Knoppix Reloaded 297 HACK 101 HACK 101 Full Protection with S T D target ACCEPT DROP prot opt source destination all knoppix std anywhere tcp anywhere anywhere tcp flags SYN RST ACK SYN Chain FORWARD policy ACCEPT target prot opt source destination Chain OUTPUT policy ACCEPT target prot opt source destination Now we revert to an open rulebase by knoppix ttypo knoppix sudo usr bin fw flus
36. run the clamscan program with the r scan recursively through the directory and i only list infected files options and finally with the directory to scan clamscan r i mnt hda1 Documents and Settings SCAN SUMMARY Known viruses 116148 Engine version 0 90 2 Scanned directories 303 Scanned files 690 Infected files 0 Data scanned 248 10 MB Time 104 312 sec 1 m 44 s In the above example I only scanned my Documents and Settings directory but if I had wanted to scan the full drive I could have just specified mnt hda1 instead Keep in mind that scanning the full filesystem will take a long time Chapter 7 Rescue Windows 271 HACK 94 Download Windows Patches Securely Once you have a list of suspicious or infected files you can mount the parti tion read write and delete or rename the files If you are a Windows expert who is comfortable with registry edits you can follow the steps in Hack 91 to remove any registry keys the virus might have left behind You might also want to view advisories on the viruses that ClamAV finds on http www cert org or other security sites and see if perhaps there is a patch you can download to protect your system from this virus or worm in the future Now is a good time to save any patches you might need to your hard drive so you can boot back to your computer without having to connect to the network and install the patch as covered in H
37. s certainly very easy to boot a Knoppix disk to try it out you may want to show Knoppix to a friend or try it out without rebooting the com puter and closing any windows you currently have open If you have the Knoppix DVD there is a solution for you Added to the regular Knoppix software on the disk is a Qemu virtual machine environment http fabrice bellard free fr qemu that is already set up so that you can boot the Knop pix machine completely within Qemu and try it out without rebooting or even closing any other windows on your desktop To try this out under Windows insert your Knoppix DVD The autorun is configured to open the Knoppix page within a web browser but close that and then open My Computer find the DVD drive and right click on it and select Explore Open the qemu directory that is the root of the DVD filesys tem and then click on the start bat file you see within That s it Qemu will automatically start and you will be greeted with the Knoppix boot screen Figure 1 2 Click within the window if you want to enter any cheat codes or otherwise just wait and it will boot automatically Hit Ctrl Alt at any point if you want your mouse and keyboard focus to leave the Qemu envi ronment and go back to your desktop When you are finished using Knoppix shut down the virtualized Knoppix as you normally would or just close the window in which it is running Chapter 1 Boot Knoppix 5 HACK 3 Get Knoppix
38. 0 88 7 Recommended version 0 90 2 DON T PANIC Read http www clamav net faq html Downloading main cvd main cvd updated version 43 sigs 104500 f level 14 builder sven ARNING Your ClamAV installation is OUTDATED ARNING Current functionality level 10 recommended 14 DON T PANIC Read http www clamav net faq html Downloading daily cvd daily cvd updated version 3244 sigs 11648 f level 15 builder ccordes ARNING Your ClamAV installation is OUTDATED ARNING Current functionality level 10 recommended 15 DON T PANIC Read http www clamav net faq html Database updated 116148 signatures from db local clamav net IP 209 59 139 38 ERROR Clamd was NOT notified Can t connect to clamd through var run clamav clamd ctl connect No such file or directory As you can see in the preceding example my virus definitions were out dated Also the error that clamd was not notified can be ignored we aren t running the clamd daemon on Knoppix Now that I have the latest defini tions I m ready to scan my system First make sure that the partition you want to scan dev hdal in this example is mounted Either click the hard drive icon on the desktop or type sudo mount dev hda1 and replace dev hda1 with the partition you want to scan Keep in mind that you don t have to enable read write privileges to scan but only if you find any infected files you want to delete With the drive mounted
39. 15 57 CEST 2007 Next we fire up hping2 and tell it to send a crafted packet to our target knoppix ttypo knoppix sudo hping2 icmp icmptype 13 icmpcode 0 10 0 0 2 HPING 10 0 0 2 ethO 10 0 0 2 icmp mode set 28 headers 0 data bytes len 46 ip 10 0 0 2 ttl 64 id 42908 icmp_seq 0 rtt 0 6 ms ICMP timestamp Originate 51359179 Receive 55118713 Transmit 55118713 ICMP timestamp RTT tsrtt 2 10 0 0 2 hping statistic 1 packets tramitted 1 packets received 0 packet loss round trip min avg max 0 6 0 6 0 6 ms erate this packet but also listen for and decode the response For most other packet types you should expect to need a sniffer to capture the response RK We chose this example carefully as hping2 cannot only gen We quickly refer to our RFC again to understand what hping2 is telling us The Originate Timestamp is the time the sender last touched the message before sending it the Receive Timestamp is the time the echoer first touched it on receipt and the Transmit Timestamp is the time the echoer last touched the message on sending it So the Originate time should match our local clock and the Receive time should match the remote clock The figures are listed in milliseconds after midnight so after a quick session on our Casio calculator we find approximately e Local Time 14 15 59 e Remote Time 15 18 38 There is a two second difference between the hping2 reported local time and the date reported
40. CD DVD ROMs and floppy drives on your system see Figure 2 2 Click on any of the drive icons to automatically mount the drive as read only and open up the mounted filesystem in Konqueror Under KDE the default is set to open a directory or launch a file with a single click which might take some adjust ment if you are used to double clicking icons on the desktop Because Knop pix defaults to mounting these filesystems as read only you can view and open the files you see but you can t edit delete or move any of the files on these filesystems You can however copy the files to your desktop and edit them from there To make these filesystems writable right click on the drive icon and select Change read write mode The right click menu also gives you options to unmount and if the device is a CD ROM to eject the media GUYVER E gt Location cdrom index html CD Inhaltsverzeichnis KNOPPIX Webseite Ctrl X _ Copy Ctrl C Rename re Move to Trash Delete x Delete Shift Delete Open With Actions gt Mount B Change read write mode gt Compress Copy To Move To Properties DE DK EN E Figure 2 2 Desktop icons Chapter 2 Use Your Knoppix Desktop 29 HACK 12 HACK 12 Explore the Desktop The K Menu The KDE panel spans the entire bottom portion of your screen On the left of the panel is the K Menu represented by the K Gear icon
41. Chapter 2 Use Your Knoppix Desktop Explore the Desktop Editors Lists a variety of text editors including Vim Emacs Joe and many oth ers to satisfy most if not all of the text editor zealots out there myself included Emulators Contains the different computer emulators included with Knoppix such as Bochs DVD only Though this would seem to be a fitting place for the program Wine which allows you to run Windows programs on Linux you won t find it here instead you will just find a link to winetools Games Who says Linux doesn t have games Knoppix includes several from arcade games to board games to card games It is easy to get lost in this menu only to emerge hours later but don t spend too much time here as there are more submenus to cover Graphics Has many different graphics applications from painting programs to scanning programs to image manipulation applications such as Gimp Help Provides some basic help applications that let you access info and man ual pages for the different programs in Knoppix For general desktop help use the K Menu Help icon instead of the applications here Internet Contains a slew of Internet applications from web browsers to instant messengers to video conferencing applications KNOPPIX Provides all of the Knoppix specific applications that allow you to run particular configuration applications start services and special pur pose Knoppix utilities This menu is als
42. Enter chntpw lets you leave the key as is You can also type in the new value and hit Enter to make the change After you make your changes hit q to quit the registry editor If you have changed any keys chntpw prompts you to save your changes Until now chntpw has not actually writ ten the changes you have made to the file saying yes here writes any changes to the registry Once the changes are written you can exit chntpw unmount your partition and then reboot your computer back to Windows to observe the changes i 92 Restore Corrupted System Files Extract important drivers and other system files from cab files on your Windows system from within Knoppix One of the functions of the Windows Recovery CD is to restore system files that have been corrupted Basically the CD extracts the default versions of these drivers from cab files stored on the CD and overwrites the versions on your system If you have applied service packs since you originally installed Windows you ll discover that your up to date drivers will be overwritten with the old ones from the recovery CD If you don t have a Windows Recovery CD handy or you want to use files from a service pack use Knop pix to restore important system files by using the cab files that are already on your system If you don t have the necessary cab files download the security patches from Microsoft s site and extract the files you need Hack 94 Chapter 7 Rescue Wi
43. GPS 325 gpsd 160 gqcam 49 197 grub updating 122 gtkam 48 Hello World 98 Help Center 32 Home Personal Files 32 iceape 88 installing 362 K3b 54 We d like to hear your suggestions for improving our indexes Send email to index oreilly com 369 applications continued KDE copying settings 80 KDevelop 97 99 kiosks creating 86 90 klik installing with 104 106 Kooka 47 kwiki program 199 live disk installing 107 109 Memtest86 23 26 multimedia 50 55 office tools 39 43 Kontact 42 43 OpenOffice org 39 42 Privoxy 110 pydance installing 90 qtparted 114 starting 118 Quake3 104 rdesktop program 131 remastering 334 340 settings copying 82 sndconfig 23 51 Tor 109 tzselect 12 video conferencing 64 xawtv 55 xine 54 APT Advanced Package Tool configuring 123 apt cache command 342 arpwatch 307 arrays RAID 226 adding extra drives to 235 assigning storage 150 audio Audacity 53 disabling 348 Freeduc 280 Frets on Fire installing 91 multimedia applications 50 55 Musix 329 331 pydance installing 90 auditing security 166 173 Aufs xx using 72 74 authentication S T D 293 auto building Morphix 356 358 autodetection RAID 229 automating remastering 351 353 Autopsy 177 avscan 286 backgrounds modifying 35 36 backing up MBRs 205 207 registries 264 267 tar command 221 223 Windows files and settings 256 258 BackTrack 174
44. HACK 101 Full Protection with S T D find any holes there s always one look harder when you complete the testing you will understand your system more thoroughly and with increased understanding comes the increased chance of spotting an attack Countless books have been written about every aspect of this discipline and no one knows it all We are often asked on the forum how to learn this sub ject and our reply is always the same Read read some more and when you have done that start reading again Pick something small and try it perse vere until you understand it and have mastered it then move on In no time at all you will realize you are starting to get somewhere Almost every tool on S T D can be used as part of a vulnerability test but the shell has the most famous ones split out Nessus Nessus is the vulnerability assessment tool It has its own scripting lan guage tiered management a nice GUI frontend and multiple report formats including HTML It has consistently beaten many commercial vulnerability assessment tools in bake off type contests Even if you have a commercial tool for this job run nessus as well You have to start a test somewhere and although you can manually do everything nessus can do you will soon get very bored of this Nessus is not the be all and end all of vulnerability testing but you should run it at the start of a test to get a feel for the targets reduce your
45. If Knoppix brings up a desktop environment then obviously the video card and display work to some degree Specific information about which video card features X was able to load and which resolutions and color depths X accepted and rejected can be found in var log Xorg 0 log This file contains a lot of detailed information much like dmesg and like dmesg much of it may not interest you A lot of the interesting information e g which resolutions were accepted and rejected and which input devices were configured can be found near the bottom of the file NV O VideoRAM 32768 kBytes NV O Using gamma correction 1 0 1 0 1 0 II NV O Monitoro Using hsync range of 30 00 70 00 kHz II NV O Monitoro Using vrefresh range of 50 00 120 00 Hz II NV O Clock range 12 00 to 350 00 MHz II NV O Not using mode 1280x1024 hsync out of range II NV O Not using mode 1024x768 hsync out of range II NV O Not using mode 1152x864 hsync out of range Option Protocol IMPS 2 USB Mouse Protocol IMPS 2 Option SendCoreEvents true USB Mouse always reports core events Option CorePointer USB Mouse Core Pointer 190 Chapter 5 Put Knoppix in Your Toolbox Test Hardware Compatibility Option Device Option Buttons 5 USB Mouse Emulate3Buttons Emulate3Timeout 50 dev input mice 4 Option ZAxisMapping 4 5 II US
46. In addition you should have a FAT or FAT32 filesystem on your USB drive most come with this filesystem on it by default For this method I will boot into my Knoppix CD since it already has installed all of the tools I need for this process You don t have to boot into Knoppix for this process pro vided your Linux system has both syslinux and optionally the install mbr program installed If you run this from your Linux system just replace cdrom with the path to your mounted Knoppix CD in the following examples Boot Knoppix with your USB key inserted to make sure that it is detected by the machine Most systems should detect the drive as dev sdal although systems with other SCSI devices might detect it differently If you aren t sure which device it is click on each of the hard drive icons on the Knoppix desk top until you recognize the files already on your USB key drive For my example I will assume a key drive on dev sda1 The first step is to click K gt KNOPPIX gt Root Shell to open a terminal with root privileges Now mount the USB key and copy all the files from the Knoppix CD to the key mount o rw dev sda1 mnt sda1 rsync av cdrom mnt sda1 After the files have copied move all the files from the boot isolinux direc tory to the root directory on the USB key and remove the boot directory mv mnt sda1 boot isolinux mnt sda1 xm rf mnt sda1 boot Chapter 9 Knoppix Remastered 367 H
47. Knoppix desktop a set of widgets and window decorations to mimic those found in Windows First click Style in the index change the widget style to MS Windows 9x and click Apply Things should look pretty familiar by this point except for the window bor ders Click on Window Decorations and pick Redmond from the drop down menu to take care of that The last small step is to right click on the K Gear on the panel and click Configure Panel then select Small from the drop down menu labeled Size then apply Voila It s not perfect but then again neither is Windows 38 Chapter 2 Use Your Knoppix Desktop Get Office Work Done Get Office Work Done You can t get much work done in an office these days without an office suite Use OpenOffice org and Kontact to turn any computer into your office workstation The inclusion of a complete suite of office tools in Knoppix including all of OpenOffice org means that not only can you try out Linux with a full featured desktop but you can also get your work done while you re at it This hack discusses how to use Knoppix to create and edit documents spreadsheets and presentations as well as manage your contacts and appointments Microsoft Office has in many ways defined how people get work done in an office environment To many people there is no word processor other than Word no spreadsheet program other than Excel and no email client other than Outlook For any new office
48. Many of the programs allow multiplayer games over the Internet You can even pass out Knoppix CDs to friends or coworkers and have a quick game over lunch Mer Rock Out with Knoppix Multimedia IBE Knoppix comes with a full suite of tools to perform common multimedia tasks such as listening to CDs or MP3s editing audio and burning CDs More people seem to be using their computers for multimedia applications whether for listening to CDs MP3s or streaming radio and video Combine 50 Chapter 2 Use Your Knoppix Desktop Rock Out with Knoppix Multimedia BP Frozen Bubble 2 Figure 2 10 Frozen Bubble Knoppix s excellent sound card support with its complete set of audio and video applications and you get a platform for your multimedia needs that you can take anywhere All of Knoppix s multimedia applications can be found under K Menu gt Multimedia This hack gives an overview of all the different programs you can use for your audio and video needs Before using any of the multimedia tools make sure that Knoppix has iden tified your sound card The first clue that Knoppix has detected your sound card is the Initiating startup sequence sound played by Knoppix as it loads your desktop Another clue is the presence of a blue speaker icon near the bottom righthand corner of the screen near the clock This icon belongs to KMixer and lets you adjus
49. Mouse agellan Meridian Gold works only with NMEA V2 1 GSA setting AVILock GPS Receiver Haicom GPS HI204e agellan Nav 6500 BendixKing KLX 100 jotorola i58sr Cellular Phone w built in NMEA compatible GPS Set Up GPS Plug in your USB to serial adapter when Knoppix boots the adapter will be automatically detected and its drivers loaded Plug the eTrex serial adapter into the USB adapter then plug in your eTrex and turn it on For Kismet to use the GPS data it must have a way to collect it Kismet uses the gpsd program to read the data from this hardware The Knoppix disks no longer ship gpsd by default so you will need to install it live sudo apt get update sudo apt get install gpsd To start gpsd run knoppix Knoppix sudo gpsd dev ttyUSBo Replace dev ttyUSBO with the address for your USB to serial adapter check with the dmesg command The gpsd command I use is a bit more complicated because I like to keep a text log of all the output that gpsd generates I keep a separate terminal tab open with the output of gpsd copied to the screen and to a log file The screen output is helpful if gpsd crashes and the log file preserves my data collection if the laptop loses power Here s my command knoppix Knoppix sudo gpsd D 4 dev ttyUSBO 2 gt amp 1 tee gpsd log 160 Chapter 5 Put Knoppix in Your Toolbox Wardrive with Knoppix You can verify that gpsd is working with the following command knoppi
50. NFS SMBFS SSHFS UDF UFS HFS HFS HPFS software RAID with RAID6 and LVM Basic tools wget ssh tar etc If you re still not convinced that using a Linux desktop like INSERT is the way to go just read what John Andrews author of Damn Small Linux DSL writes Why Because having a working Linux desktop distro on a 50 MB bootable business card CD is just too cool not to do There are currently English and German versions of INSERT These differ only in the language of the help texts HTML startup pages and the default keyboard layout otherwise they are identical History In the summer of 2003 I discovered the existence of DSL which if you recall is a Linux desktop distribution on a 50 MB CD and the idea of INSERT was born Whereas DSL is targeted at the experienced Linux desk top user INSERT is a Linux distribution that can be used for all kinds of rescue tasks is small enough to easily carry and is downloadable even by people who have access only to low bandwidth connections Additionally INSERT is used as an eye catching marketing tool for the com pany that employs me which partially funded the development of INSERT The information material of Inside Security IT Consulting GmbH gracefully resides on the disk for this very reason Technical Technically INSERT is based heavily on Knoppix with just a few special modifications One noticeable difference is that unlike most other Knoppix derivatives I
51. Nvidia 3D Drivers 100 35 Point and Klik to Install Applications 104 36 Create Your Own Klik Recipe 106 37 Install Programs to the Live Disk 107 38 Browse the Web Anonymously 109 39 Install Multimedia Codecs 111 Chapter 4 Install Linux with Knoppix 00 112 40 Explore the Knoppix Installer 113 41 Install Knoppix as a Single Boot System 118 42 Install Knoppix on a Multiboot System 120 43 Convert Knoppix to Debian Unstable 122 44 Install Gentoo with Knoppix 124 45 Update a Knoppix Install from the CD 126 vi Contents Chapter 5 Put Knoppix in Your Toolbox 0 128 46 Run Remote Desktops 129 47 Run X Remotely with FreeNX 133 48 Browse Windows Shares 138 49 Create an Emergency Router 139 50 Create an Emergency File Server 146 51 Create an Emergency Web Server 148 52 Make an Emergency Mail Relay 150 53 Run Other Emergency Services 154 54 Wardrive with Knoppix 158 55 Audit Network Security 166 56 Check for Root Kits 174 57 Collect Forensics Data 176 58 Clone Hard Drives 180 59 Wipe a Hard Drive 184 60 Test Hardware Compatibility 186 61 Copy Settings to Other Distributions 192 62 Add Knoppix to Your PXE Boot Environment 194 63 Set Up a Webcam Server in a Snap 197 64 Create a Weekend Wiki 198 Chapter 6 Repair Linux 00 0000 c cece cee 201 65 Repair Lilo 202 66 Repair Grub 203 67 Kill and Resurrect the Master Boot Record 205 68 Find L
52. Overwrite This option is off by default If enabled Knoppix will synchronize its etc directory over the one on your persistent image This can be useful if you have the system option enabled but are using your persistent image on a different set of hardware Any old hardware settings you have on the system will be replaced with new settings that Knoppix has just detected Init This option will start the persistent init scripts to initialize system set tings such as network and printer configuration image for a specific machine and then boot with this option all of those changes could potentially be overwritten F4 Be careful with the Overwrite option If you have set up your Knoppix will automatically detect any persistent images but you can also specify a particular image to use with the home cheat code This cheat code works just like the myconfig cheat code covered earlier in this hack You can either pass it a specific device that contains knoppix img or boot with home scan for Knoppix to scan all available drives for knoppix img For example to use a persistent home directory created in mnt sda1 knoppix img boot with home mnt sda1 knoppix img This option is handy if you have more than one persistent image on a drive and want the ability to choose a particular one Knoppix s persistent cheat codes are especially useful if you use Knoppix frequently as it bypasses many of the disadvantages of booting from a read only
53. PKI 294 killing MBRs 206 kiosks creating 86 90 Kismet 158 312 configuring 161 klik installing applications with 104 106 KMahjongg 50 KMail 42 Knopper Klaus xix 2 276 341 Knoppix 5 1 1 CD 6 9 Knoppix creation of xix KNOPPIX submenu 31 knoppix installer script 114 knoppix mkimage script 77 knoppix remaster script 351 knoppix sh script 361 KnoppMyth 326 329 KNotes 43 Knowledge Base ID 272 knowledge base KB nessus tool 171 known good systems scanning for root kits 174 176 Konqueror 63 Konqueror web browser window 28 Kontact OpenOffice org 42 43 Kooka 47 KOrganizer 42 KPilot 43 krdc KDE Remote Desktop Connection 130 KReversi 50 KSokoban 50 Kurumin 282 kwiki program 199 L labrea 299 LAN information server see LISa languages cheat codes 11 13 Freeduc 280 modifying 358 Quantian 323 laptops booting from 21 L A S Linux Local Area Security Linux 287 289 Launch Feedback 35 LCD display settings optimizing 21 Icp echo interval variable 62 Index 379 libraries encryption 294 lilo restoring MBRs to 202 linking klik installing applications with 105 My Documents directory 85 Links Hacked 282 LinNeighborhood 301 Linux booting troubleshooting 20 console cheat codes 18 Damn Small Linux 281 284 desktop see desktop hardware support xix testing compatibility 186 192 help 65 installing from CDs 126 converting to Debian
54. POINTOPOINT RUNNING NOARP MULTICAST MTU 1500 Metric 1 RX packets 65 errors 0 dropped 0 overruns 0 frame 0 TX packets 101 errors 0 dropped 0 overruns 0 carrier 0 collisions 0 txqueuelen 3 RX bytes 5282 5 1 Ki B TX bytes 8230 8 0 KiB And here is the full output of pppd that you can see in the log window Jun 10 06 46 35 Knoppix pppd 2153 pppd 2 4 2 started by root uid 0 Jun 10 06 47 53 Knoppix chat 2244 timeout set to 120 seconds Jun 10 06 47 53 Knoppix chat 2244 abort on BUSY Jun 10 06 47 53 Knoppix chat 2244 abort on ERROR Jun 10 06 47 53 Knoppix chat 2244 abort on NO CARRIER Jun 10 06 47 53 Knoppix chat 2244 send ATE1 M Jun 10 06 47 54 Knoppix chat 2244 expect 0K Jun 10 06 47 54 Knoppix chat 2244 ATE1 M M Jun 10 06 47 54 Knoppix chat 2244 OK Jun 10 06 47 54 Knoppix chat 2244 got it Jun 10 06 47 54 Knoppix chat 2244 send AT CGDCONT 1 IP internet3 voicestream com M Jun 10 06 47 55 Knoppix chat 2244 expect OK Jun 10 06 47 55 Knoppix chat 2244 M Jun 10 06 47 55 Knoppix chat 2244 AT CGDCONT 1 IP internet3 voicestream com M M Jun 10 06 47 55 Knoppix chat 2244 OK Jun 10 06 47 55 Knoppix chat 2244 got it Jun 10 06 47 55 Knoppix chat 2244 send ATD 99 1 M Jun 10 06 47 55 Knoppix chat 2244 expect CONNECT Jun 10 06 47 55 Knoppix chat 2244 M Jun 10 06 47 55 Knoppix chat 2244 ATD 99 1 4M M Jun 10 06 47 55 Knoppix chat 22
55. T D 101 and Martin Roesch roesch sourcefire com www snort org No running window found This launches snort apache mysqld and barnyard and launches Mozilla Firebird to connect to the ACID interface Initially you won t see any snort sensors Sensors 0 To fix the bug we need to reinitiate barnyard properly knoppix ttypo knoppix sudo usr bin ids acid stop knoppix ttypo knoppix sudo usr bin ids acid start If everything has gone correctly you will see Sensors 1 in your web browser If you have Internet access the snort rules files can be updated to the most recent versions running oinkmaster at the command line When you first run an IDS expect to see a large number of false positives These are alarms that are triggered by legiti gt mate traffic It is important that you spend time understand ing and refining your IDS rules to remove as many false positives as possible The effectiveness of running an IDS is greatly reduced if real alarms are hidden away in a sea of false positives Further Reading http en wikipedia org wiki Snort_ 28software 29 Network Utilities A security tool is not complete unless it includes the network tools you expect to see use on a daily basis S T D includes the usual suspects as well as a number of less common tools such as the following smbclient An ftp like client to access SMB CIFS resources on servers ncplogin Used to create connections to a N
56. Tools Seinge Window Help QQQ O H eARRAS E gt Location Mlansfocanosvisz16807 ss s SC wYS sy tone Folder a B B SDesktop FIP Al Emp FISH NFS SMB HTTP amp Home Folder amp ft 5 Items One File 1 024 B Total 4 Folders Figure 5 2 View filesharing services router or firewall with all of the normal utilities such as route and iptables that you use on any other Linux distribution These tools make Knoppix particularly handy if you need an emergency Network Address Translation NAT router or a bridge When the router goes down you can take your Knoppix demonstration disk boot it on a spare machine with two NICs and demonstrate how to save the day With just a few commands you can route across any of the network connections Knoppix supports from DSL to dial up to wireless This hack walks you through turning a machine into a router Configure the Network The machine you are using as the emergency router must have two different network connections that already work independently of each other This can be satisfied with two network cards a network card and a modem a network card and a wireless card or any other two network connections that Knoppix supports Configuring network connections under Knoppix is covered in Connect to the Internet Hack 19 After both networks are working you can link the two either
57. When you ask for help be sure to specify which version of If you would like more interactive support you can also chat with other Knoppix users at the official IRC channel knoppix on irc freenode net For more information on how to connect to knoppix with XChat refer to Hack 21 Knoppix includes Gnome Fluxbox XFCE and many other desktop choices on the CD and DVD Here you will find information on the major desktop alternatives Knoppix offers and why you may want to try them over the default 23 Try Other Desktop Environments Most of this chapter and indeed most of the book discusses Knoppix in terms of its default KDE desktop However Knoppix includes a number of other desktop environments on both the CD and DVD that provide differ ent approaches to desktop management In this hack I will cover some of the more prominent desktop environments that Knoppix has available and how to use them As discussed in Hack 4 the desktop cheat code allows you to choose which desktop for Knoppix to use For instance to boot into Fluxbox type the fol lowing at the boot prompt knoppix desktop fluxbox If you have already booted Knoppix you can change the desktop without rebooting Just click K menu gt KNOPPIX gt Choose Restart Knoppix Desktop and choose the desktop to use from the window that appears While all of the desktop environments I will mention are available on the DVD only a few were able to fit on the CD so
58. a complete copy or multiple copies of a drive so that you can examine the drive without risking any data loss To copy a disk image to a file simply pass a filename instead of a device name to the of argument Most likely disks you want to image in this way are larger than your available Knoppix ramdisk so you need to mount another disk to which to save the image To create a complete image of the dev hdal partition and save it in the root directory of a filesystem mounted at mnt hdb1 use the following command sudo dd if dev hda1 of mnt hdb1 hda1_drive_image img Many people make a point of adding an img extension to their image files as a reminder that the file is a complete disk image but you can name the file whatever you wish Even though dd doesn t list progress when you save to a file you can monitor the size of the file to see how much time you have left The watch utility is particularly useful for this task because it performs a command every two seconds and shows you the output To monitor the progress of this image type the command watch ls 1 mnt hdb1 hda1_drive_image img Once the operation completes the complete contents of dev hdal are stored in hdal_drive_image img Chapter 5 Put Knoppix in Your Toolbox 181 HACK 58 HACK 58 Clone Hard Drives You can also use ssh to save the disk image over the network to a different machine If you don t specify an output file dd outputs the disk ima
59. all of these files and settings so you won t have to download and install again Once the driver has been installed you can safely remove the run file you downloaded and if you are using the Knoppix CD you can also remove the kernel source tree you put under usr src Chapter 3 Tweak Your Desktop 103 HACK 34 HACK 35 Point and Klik to Install Applications Furdpas gr te Messe und Konferenz ru Linux und Freler Software LINUX 23 26 Juni 2004 Kongrescrentrutt tare Jetzt kostenlos vorregistrieren unter wivwiliiuntag Org TAG oder kostenlose Eintrittskarte auf dem Knoppix Desktop ausdrucken Groat was railed by Stripe ys530S5384 som en Figure 3 6 Quake3 demo Install extra software on your Knoppix live CD just by clicking a link on a web site 35 Point and Klik to Install Applications Knoppix offers a broad variety of software but due to space limitations on the Knoppix CD and licensing issues some software cannot be included with Knoppix There is an easy way to get additional software from the Web while using Knoppix from a CD or DVD With the klik software store a web interface for klik recipes a plug in for Firefox and Konqueror allows you to execute the klik installer just by clicking on a URL that starts with klik Before you install software with klik you must install the klik client itself Go to http klik sf net and follow the instructions I don t
60. although this is only for the terminally geeky Manipulating packets on the wire is not for the faint hearted and any level of manipulation will require a strong understanding of the IP protocol One set of reference material you will find yourself leaning on heavily is Internet RFCs short for Request For Comments In simple terms these are techni cal notes written by clever people on a wide variety of topics having to do with networking computers Think of them as a framework for vendors to work around allowing unique implementations but retaining interoperabil ity in theory at least in practice this is not always the case One such document is RFC 792 Internet Control Message Protocol In this document there is a section discussing timestamps The data received a timestamp in the message is returned in the reply together with an additional timestamp The timestamp is 32 bits of milliseconds since midnight UT It then goes on to describe in some detail how to craft a timestamp packet using ICMP Type 13 with Code 0 for timestamp message So what does this mean to us Well if we can craft an ICMP packet with the correct options and the remote host supports this protocol we should be able to retrieve the remote host s time Chapter 8 Knoppix Reloaded 307 HACK 101 HACK 101 Full Protection with S T D First let s check our local clock time as a reference knoppix ttypo knoppix date Wed Apr 25 16
61. and consultant for e Secure Limited a network security company based in Scotland Mark splits his time between security testing and consulting for various levels of corporate and educational clients as well as partici pating in a number of open source projects He is the new owner of the S T D Security Tools Distribution project and is currently managing the development of the next version Dirk Eddelbuettel Ph D Distribute Compiles with distecKNOPPIX Hack 102 is the creator of Quantian and has been a long time partici pant in free software open source development He lives and works in Chicago Hilaire Fernandes Educate Yourself with Freeduc Hack 97 is a mem ber of OFSET Organization for Free Software in Education and Teach ing and a developer for Freeduc Fabian Franz Run X Remotely with FreeNX Hack 47 studies com puter science at the University of Karlsruhe and has been an active member of the Knoppix project since 2003 Fabian is the author of the Knoppix live software installation program and does research in several fields of live CD technology In 2004 Fabian created the FreeNX server as a full free terminal server application which uses the open source core components of the NX X compression technology Alex Garbutt Install Gentoo with Knoppix Hack 44 is a 22 year old computer science and engineering major at the University of California Davis e James Greenhalgh Distri
62. and use it as a reference However there is an easier way to con figure grub use the update grub tool This tool scans the boot partition for usable kernels and automatically creates a menu lst file based on what it finds This tool must be run from a chroot environment on the root parti tion so assuming the root partition is mounted at mnt hdal you would run knoppix tty1 knoppix tty1 knoppix tty1 knoppix tty1 knoppix cd mnt hda1 hda1 sudo mkdir boot grub hda1 sudo cp sbin update grub hda1 sudo chroot mnt hda1 update grub The final command prompts you to create a menu lst file You want to do this so answer yes It then scans your hard drive and adds new entries for all of the kernels it finds The first time update grub is run it might not detect the correct root device to use Grub uses special notation to define partitions such as hdo 0 which describes the first partition on the first hard drive in the system or translated to Linux dev hda1 If your root parti tion is not at dev hdal but perhaps at dev hda5 you must edit the boot grub menu Ist file that was created and find the following commented line groot hdo 0 Do not uncomment this line This is a hint for the update grub tool only not for grub itself Replace hdo 0 with the correct root device for your Linux system For example if your root Linux partition is dev hda5 change the line to groot hdo 4 Notice that grub c
63. and visit http www microsoft com technet Then click on the Security link or the Downloads link on the left side of the page The security page provides links to the latest security bulletins and virus alerts and the downloads page lists new secu rity patches and bug fixes for Microsoft software If you have the Knowl edge Base ID KB followed by six numbers or the Security Bulletin ID MS followed by two numbers a dash and three more numbers then you can 272 Chapter 7 Rescue Windows HACK Knoppix on Intel Macs 95 search by that ID under TechNet and quickly get a link to the download you need You can register with Microsoft s Security Notification i Service at http www microsoft com technet security bulletin notify mspx to get security bulletins emailed to you as they are announced This makes searching by the Security Bulletin ID much simpler When you find the appropriate download mount your Windows partition with read write permissions by clicking on the drive icon to mount it and then right clicking on the drive icon and selecting Change read write mode Then you can save the download directly to your Windows partition Once the download is complete temporarily disconnect your network cable from the computer or otherwise disable your Internet connection and boot to Windows to apply the patch following any instructions that Microsoft provides Knoppix on Intel Macs i Knoppix works not only on Window
64. application installation process that we are currently call ing MyDSL Click and Load DSL has also picked up many of the Knoppix features that you ve already been introduced to in this book DSL can be easily installed on a hard drive so that it runs as an image which is similar to the boot from cheat code Hack 6 282 Chapter 8 Knoppix Reloaded Damn Small Linux There is a restoration process that can grab files from any drive and restore them at boot which is similar to the persistent settings in Hack 26 It is even possible to do a network install if the user has an old system that doesn t have a CD drive All these developments have progressed over time as we have tried to make DSL as usable for as many people as possible The Present I believe DSL is a nearly complete desktop It includes A desktop environment Containing the FluxBox window manager and emelFM and Midnight Commander file managers Office applications Containing a spreadsheet a spellchecker U S English a word proces sor Ted GTK a calculator SQLite which is used to manage an address book and four text editors Beaver Vim Zile and Nano Graphics editing and viewing Containing Xpaint Xzgv and Xpdf Multimedia applications Containing XMMS MP3 OGG and MPEG player and CD burning capabilities Internet applications Containing Dillo and links hacked web browsers Sylpheed email and Naim AIM ICQ and IRC Networking client
65. as a base these developers benefit from the hardware support and the configuration that Knoppix uses and can spend their energy on making specialized tweaks for their needs instead Some of these Knoppix based CDs such as Morphix are used as a base themselves to cre ate other distributions Knoppix based distributions run the full spectrum in terms of what they can do and what can be changed Some distributions have kept most of Knop pix intact and have added only extra special purpose software here and there Others have almost redone Knoppix from the ground up Distribu tion sizes vary dramatically as well ranging from 50 MB for business card CD variants to a gigabyte or more for some of the DVD based variants Think about it each of these live CDs is a hack of Knoppix itself This chapter highlights just a few of the better known or interesting Knop pix variants If you plan to create your own Knoppix based CD it is worth it to check out some of the work that has already been done You might find that your needs are already met in one of these distributions In true community spirit many of the following descriptions are from the developers themselves Grab a stack of blank CDs and a magic marker because after you read about some of these great distributions you will want to try them yourself 276 Master Morphix zaa Master Morphix 1075 Morphix is a Knoppix based distribution that takes a modular approach to CD cre
66. assembling the array dev mdO from dev sdal and dev sdb1 Change these values to reflect the partitions used in your LVM Chapter 6 Repair Linux 237 HACK 80 Mount LVM Partitions Now that your partition is identified you need to pull out a copy of the LVM configuration from the beginning of the partition The following com mands will create a directory to store your configuration grab a copy of your it strip out any possible binary information and dump it in the appro priate configuration file sudo mkdir p etc lvm backup sudo sh c dd if dev hda2 bs 512 count 2 skip 9 strings gt etc 1vm backup VolGroupoo 2 0 records in 2 0 records out 1024 bytes 1 0 kB copied 0 000807058 seconds 1 3 MB s If you look at etc lvm backup VolGroup00 you can see that it has a copy of my LVM configuration sudo cat etc lvm backup VolGroupoo VolGroupoo id a6Allq rMLf zj3N mle8 VDtF WSbH 2JO0m9y seqno 1 status RESIZEABLE READ WRITE extent_size 65536 max_lv 0 max_pv 0 physical volumes pvo id UawLrW BJ30 GQpA u6xK 59fv CCX5 VFXHSB device dev hda2 status ALLOCATABLE pe_start 384 pe_count 252 Generated by LVM2 Tue May 15 20 38 35 2007 contents Text Format Volume Group version 1 description creation host localhost localdomain Linux localhost localdomain 2 6 18 1 2798 fc6 1 SMP Mon Oct 16 14 54 20 EDT 2006 i686 creation_time
67. base morphix mainmod mainmod MorphixMain Light mod minimod deb copy exec While it seems quite empty this is how typical versions of Morphix are released They are quite bare but offer users or morphers as we call our selves more possibilities to change the resulting live CD Morphix has four classic ready to burn combined ISOs available for down load and a list of extra modules available for whoever needs them All com bined ISOs contain the Morphix installer a graphical tool for installing Chapter 8 Knoppix Reloaded 277 HACK 96 HACK 96 Master Morphix Morphix to your hard disk and a number of other graphical and command line Morphix tools for various purposes Each of these live CDs has a tar geted audience morphers have always believed that we should offer lim ited choices to users and unlimited as much as possible choices to developers Morphix LightGUI Aimed at lower end PCs LightGUI features the XFCE4 desktop and contains a reasonable amount of lighter tools It was the initial version of Morphix and the aim has been to keep LightGUI small enough to fit on 210 MB mini CDR W LightGUI includes Abiword Gnumeric Dillo and Firefox For communication Gaim and Xchat are included and for photo processing the GIMP has been added Morphix Gnome Formerly named Morphix HeavyGUI this flavor was for some time the only counterpart of LightGUI Morphix Gnome includes Gnome OpenOffice org
68. broadband Internet connection and a CD R RW or DVD R RW drive simply download the CD or DVD image it s the best way to get Knoppix A collection of mirrors listed at http www knopper net knoppix mirrors index en html provides images in ISO format over http ftp or rsync Tve found the kernel org mirror to be consistently fast If you use Bittor rent a peer to peer file sharing application designed for sharing large files you can use the Knoppix torrent link on this page When you click on a mir ror you are taken to a licensing agreement page Have your lawyer read through the software license your lawyer reviews all of your software licenses before you accept right click Accept to proceed and then choose a file from the list that is presented In addition to the latest version of Knop pix most mirrors host a few past images with their MD5sum which you can use to verify that the file downloaded correctly When trying to decide which CD to choose it helps to understand the scheme Knoppix uses for naming CD images Here is an example ISO file name KNOPPIX_V5 1 1CD 2007 01 04 EN iso Deciphering the filename isn t tricky and can be quite informative In the aforementioned example KNOPPIX is followed by the current version in this case 5 1 1 After that is CD or DVD denoting whether this is the CD or DVD release Following the version and type is a date stamp which indi cates the CD image s release date in this exam
69. bus including an Ethernet card a sound card and a video card If you want more information pass the v or vv option to lspci to tell Ispci to give progressively more information about the device To see more informa tion about the GeForce2 video card just run lspci vv and browse through the rather verbose output sudo lspci vv 0000 01 05 0 VGA compatible controller nVidia Corporation NV11 GeForce2 MX MX 400 rev a1 prog if 00 VGA Subsystem LeadTek Research Inc Unknown device 2830 Control I O Mem BusMaster SpecCycle MemWINV VGASnoop ParErr Stepping SERR FastB2B Status Cap 66MHz UDF FastB2B ParErr DEVSEL medium gt TAbort SERR disabled size 64K Capabilities 60 Power Management version 2 Flags PMEClk DSI D1 D2 AuxCurrent 0mA PME DO D1 D2 D3hot D3cold Status DO PME Enable DSel 0 DScale 0 PME Capabilities 44 AGP version 2 0 Status RQ 32 Iso ArqSz 0 Cal 0 SBA ITACoh GART64 HTrans 64bit 188 Chapter 5 Put Knoppix in Your Toolbox Test Hardware Compatibility FW AGP3 Rate x1 x2 x4 Command RQ 1 ArqSz 0 Cal 0 SBA AGP GART64 64bit FW Rate Notice that this time I ran lspci with sudo This is because lspci won t tell a regular user all of the information about a PCI device in the verbose output most notably the capabilities lines so to get verbose output run lspci using sudo If you are new to Linux reading through all this output to try to fi
70. can purchase but with a Knop pix disk you can easily create partition images partition to partition cop ies and even disk to disk copies This hack covers two programs dd which is commonly used to create and copy drive images and partimage which combines the power of dd with an easy to use interface and the capability to save images over the network Dd Ask any Unix system administrator about disk imaging and most likely the first tool that she suggests is dd Dd is a very powerful program that cre ates exact bit for bit copies of drives or partitions You might have used this command previously if you had to create a boot floppy or an ISO from a CD ROM While there are quite a few different arguments you can pass dd to change its behavior the two basic options are if and of which specify the input file and the output file for dd to use respectively As with Unix in Linux every thing is a file so the input file or the output file is an actual file on the sys tem for example drive img a partition such as dev hda1 or a complete drive such as dev hda When you use Knoppix for disk imaging you run completely outside any disks on the system so you don t have to worry about files changing or being modified by your login A direct disk to disk copy is a common use of dd In this scenario you have partitioned and configured one disk hda that you want to mirror parti tion tables and all to a second blank disk
71. change Knoppix s behavior at boot time without resorting to a full remastering process The first step in this process is to copy the minirt gz file to your local direc tory and then decompress and mount it loopback In this example I will make changes from within the Knoppix boot environment but you could just as easily mount the Knoppix disk on your regular Linux system Note that mounting the file loopback will require root permissions root ttyp1 hda1 cp cdrom boot isolinux minirt gz root ttyp1 hda1 gunzip minirt gz root ttyp1 hda1 mkdir temp root ttyp1 hda1 mount t ext2 o loop minirt temp Once it is mounted you will see a small version of the root filesystem within the temporary directory Probably one of the most important files from a tweaking standpoint is the linuxrc file which is the init script for Knoppix That script contains many of the commands Knoppix runs at boot time This script also parses a fair number of the Knoppix cheat codes For instance this snippet from the linuxrc file sets default values for the Knop pix directory and loopback filesystem and then sets them according to the knoppix_dir and knoppix_name cheat codes if they were used KNOPPIX_DIR KNOPPIX KNOPPIX_NAME KNOPPIX case CMDLINE in knoppix_dir KNOPPIX_DIR knoppix dir esac case CMDLINE in knoppix_name KNOPPIX NAME knoppix name esac If there are particular modules you want to load or programs you wan
72. change from the boot prompt using cheat codes Chapter 1 Boot Knoppix 9 HACK 4 HACK 4 Use Knoppix Cheat Codes Table 1 1 Some of the Knoppix cheat codes Cheat Code Purpose noppix testcd Check CD DVD data integrity and MD5sums noppix desktop bery1 fluxbox gnome Use specified window manager icewm kde 1g3d 1larswm twm openbox wmaker xfce xfce4 noppix 2 Runlevel 2 Textmode only noppix noeject Do NOT eject CD after halt noppix noprompt Do NOT prompt to remove the CD noppix splash Boot with fancy background splashscreen For example if you want to use the fluxbox window manager instead of the default KDE desktop type the following at the boot prompt knoppix desktop fluxbox Look at the list of cheat codes to see a number of other window managers including kde icewm twm and fluxbox if you are using the CD plus gnome larswm openbox ratpoison wmaker xfce and xfce4 if you are using the DVD Each of these window managers offers different features and most of them offer a completely different environment from what a Windows user might be used to In addition many of these other desktop environments load faster and use less memory than the default KDE desk top A new feature for Knoppix is the addition of beryl the hardware acceler ated window manager Use of this window manager requires that Knoppix support hardware acceleration for your video card Compatibility with beryl can be a matter of
73. click OK Read over the list of configuration options Knoppix presents you and make sure everything is configured to your lik ing Click Next to start the installation to the system but you can still play games or run other pro grams during this process to pass the time KR Knoppix formats your hard drive and then copies all the files Once Knoppix is finished copying files you are prompted to create a boot floppy Boot floppies are important in case you accidentally delete your Linux kernel or otherwise damage parts of the boot process Insert a floppy into your drive and click Yes to create a boot floppy or click No to skip cre ating it Once the installer exits log out and reboot the system Be sure to remove the disk when it ejects and at reboot you should be presented with the boot screen for your brand new Knoppix install A lot of people who use Linux also dual boot their computer to Windows The two most worrisome parts of such a setup are partitioning the drive and configuring the boot loader Here s how to install Knoppix in a multiboot setup i 42 Install Knoppix on a Multiboot System Installing Knoppix in a dual boot configuration is a bit trickier than a clean install as it requires you to resize partitions to make room for Knoppix and possibly requires you to configure your boot loader This hack walks you 120 Chapter 4 Install Linux with Knoppix Install Knoppix on a Multiboot System through a typical
74. clients Refer to Hack 4 for more information about implementing cheat codes at boot time By default the wheelmouse cheat code is enabled but that cheat code is dep recated so just remove it If you have a mixture of clients some that need Chapter 3 Tweak Your Desktop 95 HACK 31 HACK 32 Create a Knoppix Thin Client Client hardware KNOPPIX TERMINALSERVER SETUP Choose network card s to support probe on client machines PF 3c359 ko 3Com 30359 Velocity XL Token Ring Adapter Driver _j3c501 ko Support for the ancient 3Com 3c501 ethernet card _j3c503 ko 3Com ISA EtherLink II II 16 3c503 3c503 16 driver _j3c505 ko Kernel Module _j3c507 ko Kernel Module l o Figure 3 3 Configure NIC modules to support special cheat codes and some that don t you can also enter cheat codes at the boot prompt of a client to use that cheat code on that client only Now that things are set up the wizard lets you choose to start the terminal server Once started the wizard disappears If you want to stop the terminal server later rerun the wizard and choose stop instead of setup at the opening window For extra diagnostic information click K Menu gt KNOPPIX gt Services gt Start SYSLOG Now you can boot each of your clients and see the default Knoppix boot screen Simply hit Enter and boot the machines as you would normally If a machine does not boot reference the syslo
75. codes are useful when the next time you boot you plan to use the Knoppix CD in the same system By default when Knoppix shuts down it ejects the CD and prompts you to hit Enter to com plete the shutdown Use these cheat codes to disable these two convenience features and when Knoppix shuts down it leaves the CD in the drive for the next boot Experiment Try out new desktops Test different cheat code combinations Remember that changes you make with cheat codes do not persist across reboots and desired changes must be entered at the boot prompt each time To make settings persistent save them on media such as a USB drive a floppy diskette or an existing hard drive Saving persistent settings is cov ered in detail in Create Persistent Knoppix Settings Hack 26 Speak Different Languages One of the advantages of Linux is its native language support Knoppix is provided in English and German versions but other languages are supported Knoppix s popularity has spanned the globe and as a result it comes bun dled with support for many different languages Although versions exist that default to German or English Knoppix can easily boot into many different languages through the use of cheat codes This hack covers the language cheat codes shown in Table 1 2 Table 1 2 Language cheat codes Cheat Code Purpose knoppix lang cn de da es fr Specify language keyboard it nl pl ru sk tr tw us knoppix keyboard us Use a dif
76. contact information you want to include with your code When the wizard completes the main KDevelop screen contains the skele ton code for your application see Figure 3 5 From this point you can add functions and classes and otherwise work on your project When you are ready to test click Build gt Execute Program The first time you compile and execute a program KDevelop automatically runs automake to create the 98 Chapter 3 Tweak Your Desktop Develop Applications X KDevelop File Edit View Project Build Debug Scripts Window Tools Settings Help BQQRo 5 O 2 3 uw 2 i fo a 2 i A sjaddiug apoo amp uonejuawnoog Application Diff G Messages Find in Files 4 Replace i Konsole Figure 3 4 The default KDevelop window configure script and Makefiles for your project Even if you don t change any code the default template should compile and run without any problems In the case of a console application the code execution takes place in a panel that opens along the bottom of the main window Graphical applications open a new window Even the default KDE template provides file open and file save dialogs and a number of features KDevelop also comes with a nice debugging environment that lets you set breakpoints in your code and then step through execution so you can test out specific parts of your program All of the project development can occur with your default
77. default The size of files stored here are limited by RAM so for storing large files you want to configure a share on the system s hard drives Remember that each time you run the Knoppix Samba con figuration script it creates a new smb conf and any manual changes are lost See Hack 26 to save your configuration changes Create an Emergency Web Server When the web server goes down use Knoppix to pick up the slack On first glance Knoppix may not seem like a distribution to use for web serving because of its colorful GUI the desktop applications and the games But included in this huge bundle of software is the complete Apache web server and a large set of modules that give you many of the common tools you need to turn Knoppix into a replacement web server 148 Chapter 5 Put Knoppix in Your Toolbox Create an Emergency Web Server Before you set up Knoppix as a web server make sure Knoppix has all the tools you need for your web site Look in usr lib apache2 modules to see if the modules you need are there Knoppix includes quite a few modules including support for CGI server side includes PHP4 mod_rewrite and SSL and also comes with MySQL so you can run a database driven site If you need to use any Apache modules check etc apache modules conf and make sure they are listed in there Not all modules Knoppix includes are automatically listed in that file so for instance to add server side include support add
78. demonstration tool for a new user and a great desktop environment for an average Linux user in the hands of an experienced system administrator it is the ultimate software toolbox for any number of auditing troubleshooting or emergency uses In this chapter the hacks are roughly organized into two sections The first section deals with tools that can help you administer a network Knoppix not only comes with a lot of excellent tools to audit your servers over the network but it can actually replace some of them in a pinch The second section deals with tools that can help you administer local hardware Here you will find tools that help you clone wipe and scan hard drives and probe hardware The fact that all of these tools run directly from the CD 128 HACK Run Remote Desktops 46 means that you can take Knoppix to any computer on your network and turn it into a troubleshooting tool Knoppix might be worth considering as an option in a recovery plan You could even create custom disks see Create a Customized Knoppix Hack 109 that already contain any files and settings unique to your network and any extra services or modules that Knoppix does not contain Then emer gency failover from a crashed server would be as simple and as fast as boot ing a CD z3 Run Remote Desktops 7 Use a computer running Knoppix as a base for remotely controlling other computers on the network via rdesktop or xvncviewer System
79. desktop with 24 bit color depth If this happens you will need to edit etc X11 xorg conf file and find the line that says DefaultDepth and make sure the number following it is 24 Then hit Ctrl Alt Backspace to restart the desktop with the new color depth The game will automatically load into full screen see Figure 3 2 Use the arrow keys on the keyboard to select different options and hit Enter to select an option Hit Esc to exit any menu a song or if on the main screen the full game If this is your first time with the game select the Tutorial to get an idea of how to play Frets on Fire comes with three songs by default but you will likely want more than that for a party A sister site http vww keyboardsonfire net pro vides a large number of user contributed songs for a variety of tastes To add a song to Frets on Fire from within Knoppix first install the unrar package many of these songs come in the rar format others come in zip format sudo apt get update sudo apt get install unrar Then change to FretsOnFire data songs and extract the rar file cd FretsOnFire data songs unrar x Song rar 92 Chapter 3 Tweak Your Desktop Make a Party Arcade KIN YN k ligh t Ji Tutorial Song Editor gt Settings gt Credits Quit Figure 3 2 Default Frets on Fire screen Replace Song rar with the path to the song you downloaded If the file is in zip format instead
80. direc tory d d The next field is a number that corresponds to that file or direc tory s inode on the filesystem The final field is the full path to the file or directory As you can see the second to last line in the above list corre sponds to my deleted bookmark file icat Now that there is a list of deleted files and I know the specific inode for the file I want to recover I can use icat to restore the file icat works by output ting the contents of an inode that you specify It has particular options for restoring deleted files as well as we will see below Since I know the inode to restore I can type sudo icat f ext r s dev sda2 814650 gt Desktop recover bookmarks html Like with fls icat also takes a f option to specify the type of filesystem it will scan The r option enables a special recovery mode for deleted files and the s option tells icat to output the full contents of sparse files Like before I specified dev sda2 as the partition to scan only this time I also added 814650 as the last argument which corresponds to the inode for the bookmarks html file Once this command completes I can look at Desktop recover bookmarks html and see what was found Hopefully icat was able to restore the file before the blocks were used for something else Now I can copy this file to removable storage or I could even mount dev sdb2 in read write mode and copy the restored file back to the filesystem Restore
81. do not include an example of a vulnerability assessment as it is far too large a topic for this document Do not start off your security travels by intending or claiming to do a vulnerability assessment that is don t prom ise your boss you know how to do it A proper assessment of anything other than a single host or the tiniest of network is a massive undertaking The trick is to start smaller and think longer term Understand what is nor mal on your network and test continuously As time passes you will cer tainly increase your overall security and for all intents and purposes will have carried out one level of vulnerability assessment Once you are more accustomed to the details of vulnerability testing you can start to formalize your own procedures into a vulnerability assessment suitable for you or your company An excellent procedural reference guide is the Open Source Security Testing Methodology Manual OSSTMM written by Pete Herzog This document intends to provide a methodology for thor ough security testing It is likely far too extensive and formalized for most S T D users however it is a must read document and will give you an idea of how to lay things out should you decide to become more formalized Essentially it s a 129 page summary of things to test and how to present your results Further Reading e http en wikipedia org wiki Mariana_Trench e http en wikipedia org wiki Hacker_definition_controversy e h
82. drive and set up a boot loader Eventually this method was auto mated with a script that was created by Fabian Franz http www fabian franz de and was recently updated by Martin Oehler for the 5 0 release The latest version of the hard drive installer is pretty sophisticated and does much more than just copy the CD to the hard drive Start the installer from the terminal by using knoppix ttypo knoppix sudo knoppix installer The knoppix installer script works both in a pure console environment and in X If you run it from the console navigate through the options with your keyboard and hit the spacebar to select options and Enter to confirm them If you run the script from X you have a GUI that you can navigate with either a keyboard or a mouse Before you even get to the main menu the installer checks to see that some minimum requirements are met The first check is for the presence of any Linux partitions including partitions containing other distributions that contain enough space to store all of the uncompressed files on the disk plus 18 for overhead For the CD this means around 2 4 Gb and for the DVD you need around 13 GB For systems with less than 512 MB of RAM it also checks for a swap partition of at least 128 MB If either of these conditions is not met the installer presents you with the following informational warning and the option to partition the hard disk or quit The installer detected that the installation
83. from a single easy to use program To launch krdc click K Menu gt Internet gt Krdc Remote Desktop Connec tion When first run you are presented with a simple window that prompts you to enter the address of the computer to which you wish to connect For a VNC connection this is as simple as typing the hostname or IP address for the remote computer followed by a colon and the display name Usually the remote machine is running a single VNC session so to connect to the machine at the IP address 192 168 0 1 type the following command and click Connect 192 168 0 1 0 Krdc then prompts you for your connection type so it can choose the set tings that best suit your connection such as a lower color depth for low speed connections After configuring your connection krdc next prompts you for the remote server s VNC password and once it is provided con nects you Krdc superimposes a small taskbar at the top of your VNC win dow that tells you which server this window belongs to and allows you to toggle full screen mode and close or minimize the window This taskbar is particularly useful if you are in full screen mode and can t remember the key combination to switch back to a regular window Ctrl Alt Enter If the task bar bothers you you can easily set it to hide by clicking the pushpin icon One nice feature of krdc is that it keeps track of servers to which you have already connected and the next time you run the program you ca
84. good background in those areas will help you get up to speed on the project If you have a patch that you would like to see included it is recommended that you package it into a deb package Klaus likes ready made Debian packages for patches because they save him the trouble of packaging them himself Patience is a virtue Klaus gets a lot of patches and a lot of emails Patience and persistence pay off when you have a patch that you would like to see included Join the Community If you don t know how to program you can still help the Knoppix commu nity You can file bug reports and general feedback at http www knoppix net bugs Provide as much detailed information as you can when filing a bug report especially if you are having problems with hardware This ensures that even if a current version of Knoppix might not support your hardware it can be supported in the future because the developers are now aware of the problem All open source projects benefit from people willing to write good documen tation The documentation pages on http vww knoppix net docs run on a Wiki which means that if you join the site you can help add edit and update the documentation with the rest of the community Another great way to contribute to Knoppix is to help in the forums and the IRC channel Get Help There are always new users who need help getting started besides participating on the community forums is a good way to keep up to
85. great security tools all on a single mini CD Local Area Security Linux L A S Linux began as a personal project to learn more about live CDs and to create a security toolkit Over two years ago L A S Linux began as a command line only distribution which was less than 50 MB in size so it would fit on a business card CD My cowork ers encouraged me to make it public and release it At the time I had owned the domain localareasecurity com for a few years but had no use for it I decided to put it to good use by creating a web site to make my Linux distri bution available to the public The first versions were based on a stripped down 35 MB version of Knop pix to which I added a long list of security tools Within about two months of the initial public release of v0 3 I was receiving hundreds of thousands of hits per month and was Slashdotted for the first time which made the web site hits skyrocket During this time many generous people contributed mir rors of the distribution These mirrors were sorely needed because at that time I was running the site on a shared host in Argentina Chapter 8 Knoppix Reloaded 287 HACK 100 Download Local Area Security With the increasing popularity of L A S Linux I made drastic improve ments to the distribution over the next few versions and shifted the base to a highly modified version of Damn Small Linux DSL The biggest improve ment was the addition of the Fluxbox window mana
86. gz in your home knoppix direc tory Now if you are backing up from Knoppix you do not want to store your new backup file on your ramdisk Instead write your new backup file to another mounted partition or over the network to another machine As in Hack 58 you can pipe tar to ssh to save to a remote file as in knoppix tty1 hda1 sudo tar cvzf etc ssh username 192 168 0 2 cat gt home username etc tar gz Chapter 6 Repair Linux 221 HACK 73 Back Up and Restore Restore To restore from this archive use tar xvzf and the filename Because the command is so similar be careful that you restore when you want to restore and create when you want to create otherwise you might overwrite your backup instead of restoring to it Mount the filesystem you want to restore to with read write permissions cd to the mounted directory and run knoppix tty1 hda1 sudo tar xvzf home knoppix etc tar gz Tar extracts the files into the current directory and overwrites any duplicate files it finds If you pipe tar to ssh to save to a remote file cd to the mounted directory and reverse the pipe knoppix tty1 hda1 ssh username 192 168 0 2 cat gt home username etc tar gz sudo tar xvfz Back Up and Restore a Full Partition You can also use tar to back up an entire partition to a remote location or another mounted filesystem First mount the filesystem cd to it and then use a dot to specify the current direc
87. haven t updated your Knoppix since you installed it this will minimize any trouble with package dependencies Chapter 4 Install Linux with Knoppix 127 HACK 45 CHAPTER FIVE Put Knoppix in Your Toolbox Hacks 46 64 A system administrator s toolbox and desk tell you that his job requires that he wear many hats and use many tools First there are the hardware tools screwdrivers torx wrenches CAT5 crimpers duct and electrical tape and of course a hammer Then there are the reference tools books manuals CD ROM documentation and the secret phone number to upper tier ven dor tech support After these tools are the software tools DOS boot flop pies driver CD ROMs BIOS flashing utilities and a number of other special purpose rescue disks Lastly there is the most important tool for a system administrator caffeine Oftentimes a system administrator doesn t know which of these tools he will be required to use in any given circumstance My computer is broken or the Internet is down mean any number of things so when an adminis trator goes to solve a problem he often brings a number of different tools and is prepared for any problem Over time a clever or lazy depending on how you want to look at it administrator figures out how to consolidate all his most useful tools just so there is less to carry If you are this kind of administrator Knoppix is for you While a Knoppix disk is a great Linux
88. if you want a more graphical experience Knoppix has included a utility partimage that provides you with an easy to use GUI and still gives you many options without any command line kung fu Partimage While partimage can be run from the command line directly this hack also covers partimage s interactive mode which it executes when you run partimage with no options Partimage requires root privileges so under Knoppix type sudo partimage 182 Chapter 5 Put Knoppix in Your Toolbox Clone Hard Drives When launched the first option you see is to choose which partition you want to save or restore Like its name alludes to partimage is only for the purposes of saving and restoring partition images Partimage also attempts to guess which filesystem the partition is currently using which makes it easier to see which partitions you want to image on a multipartition dual boot system After selecting the partition to save move the cursor down to select the image file to save to Knoppix has limited ramdisk space so you must save the partition image to another partition on the system Make sure that partition is already mounted and then type in the full path of the file you want to save for instance mnt hdb1 hda1_drive_image img Once you enter the filename if you are saving to the local machine you can simply hit F5 to move to the next screen Partimage also provides an option to save the partition image over the net wor
89. indefinitely one or two passes are generally enough to identify any major problems with your RAM When you are satisfied with the number of passes hit Esc to exit If you have errors there are a number of ways to proceed If you have multi ple memory modules you may try removing all but one at a time so that you can isolate which one is problematic Sometimes memory only shows errors on a particular machine so move the module to a new machine and run Memtest86 on it again There have been a number of reports of errors for Tests 5 and 8 on Athlon systems even with name brand memory and a quality motherboard The creator of Memtest86 insists that these errors are in fact legitimate and even if the RAM isn t necessarily bad it still does not seem to be able to run at Athlon speeds His suggested remedy is to either choose more conservative memory timings on the mother board or replace the memory with higher quality memory that can sustain those speeds 26 Chapter 1 Boot Knoppix CHAPTER TWO Use Your Knoppix Desktop Hacks 12 24 Every Swiss Army knife comes with a diagram that lists the different tools of the knife and explains their function At first everything may seem clear and you may believe you understand everything necessary about your new knife But as you use it you realize that you don t really know why it has three different sized knife blades or what the different saws should be used for and you fi
90. installation scenarios including how to turn an install into a regular Debian system Chapter 5 Put Knoppix in Your Toolbox Knoppix isn t just for desktop use This chapter discusses how to use Knoppix as your system administration multitool with tips on how to replace a failed server with Knoppix in an emergency clone systems and perform security audits Chapter 6 Repair Linux When your Linux system breaks and you need a rescue disc look no further than Knoppix This chapter helps you repair a system that won t boot with tips on restoring the boot loader repair filesystems and recover from failing hard drives Chapter 7 Rescue Windows The Windows Recovery CD isn t all it s cracked up to be and when your Windows system breaks you can use Knoppix to rescue it This xxii Preface chapter helps you back up files and settings reset passwords hack the registry and even scan for viruses Chapter 8 Knoppix Reloaded There are a number of other live CDs that have been based on Knop pix Each derivative has its own special focus and this chapter covers some of the most popular Knoppix based distributions and why you might want to try them in addition to Knoppix Before you remaster your own CD check out these distributions Chapter 9 Knoppix Remastered Knoppix is very flexible but if you have a special need or your favorite software is missing from it you can easily remaster Knoppix to include the special featur
91. is installed you are ready to collect data Mount both drives and then start the script command as root so that you can review the Chapter 5 Put Knoppix in Your Toolbox 177 HACK 57 HACK 57 Collect Forensics Data verbose output from grave robber at a later date and follow the progress of grave robber sudo mount o ro dev hda1 mnt hda1 sudo mount o rw dev hdb1 mnt hdb1 knoppix ttypo knoppix sudo mkdir mnt hdb1 data knoppix ttypo knoppix sudo script mnt hdb1 grave robber output Script started on Tue Jul 13 21 53 20 2004 root o knoppix knoppix ttypo knoppix knoppix ttypo knoppix a aa Replace dev hdal1 with the drive from which you want to collect data and replace dev hdb1 with the drive to which you want to save data The script command saves all input and output from the terminal into mnt hdb1 grave robber output so you can review your steps If you run script with sudo you should now have a root prompt to run the grave robber com mand root 0 knoppix grave robber c mnt hda1 o LINUX2 d mnt hdbi data v The c argument tells grave robber that instead of scanning the current machine the default to scan a corpse mounted at a specified directory in this case mnt hdal The o option tells grave robber which OS the corpse was running and is required if you are scanning a corpse This example was scanned on a Linux system but grave robber also supports FreeBSD Open BSD and
92. is the default MAC returned by SAMBA This suggests it is a Linux server Notice this MAC address is decoded from within the higher level data returned from the server and has nothing to do with lower layer ARP tracking Using this method you can usually scan windows net works across routers to gain a list of MAC addresses that you could not achieve using typical Layer 2 techniques 10 0 0 10 looks like a normal Windows box Its always worth using the Internet to look up the manufacturer of a NIC All legitimate MAC addresses are issued in blocks to device manufacturers and there are many resources online to search for this information You can often identify interesting boxes just from this lookup if the MAC resolves to Apple then there is a good chance the device is running OSX for example In this example the MAC resolves to D Link Corporation 302 Chapter 8 Knoppix Reloaded HACK Full Protection with S T D 101 Further Reading e http en wikipedia org wiki Ntop e http en wikipedia org wiki Smbclient e http en wikipedia org wiki LinNeighborhood Password Tools At first glance password cracking utilities seem relevant only to the darker side of security testing However as a security enthusiast you should attempt to crack any password hashes you can lay your hands on whenever possible Not all software packages enforce the use of strong passwords and you will be amazed at how quickly you can brute f
93. job done In general you may use the code in this book in your programs and documentation You do not need to contact us for permission unless you re reproducing a significant portion of the code For example writing a program that uses several chunks of code from this book does not require permission Selling or distributing a CD ROM of examples from O Reilly books does require permission Answering a question by citing this book and quoting example code does not require permission Incorporating a significant amount of example code from this book into your product s documentation does require permission We appreciate but do not require attribution An attribution usually includes the title author publisher and ISBN For example Knoppix Hacks Second Edition by Kyle Rankin copyright 2008 O Reilly Media Inc 978 0 596 51493 8 If you feel your use of code examples falls outside fair use or the permission given above feel free to contact us at permissions oreilly com Safari Books Online e When you see a Safari Books Online icon on the cover of Safa ri your favorite technology book that means the book is Books Online available online through the O Reilly Network Safari Bookshelf Safari offers a solution that s better than e books It s a virtual library that lets you easily search thousands of top tech books cut and paste code sam ples download chapters and find quick answers when you need
94. just type unzip Song zip Make It Persistent Now that you have done all of this work you will want to save your changes Since everything is currently written to ramdisk if you just reboo ted now you would have to start the process from scratch Luckily Knoppix makes it easy to keep these changes and use them later via its Persistent Disk Image feature see Create Persistent Knoppix Settings Hack 26 First clean up excess files you no longer need like the FretsOnFire tarball and any rar files from songs you have downloaded rm FretsOnFire 1 2 451 linux tar gz sudo apt get clean Now click K KNOPPIX gt Configure gt Create a persistent KNOPPIX disk image and follow the wizard to create a persistent disk image on a USB drive or some other removable storage You will likely need to create at least a 200 MB image but if you have added a number of songs to either game this size could vary widely so keep that in mind when making the image Once the Chapter 3 Tweak Your Desktop 93 HACK 30 HACK 31 Network Boot Knoppix wizard is finished you can halt Knoppix and remove your USB key Any time you want a party just boot the Knoppix CD with the key inserted it will automatically detect the persistent image and prompt you to use it Network Boot Knoppix Use the Knoppix Terminal Server to boot multiple netboot capable machines off of a single Knoppix CD Booting Knoppix off of a CD ROM wor
95. knoppix conf ttylog Apr25 184550 tty_2 log Apr25 184550 tty_2 log timing And finally let s have a look at our log knoppix ttypo knoppix cat home knoppix conf ttylog Apr25 184550 tty_2 log Script started on Wed Apr 25 18 45 50 2007 knoppix ttypo knoppix I am typing this on the console bash I command not found knoppix ttypo knoppix ls usr bin honeypot arpd consh honeyd labrea rtfm thp 0 4 6 logconfig logsrv Further Reading e http en wikipedia org wiki Honeypot_ 28computing 29 e http en wikipedia org wiki Tarpit_ 28networking 29 Chapter 8 Knoppix Reloaded 299 HACK 101 Full Protection with S T D IDS Intrusion Detection System IDS is an alarm system for your network The introduction of freely available open source IDS solutions is arguably one of the most important security milestones ever No matter how much Red Bull you drink you can t monitor your network as well as an IDS There are two types of systems passive IDS and active Intrusion Preven tion Systems or IPS In simple terms an IDS works by comparing current traffic against a list of known bad or interesting traffic patterns also known as traps When a pattern is matched the IDS makes a decision on how to react to this event For example on matching a known traffic pattern an IDS can simply kill the associated connection In real world terms this defangs a huge number of common attacks since the IDS will instantly en
96. least an encrypted tunnel or a full blown VPN The motto of security enthusiasts should be be para noid at all times S T D includes orinoco airo prism2 hostAP and airjack drivers The Orinoco drivers are patched by default so you are able to enable monitor mode with your Orinoco Gold or Silver without any additional messing about Some newer model Orinoco cards may need a firmware downgrade n S T D also includes many wireless tools such as the following Kismet The King of wireless scanners One of the best features of Kismet is its design of zero packet emission You will find nice GUI like wireless scanners in Windows and other similar sources but they invariably transmit in some way Before you use any other scanner consider the implications of this i e others on the network will be able to detect that you are scanning Kismet can also de cloak hidden SSIDs by natively analyzing all the packets it sees for leaked information Hack 54 discusses how to use kismet with Knoppix for wardriving Airsnort Can be used to decrypt WEP encryption 312 Chapter 8 Knoppix Reloaded Full Protection with S T D Wellenreiter Is included for completeness but most people use Kismet Gpsdrive With a compatible GPS receiver this program can integrate with kismet to mark down the latitude and longitude of each AP found One of those should be considered a must have tool if you are wardriving becaus
97. like a big deal for someone to know that you read the news paper online there are still a number of valid reasons why you might want to browse the web anonymously The web site for the anonymous web proxy I will talk about in this hack Tor lists a number of uses for anony mous web browsing Individuals use Tor to keep web sites from tracking them and their family members or to connect to news sites instant messaging services or the like when these are blocked by their local Internet providers Tor s hidden ser vices lets users publish web sites and other services without needing to reveal the location of the site Individuals also use Tor for socially sensitive commu nication chat rooms and web forums for rape and abuse survivors or peo ple with illnesses Chapter 3 Tweak Your Desktop 109 HACK 38 HACK 38 Browse the Web Anonymously Journalists use Tor to communicate more safely with whistleblowers and dis sidents Non governmental organizations NGOs use Tor to allow their workers to connect to their home web site while they re in a foreign country without notifying everybody nearby that they re working with that organization Tor stands for The Onion Router and that name is a short way to describe how it works Essentially a user creates an encrypted tunnel with one Tor node That node makes an encrypted tunnel with a second node and the second node makes an encrypted tunnel with a third node That third
98. local time but we put that down to typing speed between commands Local and remote time differ by approximately one hour three minutes We know our local time is synchronized with a time server which implies that the remote is not since most time zones differ in terms of multiple of hours We quickly run a trace to the target knoppix ttypo knoppix traceroute 10 0 0 2 traceroute to 10 0 0 2 10 0 0 2 30 hops max 38 byte packets 1 10 0 0 2 10 0 0 2 1 193 ms 0 193 ms 0 183 ms 308 Chapter 8 Knoppix Reloaded Full Protection with S T D Being only one hop away we know the target is not in a real different time zone so the logical implication is that it just has the time set incorrectly This is not the most useful information in the world but it serves to high light the techniques used You could also use this particular example if the target had blocked all ping and traceroute packets Even if those common types were blocked the administrators of that machine may have missed this ICMP code allowing you to time ping a host that the owner thinks is not ping able Further Reading e http en wikipedia org wiki Hping e http en wikipedia org wiki Transmission_Control_Protocol e http en wikipedia org wiki Request_for_Comments e http en wikipedia org wiki Internet_Control_Message_Protocol e http tools ietf org html rfc792 Vulnerability Assessment Just as some people argue that a hacker is actually a cracker
99. mounted a USB disk to media sdal and copied the ker nel tarball to media sdal linux 2 6 19 1 you would type the following knoppix Knoppix cd media sda1 knoppix Knoppix media sda1 tar xvzf J linux 2 6 19 1 tar gz knoppix Knoppix media sda1 sudo In s J media sda1 usr src linux 2 6 19 1 J usx src linux 2 6 19 1 Replace those file paths with the paths that correspond to your kernel Get the Nvidia Installer The main thing that you need to install the Nvidia binaries is the actual Nvidia driver installer To get this browse to http nvidia com click on Download Drivers from the main page and then click on the link that says Linux FreeBSD and Solaris Drivers On the page that appears click the link for the Linux IA32 driver On the new page scroll down to Step 2 and click on the link below the word Download to download the actual Nvidia 102 Chapter 3 Tweak Your Desktop Install Nvidia 3D Drivers installer Depending on your Internet connection this might take some time to download Once the file downloads hit Ctrl Alt F1 to switch to a Knoppix shell Then switch to runlevel 2 and execute the Nvidia installer init 2 sh home knoppix NVIDIA Linux x86 1 0 9755 pkg1 run Replace this path with the path to the installer file you downloaded This will launch the Nvidia installer wizard to walk you through the installation process First the program will try to apply drivers it has included to y
100. nasl root ttypo knoppix With all of the latest plug ins ready to use click K Menu gt System gt Secu rity gt Nessus Security Tool to launch the Nessus client Nessusd Host Nessus setup requires setting up certificates and passwords to connect to the server First we ll configure a knoppix user who is authorized to connect to the local nessusd host Run the nessus adduser command as root root Knoppix nessus adduser Using var tmp as a temporary file holder Add a new nessusd user Login knoppix Authentication pass cert pass Login password Login password again User rules nessusd has a rules system which allows you to restrict the hosts that knoppix has the right to test For instance you may want him to be able to scan his own host only Please see the nessus adduser 8 man page for the rules syntax Enter the rules for this user and hit ctrl D once you are done the user can have an empty rules set Chapter 5 Put Knoppix in Your Toolbox 167 HACK 55 Audit Network Security Login knoppix Password 2 RRO DN Rules Is that ok y n y y user added To connect to the nessusd server you ll have to ensure that the server is properly configured The next step is to create the required server certifi cates Create the needed certificates with nessus mkcert Creation of the Nessus SSL Certificate This script will now ask you the relevant information to create the SSL c
101. new remastering session the script will then start copying all the files to the new directory and provide you with a nice progress bar Once the script copies all of the files or sooner if you pointed it to an exist ing remastered directory you will see a menu with a list of options to proceed Chapter 9 Knoppix Remastered 351 HACK 113 HACK 113 Automate Knoppix Remastering Chroot chroot into your remaster Create compressed fs Create compressed filesystem Create isofs Create the ISO file Edit options Edit several options like author na BW Ne Load sort file Load a sort file to optimize your remaster 6 Quit Quit the program Select 1 to chroot into your remaster You will be dropped to a shell within the remaster directory If you are an English speaker type the following to change your locale to English export LANG en_US UTF 8 export LANGUAGE en From here you can add remove and update packages and otherwise make any changes to the remastered filesystem just like in Hack 109 Once you are finished with all of your changes type exit to return to the menu Before you create any compressed filesystems or ISOs now is a good time to edit any labels that might be applied to your remaster such as the author Select option 4 which will drop you into a text editor Make changes to any of the options in the file you want and also note that you can configure whether to use be
102. numeric ids progress remotehost mnt sda1 sudo rsync avx numeric ids progress remotehost home mnt sda2 A number of the rsync options I use are important for this process so I will describe them here The a option tells rsync to use archive mode which pre serves permissions symlinks and a number of other file settings The v option sets verbose mode so I can see what rsync is doing The x option tells rsync not to span across multiple filesystems This is particularly impor tant when synching the root partition if I didn t set this option I would also end up copying all of home into mnt sda1 and might not have enough room The numeric ids option gives files it copies permissions based on the numeric ID of the users and groups instead of by their names This is important when using rsync with Knoppix since Knoppix will likely have different user and group IDs than your server Without this option your files might end up being owned by seemingly strange users Finally the progress option isn t crucial but it gives a full progress bar so you can see how quickly or slowly your files are transferring so is a nice touch Once you have completed the initial sync schedule a time when you can power down the server and boot it into Knoppix then proceed to the next step Perform the Final Sync The final sync requires that the server be booted into Knoppix to make sure that the server is in a frozen state and no file
103. of Word Rich Text Format and OpenOffice org s native docu ment format To create a PDF of the current document click the PDF icon on the tool bar or select File Export as PDF It is cheaper to create PDF documents this way than purchasing Adobe Acrobat 40 Chapter 2 Use Your Knoppix Desktop Get Office Work Done If you are saving a document that you have opened from a drive on your computer remember that Knoppix by default mounts filesystems as read only so to save you must either right click on the hard drive icon corresponding to your par tition and select Change read write mode or temporarily save to your desktop Spreadsheet If you need to create or edit spreadsheets under Knoppix start OpenOffice org Calc by clicking K Menu gt Office gt OpenOffice org gt OpenOffice org Calc Calc is a full featured spreadsheet program and sup ports editing Excel and comma delimited files in addition to its legacy sxc format and the OpenDocument Spreadsheet ods format While Calc does not support Excel macros it does provide its own macro language and recorder and full support for Excel mathematical functions On opening Calc you are presented with a blank spreadsheet surrounded by toolbars and you are able to create macros and formulas After you have entered your edits click File Save As to choose from a number of file for mats or you can export your spreadsheet to PDF Presentation For creating or editin
104. of the machines on the local network must be config ured to use the Knoppix machine as the default gateway In our example the 192 168 1 network is behind this NAT firewall to access the 192 168 0 network so each of the machines on 192 168 1 is using 192 168 1 5 the IP address we assigned to the NIC connected to the local network as their default gateway The NAT works by taking all of the packets coming from 192 168 1 the local network and going to 192 168 0 the external network and making them appear as though they are from 192 168 0 5 the IP address we assigned the NIC connected to the external network When a machine on the external network responds it responds directly to 192 168 0 5 Then the Knoppix machine translates the address to refer to the 192 168 1 machine that originally sent the packet Then Knoppix forwards it to the local net work For all intents and purposes the 192 168 0 network doesn t know that the 192 168 1 network exists To set up Knoppix as a NAT router you really only need to type in a single iptables command To create a NAT for our example network type knoppix ttypo knoppix sudo iptables t nat A POSTROUTING s 192 168 1 0 255 255 255 0 o ethO j SNAT to source 192 168 0 5 This iptables command creates a rule to take all packets coming from the 192 168 1 network and going from etho and makes them appear as though they are from 192 168 0 5 If you want to use IP masquer
105. off of a completely different operating system Although viruses have been written for Linux in the past and more will be written in the future it is still rather uncommon Let s face it you are probably scanning a Windows system for a virus or worm that runs only on Windows and Knoppix runs off of a completely different oper ating system even if you accidentally click on a virus infected file it doesn t launch the virus If the virus has infected other machines on the network and is scanning systems to infect you don t have to worry about reinfection while you are running Knoppix e It s free While it is still advisable to have virus protection running on a Win dows system at all times virus protection can be expensive not only due to the initial cost but also to the annual subscription fees to get virus definition updates If you can t afford virus protection software you can at least scan your system periodically with Knoppix for free Knoppix comes with an excellent free virus scanner called ClamAV http clamav net Knoppix also includes a set of virus definitions however you will want to make sure you have the very latest set of virus definitions so use the freshclam program to automatically grab updates 270 Chapter 7 Rescue Windows Scan for Viruses sudo freshclam ClamAV update process started at Mon May 14 19 17 11 2007 WARNING Your ClamAV installation is OUTDATED WARNING Local version
106. or NTFS Win dows partition click on the drive on the desktop to mount it then right click on the hard drive icon and choose Change read write mode or on the command line type the following knoppix ttyp1 config sudo mount o rw dev hda1 mnt hda1 Replace hda1 with your Windows partition Once the partition is mounted you must locate the directory containing the SAM file For Windows 2000 and XP systems this directory should be located under windows system32 config or winnt system32 config In this example navigate to the mnt hda1 windows system32 config directory you will notice a number of files includ ing ones called SAM SYSTEM and SECURITY which may or may not be in all caps After you have navigated to this directory on the command line reset the Windows Administrator password by running the following knoppix ttyp1 config chntpw SAM Remember that SAM is the name of the SAM file in the directory and may or may not be all in caps The default for this utility is to edit the Administra 262 Chapter 7 Rescue Windows Reset Lost NT Passwords tor password so there is no need to specify an account While you have the option to change the password to a different value I recommend you just reset the password and then change it when you get back into Windows You can reset the password by typing instead of a password when prompted knoppix ttyp1 config chntpw SAM chntpw version 0 99 2 040105 c Petter
107. owner of the machine on which the server is running the advantages of an NX connection are clear e The server to which you connect and any network gateway between your computer and that server don t have to open any port other than SSH In most cases this is open for remote shell access anyway e Users don t have to fiddle with complicated SSH client and forwarding setups Just installing NXClient is enough NXClient is of course avail able for all major operating systems such as Windows Linux and MacOS X As the last step you can choose to create an icon on your desktop for that session automatically which is recommended and to configure advanced options Don t worry you can always select the advanced options dialog from nxclient later As soon as you ve finished you should see the Login dialog of NX Client Open up a web browser to http www nomachine com testdrive php and then enter your name and email address Some minutes later you ll receive an email with your test account data to enter in a test drive s client Insert the account data and press Login The NX Client then creates a con nection authenticates the user and establishes the X Server connection Then a window appears and a normal KDE session is started in Italy 134 Chapter 5 Put Knoppix in Your Toolbox Run X Remotely with FreeNX If the user authenticates but it then times out try to activate SSL encryption by checking Enable S
108. really read it This text output is actually rather useful because it shows which hardware the kernel has detected and gives you a good sense of which hardware should be working You don t have to scribble down all of that information as it scrolls by or sit in front of your monitor with a camera taking snapshots because Linux logs all of that information for you in var log dmesg Knoppix doesn t enable logging by default so you might notice that var log dmesg is empty under Knoppix You can still access the same information through the dmesg command Dmesg outputs what is in var log dmesg to the screen so if you want to ref erence it redirect it to another file or pipe it to a pager such as less 186 Chapter 5 Put Knoppix in Your Toolbox Test Hardware Compatibility The first time you run dmesg you might be overwhelmed by the amount of information you are presented with because Knoppix probes for many dif ferent kinds of hardware that you probably don t have and displays a lot of information about your motherboard and PCI devices As you scroll through the output you should start to see useful information about your hardware For example here s some sample dmesg output that gives me information about my IDE devices dmesg less AMD7411 00 07 1 rev 01 UDMA100 controller ideo BM DMA at Oxfo00 0xf007 BIOS settings hda DMA hdb DMA ide1 BM DMA at Oxf008 oxfoof BIOS settings hdc pio hdd pio hda WDC WD10
109. required This test is quite effective at detecting data sensitive errors but the execution time is long Test 7 Random number sequence This test writes a series of random numbers into memory By resetting the seed for the random number the same sequence of numbers can be created for a reference The initial pattern is checked and then comple mented and checked again on the next pass However unlike the mov ing inversions test writing and checking can only be done in the forward direction Chapter 1 Boot Knoppix 25 HACK 11 Check RAM for Errors with Memtest86 Test 8 Modulo 20 ones and zeros Using the Modulo X algorithm should uncover errors that are not detected by moving inversions due to cache and buffering interference with the algorithm As with Test 1 only ones and zeros are used for data patterns Test 9 Bit fade test ninety minutes two patterns The bit fade test initializes all of memory with a pattern and then sleeps for ninety minutes Then memory is examined to see if any memory bits have changed All ones and all zero patterns are used This test takes three hours to complete The Bit Fade test is not included in the normal test sequence and must be run manually via the runtime configuration menu As the test runs you can keep track of which test phase is currently run ning how many errors have been detected which test caused the errors and how many passes have been performed The test will cycle
110. requirements are not fulfilled yet Please make sure that you have a free partition with at least 2GB to install Knoppix on Also we need a swap partition with at least 128MB if you don t have 512MB or more If you really really know what you are doing start with IGNORE_CHECK 1 sudo knoppix installer to avoid the menu I ve noticed a bug in the DVD version of the installer where it only checks that you have enough free space to accept all the files from the KNOPPIX directory However the DVD also has a KNOPPIX2 directory that it uses but does not add into the free space check So if you do a DVD install be sure that you have at least 13 GB of free space You intend to install Knoppix so the only choice is to select the Partition option In X gtparted runs a graphical partitioning program somewhat similar to Partition Magic which you can use to create delete and resize 114 Chapter 4 Install Linux with Knoppix Explore the Knoppix Installer partitions on your system If you run the installer from the console cfdisk launches instead In either case the goal is to create partitions to satisfy the installer requirements Once you finish and close gtparted or cfdisk the installer checks again for partitions it can use if it finds them the main installer menu appears see Figure 4 1 Knoppix Main Menu Knoppix Installation v0 3 19 19 Choose an action Configure Installation Create a new configuratio
111. root tty1 mv home knoppix kde bak home knoppix kde root tty1 init 5 All datafiles and directories on a KDE desktop are stored in the home username Desktop directory If you want to just copy your Linux desktop over the top of the default Knoppix desktop follow a similar procedure First drop to console only mode by typing knoppix ttypo knoppix sudo init 2 Then back up your current desktop copy the new desktop and start KDE root tty1 mv home knoppix Desktop home knoppix Desktop bak root tty1 su knoppix cp a mnt hda3 username Desktop home knoppix root tty1 init 5 After KDE starts your user s desktop icons and files are in place of the default Knoppix ones Similar to the KDE settings to restore your old desk top drop to console only mode again by typing knoppix ttypo knoppix sudo init 2 Then restore the settings and start KDE root tty1 xm rf home knoppix Desktop root tty1 mv home knoppix Desktop bak home knoppix Desktop Chapter 3 Tweak Your Desktop 81 HACK 27 HACK 27 Use Your Linux Desktop Settings root tty1 init 5 Other Applications To copy the settings of most other applications you don t need to drop to console only mode Simply make sure that the application itself is closed which ensures there aren t any related temporary files open Most program settings can be copied with a single recursive copy of the configuration file or directory F
112. root ttyp1 umount proc Then press Ctrl D to exit chroot 338 Chapter 9 Knoppix Remastered Create a Customized Knoppix Make the Master CD Filesystem Once you set up the KNOPPIX root filesystem create the actual filesystem that appears on the disk Put this filesystem in a new directory called master under your mounted partition Use rsync to copy all the files that appear on the Knoppix disk the files in cdrom except for the large KNOPPIX KNOPPIX and KNOPPIX KNOPPIX2 on the DVD compressed filesys tem The compressed file isn t necessary because you are creating a new ver sion of that file based on your customized filesystem in source KNOPPIX From the mounted partition run the following root ttyp1 hda1 mkdir master root ttyp1 hda1 rsync a exclude KNOPPIX KNOPPIX exclude KNOPPIX KNOPPIX2 cdrom master Now create the KNOPPIX KNOPPIX file This file is actually a highly com pressed filesystem that is created from the source KNOPPIX directory This long command generates an ISO 9660 filesystem like those on CD ROMs root ttyp1 hda1 mkisofs R U V Knoppix Hacks filesystem publisher Knoppix Hacks hide rr moved cache inodes no bak pad source KNOPPIX nice 5 usr bin create_compressed_fs m B 131072 master KNOPPIX KNOPPIX By far this is the most time consuming command because it is not only cre ating a filesystem but it is also sending the filesystem through a script that heavi
113. routing table Destination Gateway Genmask Flags Metric Ref Use Iface 192 168 0 0 255 255 255 0 U O 0 O etho 192 168 1 0 255 255 255 0 U O 0 O eth1 default 192 168 1 1 0 0 0 0 UG 0 0 0 etho default 192 168 0 1 0 0 0 0 UG O 0 O eth1 Build a Router Creating a router with route is pretty straightforward once you see the com mands involved In fact if both networks are already configured to use this machine as the gateway and you have already enabled IP forwarding then congratulations you are finished Otherwise read the following instruc tions to learn how to configure the routing for your router So far I haven t had to change anything in the networking In my example I set up static IPs Connect to the Internet Hack 19 but if you had DHCP running on either or both sides of the network with different default gate ways the router would have worked fine too At this point the Knoppix machine should be able to ping machines on both the 192 168 0 and the 192 168 1 networks but machines on 192 168 0 shouldn t be able to ping 192 168 1 and vice versa I want to make the Knoppix machine the link between my two networks For this to happen the machines on either network must use the Knoppix machine as the router to the other network If one of the two networks is already configured to use this Knoppix machine as its default gateway then all packets going outside of its subnet route through it by default and you
114. script 165 Index 385 S Safe Mode Windows 256 Samba servers configuring 147 saveconfig script 77 360 saving games 93 kiosk settings 88 MBRs 205 nessus tool reports 172 setup changes 75 79 scanners 46 49 nessus tool 166 173 scanning 47 clamav 286 file systems 212 gpart tool 208 Kooka 47 root kits 174 176 for viruses 269 272 wireless 311 sciences Freeduc 280 scientific publishing Quantian 323 screen cheat code 16 screensavers modifying 35 scripts root kits 174 scrollwheels 18 SCSI modules listing 22 searching partitions 114 207 209 security firewalls 296 creating 139 146 IDS 300 INSERT 284 287 L A S Security 287 289 networks auditing 166 173 patches downloading Windows 272 Security Bulletin ID 272 selecting versions 7 sequences random number 25 servers Apache creating wiki platforms 199 modules 149 booting from 94 96 email creating emergency 150 154 file creating emergency 146 148 LISa configuring 138 nessud connecting 168 NX 131 connecting with FreeNX 133 138 PXE adding to 194 197 pxelinux 195 Samba configuring 147 synchronizing 248 VMware converting to 247 252 VNC 129 130 web creating emergency 148 webcam configuring 197 services emergency running 154 158 init disabling 240 243 session files 80 Settings submenu 31 setup saving 75 79 Setup Wizard 138 sharing directories 148 files browsing Windo
115. share all the drives on an infected system for a quick virus scan by a central ized corporate virus scanner while the infected OS is shut down You can even connect a spare machine to a printer boot Knoppix and quickly con figure a makeshift network printer server Knoppix includes a nice GUI configuration utility to configure Samba the Linux SMB file server While the GUI configuration tool does make config 146 Chapter 5 Put Knoppix in Your Toolbox Create an Emergency File Server uring Samba easier you aren t required to use the Knoppix Samba utility to set up a file server If you already know which kind of configuration you want simply edit etc samba smb conf directly and then run this command to start the Samba process sudo etc init d samba start To use the Knoppix provided Samba configuration utility click K Menu gt KNOPPIX gt Services gt Start Samba Server Each time you run this script it wipes out the previous Samba configuration so don t run this script if you have made changes to smb conf that you want to keep This program prompts you to choose a password to assign to the knoppix user if there isn t already one because Knoppix s default behavior requires a username and password to access any file sharing connections it creates After it confirms your password Knoppix asks you whether you want to export all your hard drives so that remote machines can access them If you answer no to
116. that your themes or plugins do not work This is because most Firefox themes and plugins depend on a specific version of Firefox When copying your settings be conscious of any major version differences between your local application and the application that ships with Knoppix as sometimes configuration file formats change with major version releases If you ve spent all this time copying your settings and making the Knoppix desktop exactly how you like it you should make use of Hack 26 and make your settings persistent Otherwise all of your hard work will disappear the next time you reboot i 0 Use Your Windows Desktop Settings 24 Believe it or not your underlying Windows system isn t completely useless while running Knoppix You can leverage your underlying Windows system for settings and datafiles Quite a few of the applications included with Knoppix such as Firefox OpenOffice org and Gaim actually have Windows counterparts If you have been using these open source applications under Windows and have them configured to your liking you can copy the settings for use in Knop pix much like in Hack 27 The programs covered here typically use the same configuration files under Windows as they do in Linux In fact the only real difference is the location of the configuration files This hack describes how Chapter 3 Tweak Your Desktop 83 HACK 28 Use Your Windows Desktop Settings to copy these settings an
117. the Knoppix files and if you install from the DVD you will need 13 GB In our example resize the partition so that 2 5 GB of free space is available so you have enough room for the 2 2 GB root partition and a swap partition After you click OK qtparted displays the free space you have just created in the main window Now click on the gray free space and create a swap partition and a 2 2 GB root partition as covered in Hack 41 Once you are finished resizing click File Commit to actually per form the resizing and partition creation After you commit the changes close qtparted to return to the main installer menu Depending on the type of system you have your hard drive might be listed as dev sda instead of dev hda this is often the case with SATA drives for instance If you only see dev sda and don t see dev hda chances are dev sda is the drive you want to configure The next step is to configure the installation by selecting a username pass word and so on Once you are finished click Start Installation to start copy ing the files to the partition After this process you are prompted to create an optional boot floppy after which the installation is complete Chapter 4 Install Linux with Knoppix 121 HACK 42 HACK 43 Convert Knoppix to Debian Unstable During the install process Knoppix attempts to automatically detect any Windows partitions on the drive and will add them to the boot choices in boo
118. the differences in each preference can have a major impact on the type length and stealthiness of a given scan 170 Chapter 5 Put Knoppix in Your Toolbox Audit Network Security Nessus uses nmap to perform port scans on targets You can load a previous nmap port scan to speed up the scanning process Scroll down in the Prefs tab and enter the nmap results in a field labeled File containing grepable results Scan The Scan tab allows you to set the various scan options for the different methods of scanning A number of plug ins are listed at the bottom of the panel that can be disabled if they don t suit your need for scanning Target Selection In the Target Selection tab you can select your targets for scanning You may enter multiple targets into the top field if you separate them with a comma such as 172 16 0 1 172 16 0 2 192 168 0 0 24 crypto nsa org If the network s DNS server allows you to perform a zone transfer you can enter that DNS server here Nessus automatically probes all the hosts that are returned by the zone transfer It s worth noting that it s a bad idea to enter multiple hosts and enable zone transfers because nessus attempts a zone transfer for each host which can potentially generate a lot of network traffic and a lot of hosts to scan Separate those scans from your general random RFC 1918 address space scans unless you know better have access to information that you have alread
119. the knoppix user just like the CD so it won t ask you for a username Once you answer all the questions the configura tion is complete and Knoppix drops back to the main menu and allows you to start the installation with the options you have just configured or to save the options so you can use them later Once you are satisfied with your configuration click Start Installation A report appears and displays the different options that Knoppix can use for the install with a final prompt before proceeding Once you click Next Knoppix begins the install process so be certain everything is configured how you want it ceeding with the install If you need special cheat codes for your hardware to work properly make sure that you use them for this boot because these are the hardware settings Knoppix uses for the install This is especially important if you choose the Debian system type which does not install the Knoppix hardware detection scripts because any hard ware that isn t working when you install must be configured later without the benefit of Knoppix s scripts It is techni cally possible to reuse Knoppix s configuration scripts in this mode but it requires a series of complicated steps RK Make sure that all of your hardware is working before pro Now Knoppix formats the partition you chose and starts copying files to it It does take some time to copy all of the files from the disk to the hard drive especially
120. the language settings apply only to new programs so anything that is currently open must be restarted if you want the menus to change This still does not change the language of any icons on the desktop To do this you must completely restart the desktop environment so either click K Menu gt KNOPPIX gt Utilities gt Choose Restart KNOPPIX Desktop or type this command in a shell to drop down to text mode knoppix ttypo knoppix sudo init 2 Then bring the desktop back up by typing this command root tty1 init 5 Keep in mind that this will only change the settings for KDE programs You may still need to navigate within the settings of non KDE programs to change their language settings If you need to change many programs it is simpler and faster to just reboot and use the correct cheat code Make Knoppix run faster by loading the Knoppix image to RAM or saving it to the hard drive This also frees your CD ROM drive for other uses i Fa Free Your CD to Make Knoppix Run Faster Compared to other live CD distributions Knoppix runs surprisingly quickly considering that it downloads data from a compressed image on the disk If you want to speed things up but aren t ready to install Knoppix on your hard drive just yet there are cheat codes that allow you to copy the complete Knoppix disk image to either RAM or a partition on your hard drive and run it from there If you are ready to install it on your hard drive see Chapter 4
121. the screen the cursor will have moved over the 1 in lang On a German ISO you will see the phrase lang de Use the arrow keys to move your cursor over the d and then type en to change the default to English or replace that with the language cheat code you want to use e Hit Ctrl S and then Enter to find any other instances of lang that you might want to change e Hit Ctrl X to save your changes and then exit If you edit the wrong section or make a mistake and want to exit without saving just hit Ctrl C After you have finished you can burn the ISO to a disk and boot from it It might be tempting to use hexedit to change a lot of the ISO I would recom mend that you limit yourself to simple changes like the one listed above changes that don t add or subtract from the overall size of the file Chapter 9 Knoppix Remastered 359 HACK 116 HACK 117 Remaster Knoppix Without Remastering Make your own custom Knoppix disk without the full remastering process z3 Remaster Knoppix Without Remastering e117 Knoppix is pretty easy to remaster and many people have created their own Knoppix variant to suit their needs However there are a number of tweaks and changes you can make that don t require a complete remastering if you take advantage of the knoppix sh script I ll go over some of the advantages to this approach over a full remastering later in this chapter I have watched quite a few people get introduced to K
122. the static ash and the kernel mod ules were copied from the miniroot the very small initial root directory structure used by the kernel during boot time to save space The com pressed filesystem was created using the best option to gain an extra 2 MB of space In later versions the compression moved to using SquashFS patched with LZMA compression Even the initial ramdisk a k a miniroot and the linux kernel image vmlinuz are LZMA compressed enabling them to be stored on floppy disks During that time the size was lifted to just under 60MB approximately 174 MB uncompressed This still will fit on a credit card sized CD ROM with overburning Main Additions For Version 1 2 released at the beginning of February 2004 during a DFN CERT Deutsches Forschungsnetz Computer Emergency Response Team workshop a major feature was introduced captive ntfs which gives full read write support for NTFS partitions using the native Windows NTFS drivers Write to NTFS At the same time the latest version of the open source virus scanner clamav including the signature database and the Internet update tool freshclam were added The combination of these two new features added the ability to scan and repair NTFS partitions from INSERT Later avscan a GUI fron tend for clamav was added Six months earlier than Knoppix INSERT could boot from isolinux rather than from syslinux With isolinux a floppy boot image is no longer neces sary
123. them In addition while the files are copying you can browse the Web or play games if watching the output bores you 3 Mount Linux Software RAID 75 When you have a pre existing Linux software RAID it only takes a few steps to mount it under Knoppix While there are a number of hacks in this book that discuss how to create and migrate to different types of Linux software RAID sometimes all you really need to do is to mount a RAID that has already been set up on your system for recovery In this hack I will document the few simple steps needed to assemble and access your Linux software RAID The first step in this process is to identify which partitions are in your array You might already know this information but if not one way to identify the partitions is to run a partitioning tool like fdisk cfdisk or even qtparted on each disk in your system and look for partitions of type fd or Linux RAID autodetect Chapter 6 Repair Linux 225 HACK 75 Mount Linux Software RAID root major fdisk dev sda The number of cylinders for this disk is set to 4462 There is nothing wrong with that but this is larger than 1024 and could in certain setups cause problems with 1 software that runs at boot time e g old versions of LILO 2 booting and partitioning software from other OSs e g DOS FDISK OS 2 FDISK Command m for help p Disk dev sda 36 7 GB 36703934464 bytes 255 heads 63 sectors track 4462 cylinder
124. to the Internet with GPRS Bluetooth To configure your modem under Knoppix you must tell Knoppix which device to point dev modem to Click K Menu KNOPPIX gt Network Internet gt dev modem connection setup to launch a configuration applica tion which asks you a series of questions about how your modem is con nected to the computer Next click K Menu gt KNOPPIX gt Network Internet gt Modem Dialer to enter the phone number username and pass word for your dialup connection and connect If you are connecting with a GPRS connection on your cell phone you must click K Menu gt KNOPPIX gt Network Internet GPRS Connection to con figure the connection This program asks you to choose the type of GPRS connection you are using and then attempts to make a connection As you can see Knoppix puts many different options at your disposal for connecting to the Internet Now that you are connected the next hack explains how to view web sites access your email and chat with friends through Knoppix applications Connect to the Internet with GPRS Bluetooth Attempt to get the impossible to happen a GPRS data connection over Bluetooth with Knoppix Bluetooth is a Personal Area Networking PAN protocol with a very lim ited range the most powerful consumer devices Class 1 have a range of 100 meters Bluetooth allows you to connect devices together into pairs GPRS or General Packet Radio Service is a packet switched pr
125. tohd Hack 6 you can have an entire network handle the distrib uted compile and still be able to reboot the system to its regular settings when finished 314 Chapter 8 Knoppix Reloaded HACK Distribute the Load with ClusterKnoppix 103 To run distccKNOPPIX you just need to download the ISO from http opendoorsoftware com burn it to CD insert it in a bootable CD ROM drive and reboot Once booted confirm that your network is set up correctly as listed in Hack 19 and note that your IP is using ifconfig When you are ready to compile a program on the machine running distccd add this IP and any other IPs for distcc machines on your network to the DISTCC_HOSTS envi ronment variable knoppix ttypo knoppix export DISTCC_HOSTS localhost 192 168 0 1 192 168 0 2 Alternatively you can run a program like nmap from your server to detect new IPs in your subnet Look for open port number 3632 root ttypo root nmap v p 3632 192 168 0 0 16 This comes in handy if the distccK NOPPIX nodes have no display Once DISTCC_HOSTS has your list of machines you can run make with the following command from your source tree knoppix ttypo code make j5 CC distcc Replace 5 with the number of jobs you want make to create A general rule of thumb is to have between one extra job than you have computers and twice the number of computers This example has three computers so you should pick between four and six jobs DistccKNOPPIX is
126. try out the huge library of programs Knoppix includes Everything runs from CD so you can t really harm anything with your experiments Now that you are familiar with the K Menu let s move on to the other parts of the Knoppix desktop The Panel The panel is the gray bar along the bottom of the screen containing the K Menu and other items The panel is like an extensible Windows taskbar It allows for applets to be embedded in it the default Knoppix panel refer to Figure 2 1 has several of these To the immediate right of the K Menu are two other menus the first has a penguin icon and is a shortcut to the KNOPPIX submenu The next menu lists all of the applications open across all desktops To lower all visible applications click on the next icon which looks a bit like a desk with a pencil on it Click the icon again to raise all application windows Next to those icons you will find many shortcut icons for applications in the K Menu These are meant to provide quick access to applications you commonly run Right click on any of these icons to display a context menu that gives you the option to move or delete the icons Drag and drop icons from the K Menu to add them to the panel To the right of the application icons you should see a box with the num bers 1 2 3 and 4 in it This is known as a desktop pager and it allows you to quickly switch desktops by clicking on the appropriate number or if you prefer Ctrl Tab cycles throug
127. up empty handed and frustrated if you try to complete a task for which Microsoft hasn t explicitly created a tool Here are just a few things the Windows Recovery CD should be able to do but can t e Edit text files While Microsoft has shied further and further away from allowing you to configure anything with a text file there are still plenty of reasons why you might need to including fixes to the boot ini files beyond the abilities of the Windows Recovery CD e Copy toa floppy You can t edit a text file in the Recovery Console so you may think PIH just copy the file to a floppy disk edit it on another computer and copy it back However the Recovery Console only allows you to copy from CD ROMs or floppies and not to them e Browse your full hard disk With the Windows Recovery CD you are only allowed to browse the root directory C for instance or the systemroot directory the WINNT or WINDOWS directory If you stray from those two directo ries to access your My Documents directory you get the Access Denied error message Fortunately Knoppix makes up for the Windows Recovery CD s shortcom ings This chapter covers how to repair many of the common problems that 253 HACK 87 Fix the Windows Boot Selector plague Windows systems including how to fix the boot ini file scan for viruses reset lost passwords and even edit the Windows registry After you read this chapter you will s
128. virtue in Morphix land One command is all it should take to re build a module A Look at a Module Generator MMaker is a tool under development at the moment but it is quite simple in nature Using a so called template an XML file with all the information about the module you want to build you can auto build a Morphix module mmaker mytemplate xml mymodule mod What MMaker does when you execute this command is debootstrap a new Debian filesystem using the details in the template set up the necessary mainmodule directories and install all packages specified in the template using APT to handle any dependencies Afterwards it compresses the whole bunch into a fresh new module ready to be added to a Morphix live CD in the usual manner As you might have guessed the template is the key to all of this Here is a sample template that is used for Morphix LightGUI lt comps gt lt groups gt lt version gt 0 5 lt version gt lt id gt lightgui lt id gt lt name gt Morphix LightGUI lt name gt lt repositorylist gt lt repository type debian gt ftp ftp debian org debian lt repository gt lt repository type plain gt http www morphix org debian lt repository gt lt repositorylist gt lt description gt Morphix LightGUI mainmodule Includes XFCE4 Firefox Abiword and a host of other goodies lt description gt lt type gt mainmod lt type gt lt suite gt sid lt suite gt lt packagelist gt lt packagere
129. with a DVD install but unlike most other OS installers you have a full set of applications you can use while the files are copying Once all the files are copied you have the option to create a boot floppy for res cue purposes in case the boot loader didn t install properly or you acciden tally delete or break the boot loader later After the installer is finished continue to use Knoppix from the disk or reboot into your newly installed Chapter 4 Install Linux with Knoppix 117 HACK 40 HACK 41 Install Knoppix as a Single Boot System Knoppix system Remember to remove the disk when you reboot and if everything goes well you should see a new boot logo 4 Install Knoppix as a Single Boot System Ready to take the plunge and use Linux as the sole operating system on your computer Then you need these instructions to know how to install Knoppix by itself on a computer Although it isn t always possible to install Knoppix on its own empty hard drive it certainly removes a lot of the complications that make installation tricky These steps guide you through installing Knoppix on a drive that is unpartitioned and brand new or that you are willing to commit entirely to Knoppix From a terminal window start the installer by typing knoppix ttypo knoppix sudo knoppix installer If this is an unpartitioned hard drive you are prompted to create a root and swap partition for Knoppix Choose the Partition option from
130. with improved performance To choose XFCE use the desktop xfce4 cheat code XFCE is organized into a panel at the bottom where you can launch com mon tools such as a terminal XFCE s file manager xffm a web browser and other applications To launch applications that aren t in the panel right click on the desktop to open the main menu You can change a launcher s settings by right clicking on it in the panel You can also right click on other parts of the panel to add new items such as launchers pagers and other programs see Figure 2 16 Along the top of the desktop is the taskbar where you can see and switch between all open applications on the current desktop Right click on one of the applications in the taskbar to get extra options such as the ability to maximize close and hide the program 68 Chapter 2 Use Your Knoppix Desktop Try Other Desktop Environments Figure 2 16 Default XFCE desktop XFCE provides a graphical configuration tool you can access by clicking on the wrench icon in the panel This program lets you configure anything from the desktop background to key bindings screensaver settings and the task bar Click the User Interface icon to open the theme manager where you can configure the look and feel of XFCE To log out of XFCE click the power icon on the panel or right click on the desktop and choose Quit For more information about XFCE visit the offi cial page at http
131. worst sentence for a system administrator to hear is The server has been hacked If you take pride in the systems you run finding out some vandal is having his way with your server makes you feel well violated When your system gets hacked and you want to track down the attacker or at least how he hacked it you must collect forensics data from the server An excellent tool for collecting forensics data is the Coroner s Toolkit http www porcupine org forensics tct html Two of the tools from this toolkit unrm and lazarus are covered in Recover Deleted Files Hack 71 The tool you should use to collect forensics data is called grave robber Grave robber scans the system and collects as much useful information as it can and it collects a lot so that it can be pored through at a later date You want to get as much data from the current state of the computer as possible if you need to format and put the system back into service quickly you can still see the state at which the machine was compromised because of a system compromise it is best to keep the com puter powered off and contact law enforcement so that you don t risk compromising their investigation by your own intelligence gathering F4 If you have any plans to prosecute or take other legal action Sleuthkit and the Coroner s Toolkit Recent versions of Knoppix have removed TCT The Coroner s Toolkit in favor of the Sleuthkit set of tools http www s
132. you can create data and audio CDs and DVDs through an easy to use interface reminiscent of popular Windows alternatives like Nero Of course you can t burn to a CD if Knoppix is in your only CD drive so use of this application does require that you either run Knoppix from a second optical drive or if you have only a single CD ROM drive that you use one of the cheat codes that free up the CD ROM drive in Hack 6 After launching K3b you can choose to create an audio CD a data CD a DVD or copy an existing CD K3b has a simple interface that lets you drag and drop files into the project that you would like to use If you are creating audio CDs you can drag and drop MP3s or other supported audio files onto a project and K3b converts them to the proper format Once you have selected all of the files you want to burn click the Burn button in the bot tom righthand corner of the window to write the files to CD lusting after your Knoppix setup Give them what they desire Just click Tools gt CD gt Burn CD Image and browse to a Knoppix ISO on a mounted filesystem to create another copy of Knoppix RK Right about now your fellow subway passenger is probably Watch Videos Knoppix also allows you to view many different video files that you might have on your system Unfortunately DVDs and certain other proprietary video files like QuickTime mov files cannot be fully played by default under Knoppix This is because of legal is
133. you can format it with the filesystem of your choice with knoppix ttyo knoppix sudo mkfs t ext3 dev mdo not overwrite all of the files on that partition yet and you are safe to format the new RAID partition and copy files to it RK Since dev hda1 is not yet added to the array the RAID does Next create a temporary directory to mount the new RAID then mount the RAID and the original partition read write Once these are configured copy the system over to the RAID using the same method covered in Hack 74 knoppix ttyo knoppix sudo mkdir mnt temp knoppix ttyo knoppix sudo mount o rw dev mdo mnt temp knoppix ttyo knoppix sudo mount dev hda1 mnt hda1 knoppix ttyo knoppix cd mnt hda1 knoppix ttyo hda1 sudo sh c find xdev printo cpio paOV mnt temp Once the copy process finishes you will need to create an etc mdadm mdadm conf file One of the easiest ways to do this is to run a special mdadm Chapter 6 Repair Linux 231 HACK 77 Migrate to Software RAID command to dump all of the information about the arrays you have created into Knoppix s sample mdadm conf file then copy that file to your system in this example the RAID partition is on mnt temp sudo sh c mdadm detail scan gt gt etc mdadm mdadm conf sudo mkdir p mnt temp etc mdadm sudo cp etc mdadm mdadm conf mnt temp etc mdadm Now edit mnt temp etc fstab and make sure the entry for dev hdal1 is chang
134. you don t like any of the color scheme choices create your own Simply pick a color scheme to start from and change individual widget colors from the Widget Color section to the right Once you finish tweaking the color settings click Save Scheme to save your changes 36 Chapter 2 Use Your Knoppix Desktop Customize the Desktop Look Gi Background Control Center File View Settings Help gt re 8 Appearance amp Themes Setting for desktop All Desktops Background m Background 5 Colors O No picture T Fonts E Icons Picture background Launch Feedback W Screen Saver Set Splash Screen t Style J Theme Manager Mh Window Decorations Position Scaled x SB Desktop Internet amp Network Colors Vertical Gradient z amp KDE Components a E l Advanced Options S Peripherals Get New Wallpapers Power Control gt Regional amp Accessibility Security amp Privacy Sound amp Multimedia System Administration O Slide show Options Blending No Blending 7 Help Defaults l Figure 2 4 Background options Every user has favorite fonts Though Linux lacks many of the fonts avail able on Windows most people don t know this but fonts are copyrighted and cost money it does have a large selection of community created fonts some of which you can find on Knoppix The Fonts
135. your system for misplaced files Help Launches the KDE Help Center a useful program for getting KDE specific help and asking questions such as How do I resize my panel Home Personal Files Opens your home directory in the Konqueror file manager Below the application section of the K Menu is the actions section which organizes a few special purpose menus for KDE Bookmarks Allows you to quickly access and edit bookmarks both in the Kon queror and Firefox web browsers Quick Browser Similar to the bookmark submenu it provides quick access to your file system in a menu form Click on one of the directory icons to launch Konqueror in that directory 32 Chapter 2 Use Your Knoppix Desktop Explore the Desktop Run Command Opens a window that lets you type in a quick command you want to run without having to open a full shell The keyboard shortcut Alt F2 brings up the same dialog Switch User KDE allows fast switching between different desktop users but since there is only a single user on the default Knoppix desktop there are no other users to switch to Lock Session Locks your screen requiring a password to get back in Because Knop pix doesn t use passwords by default this feature has been disabled since Knoppix 3 2 Log Out Launches the log out dialog which lets you log out of the desktop reboot or halt the machine The K Menu is worth some time Browse through the different categories and
136. 0 on etho and 192 168 1 on eth1 Run ifconfig and you should get the following output knoppix ttyp1 knoppix sbin ifconfig etho Link encap Ethernet HWaddr 00 DE AD BE EF 00 inet addr 192 168 0 5 Bcast 192 168 0 255 Mask 255 255 255 0 UP BROADCAST RUNNING MULTICAST MTU 1500 Metric 1 RX packets 6918 errors 0 dropped 0 overruns 0 frame 0 TX packets 4678 errors 0 dropped 0 overruns 0 carrier 0 collisions 0 txqueuelen 1000 RX bytes 675976 660 1 KiB TX bytes 447963 437 4 KiB Interrupt 9 Base address 0xb800 eth1 Link encap Ethernet HWaddr 00 CO FF EE 00 00 inet addr 192 168 1 5 Bcast 192 168 1 255 Mask 255 255 255 0 UP BROADCAST RUNNING MULTICAST MTU 1500 Metric 1 RX packets 4933 errors 0 dropped 0 overruns 0 frame 0 TX packets 4988 errors 1 dropped 0 overruns 0 carrier 0 collisions 0 txqueuelen 1000 RX bytes 496574 484 9 KiB TX bytes 749568 732 0 KiB Interrupt 3 Base address 0x100 lo Link encap Local Loopback inet addr 127 0 0 1 Mask 255 0 0 0 UP LOOPBACK RUNNING MTU 16436 Metric 1 Chapter 5 Put Knoppix in Your Toolbox 141 HACK 49 Create an Emergency Router RX packets 33 errors 0 dropped 0 overruns 0 frame 0 TX packets 33 errors 0 dropped 0 overruns 0 carrier 0 collisions 0 txqueuelen 0 RX bytes 3016 2 9 KiB TX bytes 3016 2 9 KiB These networks already have a default route set up for each of these inter faces which you can see by running the route command knoppix ttyp1 knoppix route Kernel IP
137. 0 hardware 23 copying settings 192 194 kernels copying 193 Kismet 161 LISa 138 loopback files 78 MD5sum 8 modems 57 mouse settings 18 NAT 143 nessus tool 167 NX Thin Clients 96 openMosix kernels 317 partitions 115 117 root 118 swap 118 passwords resetting 239 persistent disk images 77 79 pixels 17 postfix mail servers 151 printers 44 45 PXE 195 RAID 227 230 root passwords 34 routers emergency 139 146 RPM packages 245 servers Samba 147 webcams 197 sound 51 TV tuner cards 55 virtual machines 248 web browsers for kiosks 86 web servers emergency 148 372 Index wiki platforms 198 200 Windows backing up 256 258 connecting Internet 55 with GPRS Bluetooth 57 62 nessud servers 168 networks joining wardriving 165 packet sniffers 304 partimage tool 183 remote desktops 129 133 consoles cheat codes 18 contact management OpenOffice org 42 43 contributions 331 converting Debian 122 124 servers VMware 247 252 copying 192 194 application settings 82 CDs 13 disk images 181 files 120 hardware settings 192 194 KDE settings 80 kernels 246 tarballs 101 Coroner s Toolkit 176 180 corrupted file systems troubleshooting 211 214 cpio method 224 crackers 292 309 Credits tab nessus tool 172 cryptography 293 Cumming Mark 290 customizing CDs autobuilding Morphix 356 358 automating 351 353 modifying languages 358 Morphix 353 356 upd
138. 00 init etc init apm power off nomce vga 791 initrd miniroot gz quiet BOOT_IMAGE knoppix In this section of the file you can see that it defaults to using the vmlinuz kernel we mentioned above and uses an nfsdir cheat code to refer to the NFS share that Knoppix created to host the full disk If you look further you can also see the reference to the miniroot gz image it uses If your pxelinux server does not yet have a default image it uses you could just copy the default file directly to your pxelinux cfg directory Otherwise you will want to cut out the above section of the configuration and add it to Chapter 5 Put Knoppix in Your Toolbox 195 HACK 62 HACK 62 Add Knoppix to Your PXE Boot Environment an appropriate pxelinux cfg file based on the MAC of the machines you want Knoppix to boot on Next copy over the boot msg german kbd logo 16 miniroot gz and vmlinuz files to the root of your tftp server often tftpboot Of course if you already have files there with that name particularly vmlinuz and miniroot gz you will want to rename the Knoppix versions If you do rename them be sure to also rename any references to them in the pxelinux cfg directory The largest change you will need to make is related to the NFS server Knop pix will need the contents of the disk available via NFS Now you don t need the NFS server to reside on the same machine as your PXE server but it will need to be accessible over the
139. 00BB 00CAA1 ATA DISK drive hdb WDC WD300BB 00AUA1 ATA DISK drive hdc SAMSUNG DVD ROM SD 612 ATAPI CD DVD ROM drive ideo at Ox1f0 0x1f7 0x3f6 on irq 14 ide1 at 0x170 0x177 0x376 on irg 15 hda attached ide disk driver hda host protected area gt 1 hda 195371568 sectors 100030 MB w 2048KiB Cache CHS 193821 16 63 hdb attached ide disk driver hdb host protected area gt 1 hdb 58633344 sectors 30020 MB w 2048KiB Cache CHS 58168 16 63 Partition check hda hda1 hda2 hda3 hdb hdb1 hdb2 hdb3 usb c registered new driver hiddev usb c registered new driver hid input USB HID v1 00 Mouse Microsoft Microsoft IntelliMouse Explorer on usb1 2 0 Linux Tulip driver version 0 9 15 pre12 Aug 9 2002 etho Lite On PNIC II rev 37 at 0x1000 00 A0 CC 32 BF 88 IRQ 5 This output shows which IDE devices Linux has detected whether DMA has been enabled in the BIOS the size of any hard drives it has found and which partitions it has found on those drives Further down I can see that it has detected my USB mouse and my Ethernet card While this output can be useful you might want more in depth information about specific hardware on your system In particular you might want to find out which PCI devices Knoppix has found on the system You could scan through the PCI bus by looking through the files under proc bus pci but an easier way is to use the lspci tool Lspci lists all of the PCI buses in a system with any devices
140. 05 207 restoring grub to MBRs 203 205 restoring lilo to MBRs 202 searching partitions 207 209 tar command 221 223 Memtest86 23 26 nessus tool 173 Windows backing up files and settings 256 258 backing up registries 264 267 bootloaders 254 256 downloading patches 272 resetting passwords 261 264 resizing file systems 258 261 restoring system files 267 269 running on Intel based systems 273 275 Tor 109 scanning for viruses 269 272 toram cheat code 13 TV tuner cards configuring 55 Toys submenu 32 tzselect program 12 translation configuring NAT 143 troubleshooting Index 389 U las NESCO United Nations Educational Scientific and Cultural Organization 279 nionFS see Aufs nited Nations Educational Scientific and Cultural Organization see UNESCO Unix inetd daemon 156 unmounting 29 unstable branch Debian 113 converting to 122 124 updating grub 122 kernels 6 Linux installing from CDs 126 packages 108 349 USB drives 49 putting Knoppix on 367 368 USB to serial adapters wardriving hardware 159 User Rules tab nessus tool 171 utilities see tools Utilities submenu 32 V van Rein Rick 24 variables DISK 217 lcp echo interval 62 RESTOREDIR 217 verifying gpsd 160 versions Freeduc 280 INSERT 286 L A S Security 288 Morphix 277 obtaining latest 6 vertical refresh rates 17 vesa module 17 video 50 55 cards detecting 16 18 conf
141. 1 sleep 1 cardctl insert 1 sleep 1 ifconfig 2 down ifconfig 2 hw ether bin cng_mac ifconfig 2 up Chapter 5 Put Knoppix in Your Toolbox 165 HACK 54 HACK 55 Audit Network Security Use run_wardrive where 0 is the PCMCIA slot containing your wireless card and atho is the network interface knoppix Knoppix sudo run_wardrive 0 atho Put both of those scripts in the dist bin directory of your persistent home directory or create dist bin with mkdir dist bin if it doesn t already exist and give the scripts executable permissions knoppix Knoppix chmod a x dist bin cng_mac dist bin run_wardrive Jake Appelbaum Audit Network Security Use the nessus tool under Knoppix to perform a security audit on your network Being a system administrator is 90 percent boredom and 10 percent abso lute panic When a virus or worm infects your network or a new exploit is announced you want to confirm that all of your machines are patched and that none of your machines are vulnerable to any other known exploits To reduce your stress during those panic times put some of that 90 percent boredom to good use and audit your network for vulnerabilities To aid in network security audits Knoppix includes the nessus tool an excellent open source vulnerability scanner With nessus on Knoppix you can boot up on any machine on your network and perform an audit Nessus The nessus tool is actually split
142. 1 peripheral devices using 46 49 settings 192 194 support xix wardriving 159 Hello World program 98 help 29 65 Freeduc 280 Index 377 Help Center application 32 Help submenu 31 history of INSERT 285 hives 264 see also files Hogwash 297 home directory exporting desktop settings to 80 Home option 78 Home Personal Files application 32 Honeyd 299 honeypots S T D 290 314 horizontal refresh rates 17 hosts nessus tool 167 hotkeys FluxBox 313 hotsync KPilot 43 icat tool 214 216 iceape 88 Icedove email client 63 Iceweasel web browser 63 IceWM 68 278 icons desktop 29 modifying 35 IDE Intrusion Detection System 300 IEEE1394 drives 49 ifconfig command 141 165 images CDs booting from 15 copying 13 naming 7 disks copying 181 partimage tool 183 GIMP 47 languages modifying 358 partitions compressing 183 persistent disk creating 77 79 Imaze 50 Impress OpenOffice org 41 inetd Unix daemon 156 Info Center KDE 189 Init option 79 init services disabling 240 243 initrd tweaking without remastering 366 INSERT INside SEcurity Rescue Toolkit 284 287 Inside Security IT Consulting GmbH 285 INside SEcurity Rescue Toolkit See INSERT installing applications 362 with klik 104 106 to live disk 107 109 Frets on Fire 91 grub 203 kwiki 199 Linux from CDs 126 converting to Debian unstable branch 122 124 dual boot systems
143. 111 navigating 28 34 K Menu 30 33 panels 33 networks booting 94 96 creating NX Thin Clients 96 Nvidia 3D drivers installing 100 103 office tools 39 43 Kontact 42 43 OpenOffice org 39 42 personalizing 344 349 printers configuring 44 45 remote connecting with FreeNX 133 138 running 129 133 setup saving 75 79 Windows using settings 83 85 Desktop Sharing Wizard 133 detecting hardware 16 18 troubleshooting 19 RAID 229 RAM 20 developers 331 developing applications 97 99 Development submenu 30 devices peripheral saving settings 76 using 46 49 df command 214 DHCP running emergency 155 digital cameras see cameras Dillo 282 Direct Rendering Interface DRI 191 directories desktop settings exporting 80 disk images copying to 14 DocumentRoot 149 grave robber 178 mainmodule 357 My Documents backing up 257 linking 85 Program Files backing up 257 remastering 336 runlevels 241 sharing 148 WINNT 255 disabling hardware 19 init scripts 240 243 power management 20 sounds 348 DISK variable 217 disks images copying 181 creating persistent 77 79 live installing applications 107 109 space reducing 343 display settings optimizing 21 distccKNOPPIX 314 distributions Clusterknoppix 315 321 Damn Small Linux 281 284 Debian branches of 112 converting 122 124 distccKNOPPIX 314 Freeduc 279 281 GIS Knoppix 325 326 INSERT 284 287 KnoppMyth 3
144. 1179261515 Tue May 15 20 38 35 2007 If for some reason you have a large LVM configuration file and notice that the copy in etc lvm backup VolGroup00 seems truncated re run the above dd command but increase the value of count to 3 or higher and see if the full file gets copied this time With your LVM file in place now you can start the LVM service and check dev VolGroup00 for the volumes that were found sudo etc init d lvm start Setting up LVM Volume Groups Reading all physical volumes This may take a while Found volume group VolGroupoo using metadata type lvm2 2 logical volume s in volume group VolGroupoo now active sudo ls dev VolGroupoo LogVoloo LogVolo1 238 Chapter 6 Repair Linux HACK Reset Linux Passwords 81 In my case there are two volumes LogVol00 and LogVol01 Fedora created these volumes so that LogVol00 is my root partition and LogVol01 is my swap partition To mount LogVol00 I just need to create a place to mount it and then run the mount command like with any other partition sudo mkdir mnt LogVoloo sudo mount dev VolGroupo0 LogVoloo mnt LogVol00 if you didn t know that just try to mount each of the vol umes The mount command will error out safely if you acci dentally tell it to mount a swap partition RK I knew in advance that LogVol00 was my root partition but Now that the volume is mounted you can access it like any other partition Don t forget when you are finis
145. 2 Use Your Knoppix Desktop Get Office Work Done KMail is KDE s primary email application and supports retrieving email from multiple POP and IMAP email accounts Its integration into Kontact means that all the email addresses in the address book are easily accessible To add new contacts directly from an open email simply right click on the email address and select Add to Address Book The address book itself has fields for all the different types of contact information you might wish to store including a photo The Todo List and Calendar have all of the functionality you might be accustomed to in a Personal Information Manager PIM and they allow you to set appointments and integrate birthdays and anniversaries from your contacts The Journal allows you to keep a personal electronic journal with entries that can integrated into the Kontact calendar The last application within Kontact is KNotes which allows you to post bright yellow notes across your computer s desktop instead of your physical desktop KNotes keeps track of all your notes and records the date that each note was made something those paper notes won t automatically do for you If you happen to have a Palm PDA you can also integrate its information with Kontact via the KPilot program For Palm PDAs the KPilot program click K Menu gt Utilities gt KPilot should support your USB or serial cra dle without any extra configuration If you want to change
146. 245 246 247 253 254 256 258 261 264 267 269 272 273 276 277 279 281 284 287 290 314 315 322 325 326 329 viii Contents Chapter 9 Knoppix Remastered 000 00a ee 333 109 Create a Customized Knoppix 334 110 Trim the Fat 341 111 Personalize Knoppix 344 112 Keep Your Custom Disk Up to Date 349 113 Automate Knoppix Remastering 351 114 Morph Morphix 353 115 Auto Build Morphix Modules MapLab Tutorial Map 356 116 Change the Default Language on an ISO Image 358 117 Remaster Knoppix Without Remastering 360 118 Change Boot Defaults Without Remastering 363 119 Tweak the initrd Without Remastering 366 120 Put Knoppix on a USB Drive 367 WMO Seed ict oe ae che a E E ba a 369 Contents ix Foreword Apart from its applicability for everyday work GNU Linux is a great way to learn about operating systems The Free Software license allows you to take the software apart see inside and understand how it works You can also change the software to fit your needs It can make you feel like a child hap pily taking a colorful and complex toy apart into thousands of little gears and switches just to see how it functions disregarding the fact that it may be very difficult to ever reassemble that toy again The difference with GNU Linux of course is that you can work on a copy of the software source code and won t break the original And sometimes while reassembling you can build somet
147. 26 329 L A S Linux 287 289 Morphix 277 279 auto building 356 358 remastering 353 356 Musix 329 331 Quantian 322 324 remastering 334 340 S T D 290 314 DMA enabling 20 374 Index dmesg command 186 DNS Domain Name Service configuring 153 emergency running 155 documentation Memtest86 24 DocumentRoot directory 149 documents Damn Small Linux 283 Freeduc 280 My Documents backing up 257 linking 85 OpenOffice org 39 PDF creating 40 scanning 47 spreadsheets Calc 41 downloading bootstrapping code 94 chntpw tool 262 klik 105 Knoppix 7 Nvidia 3D drivers 102 packages 244 security patches Windows 272 dpkg tools 243 DRI Direct Rendering Interface 191 Driftnet 306 drivers installing Nvidia 3D 100 103 drives Aufs using 74 changes saving 75 79 cloning 180 184 files rescuing from damaged 217 221 formatting 120 migrating to 223 225 RAID adding extra to 235 USB putting Knoppix on 367 368 wiping 184 185 dsniff 306 dual boot systems installing as 120 122 duplicating Windows desktops 38 DVDs booting from 5 burning 54 Buying 9 downloading to 7 DVD only window managers 68 70 kiosk mode 87 Nvidia drivers installing 101 remastering partitions 334 RAM 335 E e2fsck tool 212 ed command 267 editing boot ini files 255 Musix 329 331 registries 264 265 sounds 53 editors Quantian 323 Editors submenu 31 educational games Freeduc 280 Eff
148. 4 Moving inversions random pattern Test 4 uses the same algorithm as Test 1 but the data pattern is a ran dom number and its binary complement This test is particularly effec tive in finding difficult to detect errors that vary depending on what data is written to RAM A total of sixty patterns are used The random number sequence is different with each pass so multiple passes increase effectiveness Test 5 Block move sixty four moves This test stresses memory by using block move movsl instructions and is based on Robert Redelmeier s burnBX test Memory is initialized with shifting patterns that are inverted every eight bytes Then 4 MB blocks of memory are moved around using the movsl instruction After the moves are completed the data patterns are checked Because the data is checked only after the memory moves are completed it is not possible to know where the error occurred The addresses reported are only for where the bad pattern was found Since the moves are constrained to an 8 MB segment of memory the failing address will always be less than 8 MB away from the reported address Errors from this test are not used to calculate BadRAM patterns Test 6 Moving inversions thirty two bit pat This is a variation of the moving inversions algorithm that shifts the data pattern left one bit for each successive address The starting bit position is shifted left for each pass To use all possible data patterns thirty two passes are
149. 44 CONNECT Jun 10 06 47 55 Knoppix chat 2244 got it Jun 10 06 47 55 Knoppix chat 2244 send d Jun 10 06 47 56 Knoppix pppd 2153 Serial connection established Jun 10 06 47 56 Knoppix pppd 2153 Using interface pppo Jun 10 06 47 56 Knoppix pppd 2153 Connect pppO lt gt dev modem Jun 10 06 47 57 Knoppix pppd 2153 Warning secret file etc ppp pap secrets has world and or group access Jun 10 06 47 58 Knoppix pppd 2153 Warning secret file etc ppp pap secrets has world and or group access Jun 10 06 47 58 Knoppix pppd 2153 PAP authentication succeeded Jun 10 06 48 13 Knoppix pppd 2153 local IP address 208 54 116 45 Jun 10 06 48 13 Knoppix pppd 2153 remote IP address 10 6 6 6 Jun 10 06 48 13 Knoppix pppd 2153 primary DNS address 66 94 25 120 Jun 10 06 48 13 Knoppix pppd 2153 secondary DNS address 66 94 9 120 Connection Errors If the connection is successful but then you get disconnected you may notice an error in the pppd log that looks something like this Jun 10 06 49 58 Knoppix pppd 2153 No response to 4 echo requests Jun 10 06 49 58 Knoppix pppd 2153 Serial link appears to be disconnected Chapter 2 Use Your Knoppix Desktop 61 HACK 21 Explore the Internet Jun 10 06 49 59 Knoppix pppd 2153 Connection terminated Jun 10 06 49 59 Knoppix pppd 2153 Connect time 2 1 minutes Jun 10 06 49 59 Knoppix pppd 2153 Sent 23896 bytes received 93053 bytes To fix this error you
150. 5 KNOPPIX_V5 1 1CD 2007 01 04 EN iso Compare the MD5sum you generate to the corresponding md5 asc file from the mirror If both match you have a complete ISO and are ready to create a CD You can burn the Knoppix ISO to a CD or DVD using your favorite disk burning software It is important that you select the Burn Image or an equiv alent option on your disk burning software Do not select the option to burn a data CD or DVD you will end up with a CD or DVD containing a single ISO file which will not boot 8 Chapter 1 Boot Knoppix Use Knoppix Cheat Codes Buy a Knoppix Disk If you don t have an unmetered broadband Internet connection or you don t have a CD or DVD writer or you simply don t want to bother with downloading and burning a disk you can receive a Knoppix CD or DVD through the mail from a number of third party vendors There is a list of vendors to choose from at http www knopper net knoppix vendors index en html These vendors are unaffiliated with the Knoppix project itself and also offer other Linux distributions on CD and DVD When ordering make sure that the version the vendor is offering is the latest version by comparing its release date with the latest release on one of the Knoppix mirrors You can purchase a Knoppix CD for 1 50 or a DVD for 5 plus shipping which is a small price to pay if you want to avoid the hassle of downloading and burn ing a disk Use Knoppix Cheat Codes Cheat codes are
151. 8 C Contents FORBWONG 3c cag Ou ata Seek eats SASS a E E E A A ERS xi COONS Lee rasera a a ENEE O NERE NE ANE ETE XV Prelate crossan A E RA E EE R EY xix Chapter 1 Boot Knoppix 00 00 c cece cee eee 1 1 Boot Knoppix on a Desktop 2 2 Boot Virtualized Knoppix 5 3 Get Knoppix 6 4 Use Knoppix Cheat Codes 9 5 Speak Different Languages 11 6 Free Your CD to Make Knoppix Run Faster 13 7 Straighten Out Your X Settings 16 8 Use Advanced Knoppix Cheat Codes 19 9 Run Knoppix on a Laptop 21 10 Explore Expert Mode 22 11 Check RAM for Errors with Memtest86 23 Chapter 2 Use Your Knoppix Desktop 008 27 12 Explore the Desktop 28 13 Customize the Desktop Look 34 14 Get Office Work Done 39 15 Configure Your Printer 44 16 Use Peripheral Devices 46 17 Have Fun and Play Some Games 49 18 Rock Out with Knoppix Multimedia 50 19 Connect to the Internet 55 20 Connect to the Internet with GPRS Bluetooth 57 21 Explore the Internet 62 22 Get Help 65 23 Try Other Desktop Environments 66 24 Become Root 70 Chapter 3 Tweak Your Desktop 0 00 cece eee 72 25 Use Aufs 72 26 Create Persistent Knoppix Settings 75 27 Use Your Linux Desktop Settings 79 28 Use Your Windows Desktop Settings 83 29 Make a Kiosk 86 30 Make a Party Arcade 90 31 Network Boot Knoppix 94 32 Create a Knoppix Thin Client 96 33 Develop Applications 97 34 Install
152. 92 May root 0 May root 0 May root 0 May 6 04 6 04 6 04 6 04 6 04 6 04 47 47 47 47 47 47 Kismet May 06 2007 1 Kismet May 06 2007 1 Kismet May 06 2007 1 Kismet May 06 2007 1 Kismet May 06 2007 1 Kismet May 06 2007 1 cisco CSV dump network weak xml six log files in my home directory Chapter 5 Put Knoppix in Your Toolbox 163 HACK 54 HACK 54 Wardrive with Knoppix You can look at the csv xml and network with any text editor and you can analyze the dump file with ethereal The weak file is used for the cap ture of weak otherwise known as interesting packets and can be ana lyzed with airsnort or other programs that are used with cracking WEP The storage of so called weak packets in a separate file can come in handy if you re low on space so you can delete the other files and keep just these to attack The gps file is an XML document that contains latitude longitude heading speed altitude and time markers When populated with correct information this file makes your Kismet data useful on a large scale You can overlay your network findings on a satellite map of the area or from other map sources Draw a Map of Your Wardriving Session You can easily map the findings of your wardrive or you can do this over GPRS while driving as in Hack 20 To make a map with a Kismet log con nect to the Internet then run knoppix Knoppix gpsmap v o Map
153. ACK 120 Put Knoppix on a USB Drive You will be using the syslinux boot loader to boot the USB key so rename the isolinux cfg file to syslinux cfg and delete the isolinux bin file you won t need it anymore mv mnt sda1 isolinux cfg mnt sda1 syslinux cfg rm mnt sda1 isolinux bin Now unmount the filesystem and then run syslinux against your USB drive to install the syslinux boot loader on the key umount dev sda1 syslinux s dev sda1 At this point you should be able to reboot the machine and boot off of your USB key One gotcha I found on both of my USB keys was that a default boot loader had not yet been installed on them so even after these steps all I saw was a blinking cursor The fix is to use the install mbr tool to write a default boot loader to the master boot record on the key install mbr dev sda Even though your USB key is ready to boot your BIOS may not be Like with booting from a CD ROM drive BIOSes often need to be configured to allow booting from USB devices While this varies with each BIOS boot into your BIOS setup screen with the USB key inserted then go to the section where you can configure the boot order If your BIOS supports booting from USB you should see your USB device in the device list Move it above your hard drive and any other devices that might interfere and then save your changes When the system reboots you should be greeted with the default Knoppix boot screen method T
154. All Deleted Files The above method is fine when you have one or two deleted files you need to restore but what if you have an entire directory of deleted files It can be tedious to run this command over and over for every inode you need to restore Instead you can automate the process with a script that can read the output of fls and then restore all of the files and directories it sees The following script is an improved version of a restore script discussed in http forums gentoo org viewtopic t 365703 html Save this script as home knoppix restore bin bash DISK dev sda2 disk to scan RESTOREDIR home knoppix Desktop recover directory to restore to mkdir p RESTOREDIR 216 Chapter 6 Repair Linux HACK Rescue Files from Damaged Hard Drives 72 cat 1 while read line do filetype echo line awk print 1 filenode echo line awk print 3 filenode filenode filenode filenode filename echo line cut f 2 echo filename if filetype d d then mkdir p RESTOREDIR filename else mkdir p RESTOREDIR dirname filename icat f ext r s DISK filenode gt RESTOREDIR filename fi done Change the DISK and RESTOREDIR variables to point to the drive to recover from and the directory to restore to respectively Once this script is saved in a file give it executable permissions and then run it with your list of deleted files as an argument
155. Also e The official DSL home page at http vwww damnsmalllinux org John Andrews T3 INSERT Security Here i 2018 INSERT or the INside SEcurity Rescue Toolkit is a small Knoppix based distribution with a focus on security It can fit on a bootable business card CD or on a 64MB USB key drive but still includes many useful tools for virus scanning network analysis computer forensics and disaster recovery INSERT is a specialized live CD and its outstanding feature is size INSERT is about 60 MB which makes it ideal for downloading and placing it on a credit card sized CD ROM to be carried on the go INSERT is targeted at the Linux professional and system administrators It carries all well most of the tools the user needs to recover a damaged sys tem from a crash transfer files perform network analysis and assist in com puter forensics tasks See the following table Requirement Purpose Window manager FluxBox File manager Emelfm Midnight Commander Web browser Links hacked FTP client AxyFTP Iftp Virus scanner clamav with avscan frontend xfprot for F Prot Network analysis Nmap tcpdump smb nat Disk management Parted gpart dd rescue testdisk lilo grub cfdisk Backup Dvd rw tools cdrecord partimage BashBurn burncenter 284 Chapter 8 Knoppix Reloaded INSERT Security Here Requirement Purpose Filesystem support EXT2 EXT3 MINIX Reiser4 ReiserFS JFS XFS NTFS FAT FAT32 AFS CIFS NCPFS
156. B Mouse ZAxisMapping buttons 4 and 5 USB Mouse Buttons 5 XINPUT Adding extended input device USB Mouse type MOUSE X outputs warnings and errors in the files starting with WW and EE respectively To see warnings and errors type the following command egrep WW EE var log Xorg 0 1log Knoppix also attempts to enable hardware 3D acceleration if possible using Direct Rendering Interface DRI Knoppix falls back to software 3D acceler ation if hardware acceleration isn t possible Check the current status of DRI with the glxinfo command This command outputs a lot of information about the GLX libraries on the system You can use grep to display just the line showing whether DRI and therefore 3D acceleration is enabled glxinfo grep direct rendering direct rendering No Note that all recent Nvidia cards do not have 3D acceleration enabled by default To enable 3D acceleration for these cards you must install Nvidia s own kernel modules and X drivers with the Knoppix live software installer Hack 34 Once the install finishes and X restarts direct rendering is enabled Network cards Testing network cards on the system is pretty simple just browse the Web or the intranet Obviously if you can ping other hosts on the network or browse an external web site then your network card works However view more detailed information about your network card configu ration by using the ifconfig utility s
157. BadRAM patterns 24 behavior advanced cheat codes 19 20 beryl 10 BIND configuration 155 bioinformatics Quantian 323 BIOS modifying boot order 2 Bit Fade tests 26 Bittorrent 7 blockall scripts 297 Bluetooth connecting to the Internet with 57 62 Bookmarks menu 32 boot code 205 BootCamp Apple 274 bootcfg tool 255 bootfrom cheat code 15 booting 2 5 BIOS modifying boot order 2 cheat codes 9 11 advanced 19 20 language 11 13 clients 319 dual boot systems installing as 120 122 from expert mode 22 from floppy disks 3 hardware detecting 16 18 INSERT 286 from Knoppix 5 1 1 CD 6 9 from laptops 21 MBRs restoring and backing up 205 207 restoring grub to 203 205 restoring lilo to 202 Memtest86 23 26 networks 94 96 Clusterknoppix 316 creating NX Thin Clients 96 optimizing 13 15 persistent disk images detecting 78 prompts 4 370 Index PXE 194 197 remastering modifying 363 366 single boot systems installing as 118 120 Smart Book Manager 3 starting from floppy disks 3 from Knoppix 5 1 1 CD 6 9 troubleshooting 19 242 virtualized Knoppix 5 see also starting boot ini files creating 256 editing 255 bootloaders grub 203 lilo 202 Windows troubleshooting 254 256 boot msg files 195 bootstrapping code downloading 94 branches of Debian distribution 112 browsers 63 anonymous browsing 109 111 kiosks configuring for 86 burnBX test 25 burning C
158. Click on this icon to display the K Menu which contains most of the graphical applica tions and some of the command line applications within Knoppix orga nized into categories such as Editors Games Internet and Settings see Figure 2 3 If you are new to KDE Linux or Knoppix you will want to explore each of the categories in this menu and get acquainted with how all of the applications on the CD are organized S Development Editors Z Emulators amp Games Graphics DD Help amp Internet KNOPPIX amp Multimedia Office S amp Settings System G Toys A Utilities Lost amp Found Control Center B Find Files Folders D Help Home Personal Files Actions v I Bookmarks 4 lt Quick Browser DE DK EN ES FR IT UP NL RU Run Command a fe Switch User ra E Lock Session x Jo All Applications Gel Q AA 3 3 index html Bals JOPPIX Webseite vyvrvvYYy rrr yy ry 2 F Knoppix 5 1 0 Konqueror 4 Figure 2 3 The K Menu At the top of the K Menu is a section reserved for recently used applica tions As you run programs from within the K Menu their icons show up in this section to provide quick access if you wish to run them again Below this section is the applications section with submenus for each of the follow ing items Development Contains applications specifically useful for programming 30
159. Configure Konqueror select Java JavaScript in the settings window that appears select the JavaScript tab and next to Open new windows check Deny to block all pop up windows or Smart to intelligently block unrequested pop up windows If you really want to be annoyed check Ask and your Internet browsing will be constantly interrupted by a dialog asking you if you want to allow a new pop up That s almost as annoying as using Internet Explorer Knoppix also comes with the Iceweasel web browser a renamed version of Firefox As a browser Iceweasel touts excellent standards compliance and supports tabbed browsing if you press Ctrl T or middle click a link Icewea sel also supports pop up blocking by default Email and News Readers To read your email use the Icedove email client a renamed Thunderbird Run Mozilla Mail from the Internet menu just like Iceweasel Icedove fully supports POP and IMAP mail servers and the first time you start it you are presented with a wizard to configure your primary email account First enter your name and the email address you wish to use in the wizard s win dow and click Next The next window asks you whether you use a POP or IMAP server followed by your email account username Your ISP or net work administrator should have the information to fill out these fields Ice dove loads and checks for new email Icedove s interface is similar to most other basic email client
160. DRUK group http www ddruk com that allow people to upload and share their dance files It is simple to install pydance on Knoppix since it is already packaged up Just open a terminal and type sudo apt get update sudo apt get install pydance 90 Chapter 3 Tweak Your Desktop Make a Party Arcade After the package installs just type pydance in a terminal to start it The interface is pretty self explanatory see Figure 3 1 but by default it opens up in a regular window You will probably want to play the game full screened so hit the f key on your keyboard to toggle between full and non full screen MainsMenu sd LLIT Ger orio dante TUER Graphics by Joe amp Brendan Figure 3 1 The pydance window If the default interface isn t intuitive or you just want more documentation open usr share doc pydance manual html in a web browser This is the full pydance documentation and contains tips for how to add songs how to find compatible dance pads and other useful information By default pydance comes with three different songs but you can copy new songs to usr share games pydance songs If you look in that directory you can see that each song gets stored in its own directory Play a round or two on your keyboard to get the hang of it If you don t have a dance pad pydance will use the number pad on your keyboard The numbers corre spond to the different buttons you might see o
161. Desktop 67 HACK 23 HACK 23 Try Other Desktop Environments So if you want a fast desktop environment while still having a lot of window management features and don t necessarily need desktop icons and inte grated file managers Fluxbox is a window manager to try out IceWM IceWM http www icewm org is the other main desktop choice on the Knoppix CD and offers a desktop experience reminiscent of Windows 95 To boot into IceWM use the desktop icewm cheat code The standard task bar sits along the bottom of the desktop and in place of the Start button is a button labeled Debian that provides access to your programs like you might expect Unlike Windows 95 there are no desktop icons or the standard drag and drop file manager like you might expect Nonetheless IceWM is still a nice lightweight window manager and would be easy to use for any one coming from a Windows background DVD Only Window Managers In addition to these window managers the Knoppix DVD adds a large num ber of other window managers to choose from Instead of discussing all of them I will cover a few of the better known options below XFCE If you are interested in other window managers or desktop environments probably one of the first desktop environments to try is XFCE XFCE http www xfce org aims to be lightweight so you will get many of the familiar features of a full desktop environment such as a panel desktop icons and a taskbar but
162. Ds DVDs 54 business applications creating kiosks 86 90 buying Knoppix CDs DVDs 9 ByzantineOS 282 BZflag 278 bzImage file 246 C Calc OpenOffice org 41 calculators Damn Small Linux 283 calendars Kontact OpenOffice org 42 43 cameras 46 49 captive ntfs 286 cards wireless 159 CDs 279 281 applications deleting 341 344 burning 54 buying 9 Clusterknoppix 315 321 copying 13 customizing automating remastering 351 353 remastering 334 340 Damn Small Linux 281 284 desktops personalizing 344 349 distccKNOPPIX 314 downloading to 7 images booting from 15 INSERT 284 287 kiosk mode 87 Knoppix 5 1 1 6 9 L A S Linux 287 289 Linux installing from 126 Morphix creating with 277 279 multimedia applications 50 55 Nvidia drivers installing 101 packages updating 349 Quantian 322 324 S T D 290 314 Windows Recovery 256 certificates nessud servers 168 cfdisk 115 change cheat codes 364 Change Read Write Mode 29 255 264 chat applications 64 cheat codes advanced 19 20 booting 9 11 fb see fb cheat codes language 11 13 laptops booting from 21 performance optimizing 13 15 X settings 16 18 hecksums MD5sum 8 heops 302 hkrootkit 296 hntpw tool 262 304 registries backing up 264 267 chording 36 chroot command remastering 337 chroot environment 202 Ciscilia 304 clamav 286 296 clamd daemon 271 clearing MBRs 206 clients booting 319 klik installin
163. Example test Mapblast gif S 0 n 1 G t b r feather range u a B 3 feather scatter p q 0 e k Kismet May 11 2007 1 gps This command creates a GIF image with the name MapExample test Mapblast gif in your current working directory It uses the online Mapblast resource to download a given range of coordinates that cover the entire gps file Gpsmap color codes networks based on their given WEP status and whether a given node is in a factory state It makes a color map that displays the distance traveled and shows the range of networks based on strength at given points where the networks are still within range Refer to the key at the bottom of the map if the colors and symbols confuse you even if you find access points or probing clients you do not have a precise reading of where it is Without precise GPS readings there are many networks that you won t be able to plot onto a map wR Many city areas do not have positive GPS readings and thus Gpsmap accepts a number of options so you should read the manpage Some of the options such as scaling can take hours but most of the time it s a quick 30 second job Experiment By using filters you can make inter esting maps that show only access points that are open that are owned by people you know or that all have a given SSID or you can make up other wireless settings 164 Chapter 5 Put Knoppix in Your Toolbox Wardrive with Knoppix If you find wardriving to be i
164. For instance if you are boot ing on top of a system you no longer have to worry about whether the copy method spans filesystems because each filesystem is mounted under mnt only when you choose to mount it What to Do There are two different methods that I have used to migrate to a new hard drive each with its own advantages The first method is a combination of find and cpio and the second method uses rsync The find cpio method is Chapter 6 Repair Linux 223 HACK 74 HACK 74 Migrate to a New Hard Drive more complicated to remember and more difficult for network transfers but the files start transferring the moment you start the command The rsync method is simpler to remember and easy to set up for network transfers plus it has a more verbose progress bar and also easy to resume but must first scan through the filesystem which can take longer For completeness I will document both methods and you can choose the one you prefer find and cpio The first method to copy the filesystem combines find with cpio both are utilities that are standard on any Linux distribution includ ing Knoppix This example transfers a Linux installation from a single root partition on dev hdal to dev hdb1 which is a freshly formatted partition that becomes the new root partition knoppix ttyo knoppix ttyo knoppix ttyo knoppix ttyo knoppix sudo mount mnt hda1 knoppix sudo mount o rw mnt hdb1i knoppix cd mnt hda1 hd
165. GPRS cell phone connections ISDN and wireless network connections To configure these connection types click K Menu gt KNOPPIX gt Network Internet Chapter 2 Use Your Knoppix Desktop 55 HACK 19 Connect to the Internet The most common type of Internet connection for broadband Internet users or computers inside a corporate network is through a standard network card If this is the type of connection you use then you will find that when Knoppix boots it automatically brings up the network and attempts to grab an IP address with DHCP If you do not automatically get an IP via DHCP you must click K Menu gt KNOPPIX gt Network Internet gt Network card configuration to launch a program that will ask you questions about your network connection This configuration program will also let you enter a static IP address and other network information if your network does not use DHCP If your ISP assigned a username and password to use when you connect to your broadband Internet connection then you must set up PPPoE before you can connect to the Internet Click K Menu gt KNOPPIX gt Network Internet gt ADSL PPPOE configuration This application will attempt to detect PPPoE use on your network and then enter your username and pass word to connect to the ISP Once you finish the configuration application you will be connected to the Internet If you have an 802 11b wireless card connected to your computer Knoppix will att
166. I drive or a Software RAID to a regular disk change the file to reflect these changes Next if you use grub follow the steps in Hack 66 after the chroot command to restore grub to the new disk or if you use lilo then follow the steps in Hack 65 after the chroot command Examine etc fstab Next examine the etc fstab file and like with lilo or grub if any device names have changed between your physical server and your vir tual machine be sure to edit this file to reflect those changes Create a new initrd If your server uses an initrd file to boot many do then you will likely need to recreate the initrd file so that it contains the SCSI modules that VMware needs for its virtual SCSI controller First edit the etc modules conf or etc modprobe conf under Redhat 4 and remove any refer ences to scsi_hostadapter In their place put the following line if you have configured your virtual machine to use the BusLogic SCSI controller alias scsi _hostadapter BusLogic Or the following line if you configure it to use the LSI Logic SCSI controller alias scsi_hostadapter mptbase alias scsi_hostadapter1 mptscsih cal machine to another or migrating to a different virtualiza tion technology just change this step so that the SCSI driver your new machine uses is referenced here RK If you are following this guide but migrating from one physi Now locate the initrd your operating system used last If you aren t sure which file t
167. I will first talk about the desktop alternatives for the CD and then follow up with the choices for the DVD 66 Chapter 2 Use Your Knoppix Desktop Try Other Desktop Environments Fluxbox Fluxbox http www fluxbox org is a popular lightweight window manager that is rather different from KDE see Figure 2 15 For starters Fluxbox does not use desktop icons by default nor does it include a file manager like KDE s Konqueror Instead Fluxbox focuses on window management such as drawing borders on windows allowing you to resize and move them and Fluxbox s claim to fame tabbed windows Tabbed windows allow you to group different windows together in the same space and have them share a single titlebar split into tabs To view one window in a group click its sec tion of the titlebar Tabs allow you to fit a lot more windows into a smaller space and can be particularly useful on smaller displays Like with KDE Fluxbox provides a taskbar along the bottom of the desktop to display all of the current open windows From this taskbar you can also create new desktops and switch between them like with many other desk top environments One difference between Fluxbox and KDE is how you access the program menu In KDE you click the K gear icon on the taskbar In Fluxbox you can right click anywhere on the desktop Figure 2 15 Default Fluxbox desktop stripped down is the word for it Chapter 2 Use Your Knoppix
168. K 101 Full Protection with S T D daemon 1 1 daemon usr sbin bin sh bin 2 2 bin bin bin sh 1p 7 7 lp var spool 1pd bin sh mail 8 8 mail var mail bin sh news 9 9 news var spool news bin sh uucp 10 10 uucp var spool uucp bin sh proxy 13 13 proxy bin bin sh knoppix XTHmG8Z893Frc 1000 1000 Knoppix User home knoppix bin bash You can see straight away that only one password hash is actually in this data the KNOPPIX user we just set Now use john to crack the hash root ttypo knoppix etc john john crackme txt Loaded 1 password Traditional DES 24 32 4K knoppix knoppix guesses 1 time 0 00 00 00 100 1 c s 6400 trying knoppix KNOPPIX For the more advanced password cracker S T D also includes the following Ciscilia A distributed cracker that can take advantage of S T D s built in open MOSIX clustering This allows you to distribute the password cracking load across multiple machines to linearly speed up the process Chntpw One of the aforementioned reset password utilities Simply mount the NTFS partition read write point chntpw at the SAM file and follow the prompts The chntpw utility is covered in Hack 90 Sniffers Network cards NICs under normal operation ignore all packets that are not specifically addressed to them or to everyone via broadcasts How ever almost all NICs can be set to accept every packet of traffic on the wire by setting it into promiscuous mode A
169. K 14 HACK 14 Get Office Work Done Presenstation odp file format You can also export the presentation to a number of formats including PDF HTML and even Flash If you find you like OpenOffice org you can also download it for your Win dows desktop from the official site at you guessed it http www openoffice org Calendar and Contact Management Beyond the OpenOffice org suite of tools the Knoppix DVD has an applica tion called Kontact that can manage your calendar contacts and email and is very similar to Outlook Of course for these applications to be useful you must set up some sort of persistent home directory Create Persistent Knop pix Settings so your calendar and contact settings don t get lost when you reboot To run Kontact click K Menu gt Office Kontact Kontact integrates many smaller KDE components such as KOrganizer KMail and Knotes into a single groupware application You should see icons for the many different components on the left Click on one of the program icons to load it into the window on the right as shown in Figure 2 6 amp Summary Kontact Eile Settings Help Summary for Knoppix User Wednesday 18 July 2007 8 No appointments pending within the next day E No to dos pending E No special dates pending within the next 7 days w No unread messages in your monitored folders Figure 2 6 Kontact 42 Chapter
170. Knoppix developers whose work makes S T D possible e S H Sanders who held down the fort while I was making this submission e Karl Sigler for being the founder of the S T D project and writing the first version of this e Most of all my lovely wife to be Karen who puts up with my idiosyn crasies See Also e The S T D home page at hitp s t d org e Join the S T D forum for more discussion and help at http forum s t d org Mark Cumming 102 This Damn Small Linux based distribution is aimed at making it easy to set up a Cluster of machines running distccd which enables the user to leverage multiple machines for compiling i Distribute Compiles with distccKNOPPIX i I was first introduced to distcc while compiling Debian unofficial KDE CVS packages Distcc is a program that distributes builds of C C Objective C or Objective C code across several machines on a network I quickly installed distcc on my networked Linux systems and was happily using up unused cycles and speeding up my builds a great deal However the one Microsoft Windows system sitting idle as my compiles continued gave me an itch to investigate the possibility of using distcc on a Windows system Enter distccKNOPPIX distccKNOPPIX is a remastered live CD based on Damn Small Linux DSL It runs a distcc daemon as its sole task and is as portable as any Knoppix CD By taking advantage of some of the kernel options of Knoppix such as toram and
171. Knoppix install that dual boots with Windows This walk through assumes that Knoppix is being installed on a computer with a sin gle IDE hard drive containing a single Windows partition that fills the drive As in the single boot system example Install Knoppix as a Single Boot Sys tem Hack 41 start the Knoppix installer with the following command knoppix ttypo knoppix sudo knoppix installer You are prompted to create partitions for Knoppix to install to The entire hard drive is filled with a single Windows partition so you have no free space to create a partition Luckily you can resize your Windows partition with gtparted which can resize both FAT32 and NTFS partitions Resizing a partition can be risky and there is always a poten tial for data loss Before resizing any partition defragment the hard drive completely from within Windows otherwise a file fragment near the end of the partition might be deleted when the partition is resized Of course it is always a good idea to back up any important data To resize your hard drive from within gtparted select dev hda from the list of disks on the left side of the gtparted window then click on the dev hda1 partition listed on the right side and select Operations gt Resize In the resiz ing window that appears you can decide how much free space to leave after the partition In my experience I ve needed to create a root partition of 2 2 GB to have enough room for
172. MBR can be dangerous One typo or mistake can make your entire system unbootable or even erase your entire partition table Make sure you have a com plete backup of your MBR if not your full hard drive on other media like a floppy or anything other than the hard drive itself before you try any potentially destructive commands The MBR is very important and crucial for booting your system and in the case of your partition table crucial for accessing your data however many people never back up their MBR Use Knoppix to easily create backups of your MBR which you can later restore in case you ever accidentally over write your partition table or boot code It is important to double check each command you type as typing 466 instead of 446 can mean the difference between blanking the boot code and partially destroying your partition table Save the MBR First before you attempt anything potentially destructive back up the cur rent MBR Boot into Knoppix and type the following command into a terminal knoppix ttypo knoppix sudo dd if dev hda of home knoppix mbr_backup bs 512 count 1 Chapter 6 Repair Linux 205 HACK 67 Kill and Resurrect the Master Boot Record Change dev hda to match the drive you wish to back up In your home directory you should now see a 512 byte file called mbr_backup Dd is used to create images of entire hard drives Hack 58 and in this case a similar command is used however it contain
173. Most filesystem repair utilities require that Chapter 6 Repair Linux 211 HACK 70 Repair Damaged Filesystems the partition to be repaired is not mounted and for repairs to the parti tion it is necessary to use a repair disk such as Knoppix One advantage to using Knoppix for filesystem repair is that it includes tools to scan and repair all of the major filesystems under Linux on a single CD in addition to tools to check MSDOS partitions for consistency Besides a filesystem check on a 100 GB ext2 partition can take quite some time and Knoppix has a complete system full of other tools to pass the time while the filesystem check finishes The primary tool used to check and repair filesystems under Linux is fsck short for Filesystem Check If the power goes out while you are running a Linux system on an ext2 filesystem or a system freezes before you can unmount a filesystem this tool comes up and checks the filesystem on the next boot If an ext2 filesystem has a lot of corruption or is the root parti tion you might be prompted to boot into single user mode or boot onto a rescue CD and run a complete fsck from there on the unmounted filesys tem The fsck tool is actually a frontend to many filesystem specific repair tools located in sbin named fsck filesystem When you run fsck on a filesys tem it attempts to guess the filesystem and run the appropriate tool By default most fsck programs scan through the filesystem fo
174. N Hagen openHive sam failed Read only file system trying read only Hive s name from header lt SystemRoot System32 Config SAM gt ROOT KEY at offset 0x001020 output supressed blank the password This may work better than setting a new password Enter nothing to leave it unchanged Please enter new password If you want to reset the password for a user other than Administrator list the users in the SAM file with the 1 option knoppix ttyp1 config chntpw 1 SAM chntpw version 0 99 2 040105 c Petter N Hagen Hive s name from header lt SystemRoot System32 Config SAM gt ROOT KEY at offset 0x001020 Page at 0x6000 is not hbin assuming file contains garbage at end File size 262144 40000 bytes containing 5 pages 1 headerpage Used for data 218 16928 blocks bytes unused 4 3392 blocks bytes SAM policy limits Failed logins before lockout is 0 Minimum password length 0 Password history count 0 RID 014 Username lt Administrator gt BLANK password RID 01f5 Username lt Guest gt disabled or locked RID 03e8 Username lt HelpAssistant gt RID 03ea Username lt SUPPORT_ 388945a0 gt disabled or locked Hives that have changed Name None This example has four users Administrator Guest HelpAssistant and SUPPORT_388945a0 Pick the user you want to edit and then run chntpw with the u option knoppix ttyp1 config chntpw u username SAM Once you change th
175. NOPPEX 5 1 Press keys F2 or F3 for help and boot options KNOPPIX US 1 1 CD http www knoppix de RELEASE 2667 61 64 boot _ Figure 1 1 The Knoppix boot screen To boot directly into Knoppix either hit Enter or wait a few seconds and Knoppix will start the boot process At this boot prompt you can enter spe cial Knoppix cheat codes Hack 4 to control the boot process Press F2 and F3 at this prompt to display some of the cheat codes As Knoppix boots it displays colorful output while it detects your hard ware Once it has detected and set up your hardware it automatically launches into the desktop environment and finishes by opening a web 4 Chapter 1 Boot Knoppix HACK Boot Virtualized Knoppix 2 browser showing Knoppix documentation At this point you can launch programs browse the Web and play games When you log out of the desk top environment Knoppix shuts down and ejects the disk for you If you use a floppy to boot Knoppix remember to eject it or the next time you start your computer it will try to boot into Knoppix again hacks starting with Hack 4 which provide Knoppix hard ware detection hints Solve Knoppix Booting Problems of Hack 8 offers specific tips Boot Virtualized Knoppix f Try out the Knoppix DVD in a self contained virtualized environment on Windows without rebooting your computer Rad If Knoppix doesn t boot refer to the different cheat code While it
176. NOPPIX filesystem root ttyp1 hda1 mkdir master root ttyp1 hda1 rsync a cdrom master Change the desktop to your liking click K Menu gt KNOPPIX gt Configure gt Save KNOPPIX configuration and then copy the knoppix sh and configs tbz files the script creates to the master KNOPPIX directory You can skip the step of creating the compressed master KNOPPIX KNOPPIX filesystem and go straight to creating the new CD image root ttyp1 hda1 mkisofs pad 1 r J v V KNOPPIX no emul boot boot load size 4 boot info table b boot isolinux isolinux bin c boot isolinux boot cat hide rr moved o knoppix iso master After this command is completed you should see a new knoppix iso file in the root of your partition When this image boots Knoppix executes the knoppix sh script you have copied to the CD and unpacks your settings from configs tbz Complete Desktop Tweaks When Knoppix boots it runs a script located at etc X11 Xsession d 45xsession This script not only handles which window manager gets loaded when you boot but also copies configuration files from the etc skel direc tory to the home knoppix directory and even tells Knoppix to play the sound you hear when it loads the desktop environment Chapter 9 Knoppix Remastered 345 HACK 111 HACK 111 Personalize Knoppix To change desktop settings start the remastering process Hack 109 and go as far as the chroot section then follow the different
177. NSERT uses its own namespace which means that nearly all occurrences of KNOPPIX have been replaced with INSERT This was achieved by replacing the strings in all those scripts written by Klaus indeed not a very challenging task In developing INSERT one problem arose The CD didn t unmount at halt time Knoppix uses a customized version of init Therefore INSERT has to contain the correct path INSERT instead of KNOPPIX for the loop mount and it has to be statically linked so that it does not depend on the C library which resides under INSERT Chapter 8 Knoppix Reloaded 285 HACK 99 HACK 99 INSERT Security Here Size Most of the development effort in INSERT was spent in shrinking the size to under 50 MB which becomes approximately 120 MB uncompressed The first task was to remove all unnecessary packages Due to the many dependencies this was a time consuming task The next task was to remove files from the remaining packages including most of the documentation from usr share doc duplicate binaries mke2fs and mkfs e2fs for example and widely unused binaries like xclock Quite a few days and nights were spent removing these packages and files while still maintaining a working system The Inside Security PDF on the CD was shrunk to nearly half its former size by using the excellent Multiva lent PDF tools by Tom Phelps http multivalent sourceforge net To avoid placing duplicates in the main filesystem
178. OK the wizard will start the NX server configuration program and prompt you for a password for the knoppix user This password will be used at each terminal to connect to the main server You will then be prompted to choose what type of key pair to use For ease of use stick with the default here of using the NoMachine keys for the server Finally complete the configuration and start the terminal server To use this server on a thin client just boot up your thin client from the net work You will see the same Knoppix boot prompt you are accustomed to however once you boot you will see a login window for the NX client Here you will need to login with the same password you set when first configur ing the Knoppix terminal server Once you login you will see a full Knop pix desktop except unlike with the regular terminal server all of these programs are using the CPU and RAM of the remote server If you want to test this start a desktop application and then go back to the terminal server and type ps ef to see the list of processes on the system You should see that desktop application in the list of processes Again there are a lot of advantages to the thin client idea especially when you have machines with very limited resources Keep in mind though that this configuration will tax the terminal server more than usual so pick a machine with the most resources for this server Develop Applications Use KDevelop with all of the lang
179. PIX no emul boot boot load size 4 boot info table b boot isolinux isolinux bin c boot isolinux boot cat hide rr moved o knoppix iso master Once this command is completed you should see a new knoppix iso file in the root of your partition You can burn this to a CD that boots directly into kiosk mode Or if you prefer you can boot into the default KDE desktop if you use the following cheat code at the boot prompt desktop kde You have an advantage if you create a remastered kiosk CD You can follow the steps in Hack 31 to run a network of kiosks from a single Knoppix CD Just boot the first kiosk with the cheat code below so you can start the ter minal server desktop kde Chapter 3 Tweak Your Desktop 89 HACK 29 HACK 30 Make a Party Arcade Then if you want to turn that computer back to a kiosk type knoppix ttypo knoppix sudo sh c echo DESKTOP kiosk gt etc sysconfig desktop knoppix ttypo knoppix sudo init 2 amp amp sudo init 5 Make a Party Arcade i Add a few free games to a Knoppix CD and take the party with you Video games particularly games like Dance Dance Revolution or Guitar Hero can be particularly fun in a party setting Whether the crowd is full of experts or novices games like this bring out the performer in everyone Of course if the party you are going to doesn t have these games or even a game console then you are left either with bringing your full setup or doing
180. PIX CUSTOM iso To test the image reboot the computer and type knoppix bootfrom dev hda1 source KNOPPIX build Knoppix Master KNOPPIX CUSTOM iso at the boot prompt replacing hda1 with your partition and KNOPPIX CUSTOM iso with the name of the ISO file if you changed it Morph Morphix The modular nature of Morphix that has made it so popular also makes it very easy for a user to create custom disks Morphix Master Morphix is a Knoppix based distribution that has made many changes to the structure of Knoppix to make it more modular These modules make it much easier to add and remove software for your own remastering This hack takes a closer look at how Morphix is built how it can be changed and how you can have the modularity of Morphix make your life easier If you want to skip the details and dive into making your first morph jump down to Your First Morph later in this chapter Structure of a Morphix Live CD A Morphix live CD has a number of unique directories base mainmod minimod exec copy deb One difference in these directories is the file types the first three base mainmod and minimod are compressed filesystems modules the last three are provided for extra flexibility Morphix s modules can be com pressed using a number of compression techniques like cloop squashfs or zisofs Of course each of these directories has a special purpose which are described next base Th
181. Parted click K Menu gt System gt QTParted The QTParted window that appears has two main sections a left panel which contains all the disks on the sys tem and a right panel which displays partitions from the disk that you have selected on the left First select the disk that has the partitions to be resized from the left panel QTParted scans all of the partitions on that drive and displays them graphi cally along the top of the right panel Below the graphical display is a table that lists all the drive s partitions with information such as the partition s filesystem type size and used space If you need to delete a different parti tion to make room to resize this partition you must first delete the parti tion To delete a partition right click on the partition in the right panel Chapter 6 Repair Linux 209 HACK 69 Resize Linux Partitions either on the graphical representation or in the table and choose the Delete option The partition is not actually deleted until you commit your changes by clicking File Commit To resize a partition right click on the partition you want to resize and select Resize The window that appears allows you to drag the corners of the partition to increase its size or you can enter the new size manually in a lower textbox see Figure 6 1 Once the partition is resized to your liking click OK and then commit your changes Once you commit your changes the filesystem is official
182. Prefs system lock mnt hda2 usr lib j2re1 4 2 systemPrefs systemRootModFile Searching for LPD Worm files and dirs nothing found Searching for Ramen Worm files and dirs nothing found Searching for Maniac files and dirs nothing found Searching for RK17 files and dirs nothing found Searching for Ducoci rootkit nothing found Checking scalper not infected Checking slapper not infected Checking z2 nothing deleted Replace mnt hdal with the path to your mounted partition Scan the out put for any warnings worms or root kits Be careful for false positives par ticularly when chkrootkit is searching for suspicious files and directories Chapter 5 Put Knoppix in Your Toolbox 175 HACK 56 HACK 57 Collect Forensics Data Files are considered suspicious if they have a large number of system calls Certain files in my experience Java plug ins in particular trigger this scan If you are unsure simply double check the suspicious files for any strange code If you do find a root kit on your system consider all of the files on the sys tem suspect Back up important data and configuration files to audit later Hack 57 and reinstall your system You can never fully trust a system that has had root compromised so a reinstall is the safest option J3 Collect Forensics Data 57 When your computer is broken into use Knoppix to collect all of the forensics data for later analysis Possibly the
183. SB key drive and can use any generic Knoppix CD you hap pen to find Since the USB drive is more portable than a CD ROM you are probably more likely to have it in your pocket In a pinch you could boot up with your custom setup on a friend s Knoppix CD You can also make changes much more quickly with this method With a full remaster each change you make requires that you create another com pressed KNOPPIX filesystem which is time consuming and another iso With this method you just have to re run saveconfig or edit knoppix sh Also if you have come up with a really cool knoppix sh script it s much eas 362 Chapter 9 Knoppix Remastered HACK Change Boot Defaults Without Remastering 118 ier to make available on a web site for download compared to a complete custom Knoppix ISO Another advantage to this method is that you can maintain multiple knoppix sh scripts on a single USB drive Put the individual configs in their own directories and when you want to use one of them boot Knoppix and use myconfig dev sda1 directoryname With this method you can toggle between different settings without having to carry around multiple Knoppix CDs You can even burn a knoppix sh script to a Knoppix CD provided all of the other files remain the same Put the knoppix sh file and any tarballs or other files it needs into the KNOPPIX directory on the CD and it will execute the script when it boots I used this method when I created th
184. SL encryption of all gt traffic on the Desktop screen of the NX Connection Wiz ard and then reconnect The session should be very fast and you should be able to browse the Web write email and do your office work on it Indeed I do this regularly Wher ever I am I can connect to my PC at home and graphically read my email even if it s just a modem uplink The NX Technology How can NX achieve this speedup of X There are five major reasons Very efficient X Protocol compression The X Protocol is highly compressible Each X Request or Confirma tion has a fixed part and a variable part With Differential X Protocol Compression DXPC you can transmit what has changed only on the display instead of the complete desktop Caching of the protocol The X Protocol compression makes it possible to cache the data to improve responsiveness For example in VNC it takes equally long to open the same menu multiple times while NX sessions get faster with time For example the first time the menu opens in NX it takes some time but the second time the menu just pops up as if it were opened locally Also due to a disk cache this effect is also preserved if you start a new session Round trip suppression A round trip in the X11 protocol is a request plus the wait for confirma tion While you can increase bandwidth without problems it s not pos sible to reduce latency as the speed of light and in this case electricity has a m
185. This allows you to run commands such as apt get just as though source KNOPPIX were the root directory Although the network works from within the chroot environ ment all configuration files that Knoppix creates dynamically when you boot are not copied over in their modified state This means that to resolve domain names you must copy your etc dhcpdc resolv conf file over to source KNOPPIX root ttyp1 hda1 cp etc dhcpc resolv conf source KNOPPIX etc dhcpc resolv conf cp overwrite source KNOPPIX etc dhcpc resolv conf y To use other dynamic configuration files for instance etc samba smb conf for Samba you must copy those over as well before you chroot Now mount the proc filesystem this provides access to the network and other special interfaces within the kernel and chroot into the source KNOPPIX directory root ttyp1 hda1 mount bind proc source KNOPPIX proc root ttyp1 hda1 chroot source KNOPPIX root ttyp1 Chapter 9 Knoppix Remastered 337 HACK 109 HACK 109 Create a Customized Knoppix If you are remastering the KNOPPIX2 filesystem as well and followed the preceding steps to create a source UNIONFS merged filesystem then type chroot source UNIONFS instead Now you are in a chrooted environment Any command that you run will run as though source KNOPPIX is the root directory you have already chrooted press Ctrl D to exit out of chroot copy the files you need and then go back to the chro
186. WINDOWS operating systems multi 0 disk 0 rdisk 0 partition 1 WINDOWS Boot Windows fastdetect Enter this configuration into a blank boot ini file and when you reboot you should find that the boot selector is back with your default Windows settings Back Up Files and Settings 88 With all of the viruses worms and malware running loose on the Internet it is not uncommon for a Windows user to find that her system has become unusable Use Knoppix s Windows filesystem support to back up important files and settings when Windows can t boot There are many utilities on the market designed for backing up and restor ing files on Windows systems Windows even comes with its own backup software preinstalled These utilities are good only if you can actually use them however It is not uncommon for a virus or file corruption to leave you unable to use Windows or to boot into Windows Safe Mode Even using Microsoft s Windows Update can leave your system in an unusable state If you have not maintained your backups you might find yourself mournfully tallying up all the files you are about to lose The Windows Recovery CD doesn t provide you with much help in this circumstance either because you can t navigate outside the Windows systemroot folder usually WINDOWS or WINNT and even if you could you don t have many options for backing up your important data Don t worry You can use Knoppix to back up your important files ev
187. Your Toolbox Make an Emergency Mail Relay your mail and then create a symlink to point Knoppix to this storage In this example the extra storage is on dev hdal sudo mount o rw dev hda1 mnt hda1 sudo mkdir mnt hda1 postfix sudo 1n s mnt hda1 postfix var spool postfix If you are really in a pinch and don t have a Linux filesystem you can use you can create a temporary loopback filesystem on either USB storage or other FAT filesystem You just need to create a loopback file that will be large enough to store all of your potential mail For instance if I had a 2 GB USB key that appeared as dev sdal and I knew that 1 GB of storage was plenty for my mail the following commands would create my loopback file system and use it for mail storage sudo mount o rw dev sda1 mnt sda1 sudo dd if dev zero of mnt sda1 postfix bs 1M count 1024 sudo mkfs t ext3 mnt sda1 post fix sudo mkdir var spool postfix sudo mount o loop mnt sda1 postfix var spool postfix Replace count 1024 with the number of megabytes you wish to make your filesystem Configure Postfix The next step is to install and configure the postfix mail server I have cho sen it because it is very simple to set up as a backup mail server and takes up minimal space on the ramdisk sudo apt get update sudo apt get install postfix As the postfix package installs you will run through an interactive configura tion tool to set up postfix for t
188. _USER NTuser dat HKEY_LOCAL_MACHINE SAM SAM HKEY_LOCAL_MACHINE SECURITY SECURITY HKEY_LOCAL_MACHINE SOFTWARE SOFTWARE HKEY_USERS DEFAULT DEFAULT Edit the Registry Once you decide which registry keys you need to edit and which hive they are in open a terminal and change to the directory containing that hive s file For this example I changed the value of my SystemRoot registry key to point to E WINDOWS instead of D WINDOWS because I changed my partitioning scheme so had to move my WINDOWS directory to a different partition To find the location of your registry keys browse in chntpw browse regedit under Windows or search the Web for information about the location of your key In my case the key is located under the registry directory HKEY_LOCAL_MACHINE SOFTWARE Microsoft Windows NT CurrentVersion I must open the corresponding hive file SOFTWARE with chntpw noppix ttyp1 config chntpw e SOFTWARE chntpw version 0 99 2 040105 c Petter N Hagen Hive s name from header lt emRoot System32 Config SOFTWARE gt ROOT KEY at offset 0x001020 Page at 0x7f2000 is not hbin assuming file contains garbage at end File size 8388608 800000 bytes containing 1967 pages 1 headerpage Used for data 166446 8253944 blocks bytes unused 1069 10280 blocks bytes Simple registry editor for help 1020 gt The last line is a command prompt that accepts a limited number of shell like commands to browse through the registry
189. a or the data on your drive is valuable enough to be worth the effort of an attacker to recover after a full shred then the only way you can ensure that your data cannot be recovered is to take out the hard drive hit it multiple times with a sledgehammer and then burn it Seriously Compare a hard drive sector to a two lane highway with the data symboliz ing the dotted yellow stripe down the middle When new data is written the drive head paints a new bright dotted stripe somewhere on the road but not necessarily covering the old stripe Since hard drives work using magnetism if you have sensitive equipment you can pick up the faint mag netic fields from previous disk writes even if new data is written over the top The only way to be sure that this faint magnetic field cannot be detected is to write over the entire drive many different times with random data The idea is that the more times you write data to the drive the more likely it is that the drive head will actually write over the top of a previous track In effect it is like painting many different stripes down the highway in which you hope to paint over the previous stripe at least once The data being writ ten is random so it makes it much more difficult to piece together files than if the drive were written only with all ones or zeros To securely wipe your hard drive boot into Knoppix and find the partition on your desktop that you want to shred Then open a te
190. a1 sudo sh c find xdev printo cpio paOV mnt hdb1 This example uses mnt hda1 and mnt hdb1 but you should change those values to the two partitions you are using When you run this command it recursively copies everything on the mnt hda1 filesystem without crossing over into other mounted partitions It properly handles any special files and it completely preserves permissions For each file that is copied this com mand prints out a single dot to the screen so you get a sense of the progress If you want more specific information on the progress use the watch com mand in a different terminal knoppix ttyo knoppix watch df The watch command runs df every two seconds and allows you to compare the used and available space on both the old and new partitions Rsync The rsync method takes as arguments the mounted filesystem to transfer from and the mounted partition to transfer to knoppix ttyo knoppix sudo mount mnt hda1 knoppix ttyo knoppix sudo mount o rw mnt hdb1 knoppix ttyo knoppix sudo rsync avx numeric ids mnt hda1 mnt hda2 The numeric ids option is important when you run this command from Knoppix as Knoppix likely has different user and group ID numbers than your system This option ensures that the ownership of each file transfers correctly 224 Chapter 6 Repair Linux HACK Mount Linux Software RAID 75 Final Steps If you have other filesystems mounted on other partitions simpl
191. ack 94 4 Use Knoppix to download Microsoft Windows patches onto a vulnerable Windows machine Then boot to Windows and apply the patch while disconnected from the network Download Windows Patches Securely It seems like new vulnerabilities for Windows or software running on Win dows appear every few weeks The worst vulnerabilities are remote exploits that give the attacker full Administrator privileges on a machine Worms that exploit these vulnerabilities are written rather quickly and are soon scanning the Internet looking for machines to infect The common remedy for these exploits is to download a patch from the Internet with a service like Windows Update The problem is that your machine is at risk of being exploited every moment it is on the Internet downloading the latest patches It s like running across the battlefield to get your bulletproof vest Use Knoppix to provide cover for you Boot to Knoppix grab the patches you need and then apply them from within Windows with the computer discon nected from the network In addition to Windows Update Microsoft also provides patches as individ ual downloads so that system administrators can download them once and apply them across the network saving bandwidth and time This service is provided at http www microsoft com technet where you can browse for downloads and security bulletins for all of the software Microsoft supports To get the Windows patches boot to Knoppix
192. ack to normal First click Edit Preferences and click Use Current Page in the Home Page section then click Close This will make sure that if a user clicks the home icon they will be brought back to the main kiosk page instead of the default Knoppix home page Next right click on the G icon on the main toolbar that represents the Google search bar and select customize Now drag and drop the G icon from the main toolbar into the new window that appears below it contain ing various other toolbar options Then click Done to close this toolbar edi tor You want to disable the Google search bar to make it more difficult for users to switch away from your kiosk pages into whatever web page they want to view This actually reveals one potential security flaw with this kiosk mode a user can bypass your kiosk pages just by enabling the Google search bar again Then type about config in the URL field and hit enter This will show all of the available configuration options for Firefox We want to allow the Java Script to close windows so find the field labeled Filter and type close_ windows This will filter out all of the options except for the one we are inter ested in dom allow scripts _to_close windows Double click this option to change the value from false to true Finally click the Home icon to take you back to the kiosk html page Fire fox will alert you that it has blocked a popup window so click on the Prefer ences
193. acks 40 45 Once you are comfortable using Knoppix for your desktop you might find yourself booting onto the CD more often While you can create persistent settings and a portable home directory to mount at some point you might decide you would like to use Knoppix full time by installing it to your hard drive The Debian GNU Linux distribution on which Knoppix is based is becom ing much more popular but the Debian installer can be daunting even for the experienced Linux user Some of the more complicated parts of the install ask questions that the new Debian user might not know the answers to Knoppix handles all of the hardware and network configuration for you and comes with a great selection of applications so it wasn t long before people began asking for a way to install Knoppix on their hard drives As Knoppix s hard drive installer has progressed it has become known as the quickest and easiest way to obtain a Debian testing unstable installation The Debian distribution has three main branches that are used to ensure high security and stability on one end and rapid inclusion of new programs and updates on the other These branches are Stable currently nicknamed Etch The Debian stable branch contains packages that have been rigorously tested with the other packages in the branch over a long period of time and is considered incredibly stable Testing currently nicknamed Lenny The Debian testing branch is a blend of the s
194. ading instead of NAT useful for forwarding over a dial up connection that might drop while Chapter 5 Put Knoppix in Your Toolbox 143 HACK 49 HACK 49 Create an Emergency Router the computer is booted which results in a different IP type the following command instead knoppix ttypo knoppix sudo iptables t nat A POSTROUTING o etho j MASQUERADE Substitute pppo for etho if you are forwarding over a dial up connection At this point you should be able access the outside 192 168 0 network from any of the machines on the 192 168 1 network The iptables command creates a NAT rule but doesn t actually create a proper firewall NAT does prevent people from easily accessing any local IPs behind the NAT router Use the Knoppix Firewall Tool In addition to the standard command line tools you can use to create a router Knoppix has provided GUI tool that allows you to quickly and eas ily configure firewall rules for your computer To get started click K gt KNOPPIX gt Services gt KNOPPIX Firewall The GUI that appears see Figure 5 3 lists a few basic options Mode This option lets you choose from easy medium and expert modes which control how many options you can see and configure within this GUL The firewall defaults to easy mode External Devices Here you can configure all of the devices that the Knoppix firewall will control You will need some idea of the network devices your computer has but if
195. administrators often need to be in two places at once You might be on the phone walking a person through a technical problem when you real ize that it would be much simpler if you could perform the problem solving steps yourself You might need to perform the same task on multiple com puters such as a manual virus or spyware scan or software update which requires some initial setup and then a lot of waiting If you could access all of the computers at the same time you could start on the second computer once the first got going In any of these cases you might want to remotely control the computer and with Knoppix you can connect to both Remote Desktop Protocol RDP and any Virtual Network Computing VNC server using software on the CD This hack explains the steps and software required to turn any machine on the network running Knoppix into a mobile command center for remotely controlling all of the computers on your network VNC VNC is an open source remote access project created by AT amp T Labs at Cambridge U K VNC s original purpose was to enable remote access to computers running X from thin clients that could be disconnected and reconnected later from the same or another thin client The fact that the software is open source and runs on a variety of different platforms Win dows Linux Solaris and OS X among others has made it rather popular to both system administrators who want a single program to remotely con trol mult
196. afari oreilly com is the premier online reference library for programmers and IT professionals Conduct searches across more than 1 000 books Sub scribers can zero in on answers to time critical questions in a matter of seconds Read the books on your Book shelf from cover to cover or simply flip to the page you need Try it today with a free trial SECOND EDITION NOPPIX HACKS Kyle Rankin O REILLY Beijing Cambridge Farnham K ln Paris Sebastopol Taipei Tokyo Knoppix Hacks Second Edition by Kyle Rankin Copyright 2008 O Reilly Media Inc All rights reserved Printed in the United States of America Published by O Reilly Media Inc 1005 Gravenstein Highway North Sebastopol CA 95472 O Reilly books may be purchased for educational business or sales promotional use Online editions are also available for most titles safari oreilly com For more information contact our corporate institutional sales department 800 998 9938 or corporate oreilly com Editor Brian Jepson Cover Designer Karen Montgomery Production Editor Adam Witwer Interior Designer David Futato Production Services Octal Publishing Inc Illustrators Robert Romano and Jessamyn Read Printing History October 2004 First Edition November 2007 Second Edition Nutshell Handbook the Nutshell Handbook logo and the O Reilly logo are registered trademarks of O Reilly Media Inc The Hacks series designations
197. aged Hard Drives might notice that it becomes much louder than it used to be and makes a loud clicking noise that sounds a bit like your hard drive is crushing ice Your drive has the click of death In addition to general file access fail ures the click of death is the main indicator that your hard drive is dying and should be backed up immediately Unfortunately most backup and imaging utilities operate on the assump tion that they are running on fully functioning hardware When a hard drive is dying many backup utilities won t be able to handle the different access errors If your drive has gotten so bad that you can t even boot from it your best chance of creating a backup is to image the drive Hack 58 But even the faithful dd program exits out with an error if it hits a bad block in a file so if you try to image a failing hard drive you end up with an incomplete image Knoppix comes with a tool called dd_rescue http www garloff de kurt linux ddrescue that aims to pick up where dd leaves off when reading from questionable drives When dd_rescue comes across a bad block it simply skips it and moves on by default or it can be set to move on after a certain number of failures On a failing drive this means you can create an image of a full partition with some holes here and there and then use fsck to try to repair some of the damage on the filesystem By using Knoppix for this recovery you access the drives as little
198. all Linux 283 Freeduc 280 text mode cheat code 10 The Onion Router see Tor Theme Manager 35 themes customizing 35 38 Todo List 43 tohd cheat code 14 toolboxes email servers creating emergency 150 154 file servers creating emergency 146 148 forensics data collecting 176 180 hard drives cloning 180 184 wiping 184 185 hardware copying settings 192 194 testing compatibility 186 192 PXE adding 194 197 remote desktops running 129 133 root kits scanning for 174 176 routers creating emergency 139 146 security auditing 166 173 services running emergency 154 158 wardriving 159 166 web servers creating emergency 148 webcam servers configuring 197 wiki platforms creating 198 200 Windows browsing shares 138 see also tools toolkits INSERT 284 287 L A S Linux 287 289 tools 300 airsnort 312 APT configuring 123 arpwatch 307 Autopsy 177 avscan 286 bootcfg 255 cheops 302 chkrootkit 296 chntpw 262 304 backing up registries 264 267 Ciscilia 304 clamav 286 296 Coroner s Toolkit 176 180 dcfldd 296 dd 180 184 206 dd_rescue 218 dd_rhelp 218 deborphan 343 dpkg 243 Driftnet 306 dsniff 306 e2fsck 212 Ethereal 305 Ettercap 305 fakeap 313 fdisk tool 207 fls 214 215 FluxBox hotkeys 313 foremost 296 fragroute 307 freshclam 286 fsck 212 fsck ex2 212 Gifshuffle 294 gpart 208 gpsdrive 313 grave rob
199. allation at this point Synaptic will prompt you if a package depends on another package to install so that you can approve the installa tion of it Once all of the packages you wish to install are selected click the Apply button and Synaptic will display a prompt letting you know which packages it will install along with how much space it will need Then Syn aptic will automatically download and install all of the programs onto the system Synaptic is particularly useful on the Knoppix CD The Knoppix DVD already includes so much software that most programs you would want are probably already installed As you install software though just keep an eye on your available free space so you will have room for personal files and any configuration files your software might create Don t forget to use the persistent disk image see Hack 26 or otherwise any software you install will be erased once you reboot Browse the Web Anonymously 8 Install Tor and Privoxy to turn any computer into an anonymous browsing machine and leave no tracks behind If you sit at home by yourself on your desktop computer and browse the web you might feel like you have a fair amount of privacy After all unlike at an office no one is going to show up and look over your shoulder How ever every web site you visit keeps a log of all visitors including informa tion that can be used to trace individuals back to their computers While it might not seem
200. amera Unplugging any USB drive while files are being written almost guarantees file damage To use cameras that don t work as generic USB storage devices use gtkam a program that uses the libgphoto libraries to provide basic access to the files on your digital camera Before you run gtkam depending on your camera connect the camera to the computer by the USB or serial port To run gtkam click K Menu gt Multimedia gt Viewers gt gtkam The main window appears fairly blank by default and the first step is to click Camera gt Add Camera to open a dialog that displays the full list of cameras gtkam sup ports see Figure 2 9 otkang Add Camera B Model Achiever Digital Adc65 z Detect Port Serial Port 0 serial dev tty50 x Enhanced X Cancel yf Apply Figure 2 9 Gtkam camera selection Click Detect for gtkam to probe the USB ports for your camera or select it from the list of camera models and click OK You are dropped back to the main window which then presents you with thumbnails of all of your pho tos You can zoom in and out on your photos and select some or all of them to save for later editing 48 Chapter 2 Use Your Knoppix Desktop HACK Have Fun and Play Some Games 17 Removable USB and IEEE1394 Drives Removable drives especially small USB key chain drives are useful in Knop pix because they provide portable writable storage so your files can travel with
201. an t avoid the problem of file sizes DVDs need files to be less than 2 GB so if your remastered KNOPPIX compressed filesystem is greater than 2 GB you will need to find ways to reduce it The Knoppix project itself has moved to two compressed filesystems KNOPPIX and KNOPPIX2 as a way to work around this problem You might decide to create your own Knoppix disk because there are some programs that are not included in Knoppix that you want on the disk To add those programs other programs must go but there are some steps you can take while you are in the chroot environment to make the process easier Find Programs to Remove The first step in slimming down your disk is to find programs you don t need Knoppix comes with a lot of software and depending on how you plan to use Knoppix you may be able to do without large parts of the system If you are unsure of which software you want to remove it might help to see which programs are taking up the most space The following command lists all of the packages installed on the system sorted by size root ttypo dpkg query W showformat Installed Size Package n sort n 48148 wine 58840 kde i18n es 61096 linux image 2 6 19 65084 sun java5 bin 358691 openoffice de en Chapter 9 Knoppix Remastered 341 HACK 110 Trim the Fat The file sizes in the output are in kilobytes As you can see the largest single package on the system happens to be openoffice de
202. an copy the entire system from md0 to md1 using the find command intro duced in Hack 74 sudo mkfs t ext3 f dev md1 knoppix ttyo knoppix sudo mkdir mnt mdo mnt mdo knoppix ttyo knoppix knoppix ttyo knoppix sudo mount dev mdo mnt mdo anaes knoppix ttyo knoppix sudo mount o rw dev md1 mnt md1 knoppix ttyo knoppix cd mnt mdo knoppix ttyo mdo sudo sh c find xdev printo cpio paOV mnt md1 Now edit mnt md1 etc fstab and make sure the entry for dev md0 is changed to dev md1 You must also edit lilo or grub configuration files on both mnt md0 and on mnt md1 Make sure that any root device configura tion now references dev md1 instead of dev md0 If you use lilo as your boot loader you must also run lilo to update the MBR as covered in Repair Lilo Hack 65 234 Chapter 6 Repair Linux HACK Add an Extra Drive to a Software RAID 5 Array 79 Finally you need to update the mdadm conf file on mnt md1 etc mdadm so that it knows about your new array sudo sh c mdadm detail scan grep color none md1 gt gt mnt md1 etc mdadm mdadm conf Once you update all of the configuration files the safest way to proceed is to reboot into your new system to make sure that the system is capable of booting from the new software RAID settings by just changing back the lilo or grub config on your original root device but once you add this drive to the array it will be overwr
203. an external PCMCIA USB or IEEE1394 CD ROM On Knoppix support for the CD ROM after the BIOS boots is pretty important Laptops also rely on power management features that can be iffy at times None of these issues should scare you away from trying Knoppix on a laptop Many of these problems can be solved or at least worked around using cheat codes Knoppix is one of the best distributions when it comes to getting laptops working out of the box I recommend taking a Knoppix disk with you when shopping for laptops it is one of the best ways to see how well Linux will run on that machine Convincing the clerk at Best Buy to let you boot with Knoppix will be your real challenge Laptop Display Tweaks The specifics of tweaking display settings have been covered already in Hack 7 Some of those cheat codes are particularly useful when setting up a lap top or desktop LCD display Laptops use LCDs that have an ideal resolu tion even if they can display other resolutions The fb cheat code is useful in these cases because on some displays running the console below the maxi mum resolution results in the desktop still being displayed with black bands around it if not text and images may appear jagged because your LCD panel scales up from the lower resolution to its maximum To display a framebuffer console on a laptop that has an ideal resolution of 1024 x 768 boot Knoppix with b1024x768 In some cases Knoppix may not detect the l
204. and therefore more space is now available There were two reasons why this was done INSERT needed space for providing memtest86 a RAM 286 Chapter 8 Knoppix Reloaded HACK Download Local Area Security 100 checking utility at boot time and loop mounted floppy images were frus trating to work with KNOPPIX adopted this technique for version 3 4 so Klaus was able to nearly double the size of the miniroot which now includes more SCSI USB and FireWire drivers INSERT 1 2 13 now descends from KNOPPIX 3 4 so it also provides these improvements A lot has happened since so that the latest version of INSERT contains even more tools NTFS write support is now achieved using the fantastic ntfs 3 and a download script for the virus scanner F Prot and an accompanying GUI have been added This means that if there s Internet connectivity avail able two different virus scanners are at the hands of the desperate As of this writing INSERT 1 3 10 is under heavy development It is now based on Linux kernel 2 6 the version of the kernel can always be found by multiplying the numeric version number of INSERT by two User feedback and open source software development continue to improve INSERT See Also e Collect Forensics Data Hack 57 e Clone Hard Drives Hack 58 Matthias Mikule z7 Download Local Area Security f feg 0 Similar to the scope of INSERT Local Area Security Linux L A S Linux aims to put many
205. and KNOPPIX2 This is due to the fact that a DVD filesystem cannot have files larger than 336 Chapter 9 Knoppix Remastered Create a Customized Knoppix 2 GB on them The original KNOPPIX filesystem grew beyond 2 GB so it needed to be split into two files If you check out the contents of the KNOPPIX2 directory on a booted DVD you can see that the opt and usr local directories were split off into this filesystem What this means when you are remastering is that if you don t plan on changing anything in either opt or usr local you can leave the current KNOPPIX2 file as is and don t need the extra 5 GB of space necessary to copy its contents to your source directory If you do need to edit the files in KNOPPIX2 create a new directory for it in your source directory and copy over its files root ttyp1 hda1 mkdir p source KNOPPIX2 root ttyp1 hda1 cp a KNOPPIX2 source KNOPPIX2 Because some of the directories in source KNOPPIX2 overlap directories in source KNOPPIX we will take advantage of AuFS Hack 1 to merge these two directories to a third source UNIONFS directory we will create and then use it instead of source KNOPPIX when we chroot root ttyp1 hda1 mkdir p source UNIONFS root ttyp1 hda1 mount t aufs o dirs source KNOPPIX rw source KNOPPIX2 rw source UNIONFS source UNIONFS Chroot The next step is to use the chroot command to turn the source KNOPPIX directory into the effective root filesystem
206. any swap drives it finds and as it uses the space overwrites any data that was previously on there With a Knoppix disk you can either boot onto the compromised server and scan the hard drives directly or work with an image of the compromised server s hard drives Grave robber refers to this type of machine as a corpse because besides the TCT author s fondness for grave metaphors the machine is no longer live If you can follow the steps in Hack 58 to create an image of your drive so that you can leave the original alone and do all of your work from the copy Grave robber can potentially generate a few mega bytes of output depending on the size of the drive scanned and the data it collects Keep this drive in as pristine a state as possible by finding some other media such as another hard drive on the system a USB drive or a net work share to store the data The default is to save all data in var cache tct data but as that directory is running from the ramdisk under Knoppix not only does it not have enough room to store the data the data is erased once Knoppix is shut down So find a larger more permanent place to store everything Since the Coroner s Toolkit is no longer part of Knoppix you will need to take advantage of Knoppix s package manager to install it over the network Luckily this is very easy Just open up a terminal window and type sudo apt get update sudo apt get install tct Now that the package
207. aptop s video card or may detect it incorrectly If forcing Knoppix to use a particular module with the xmodule cheat code doesn t work but the console displays fine boot with xmodule fbdev to use the same framebuffer support for X that you use in the console Chapter 1 Boot Knoppix 21 HACK 10 Explore Expert Mode Special Purpose Cheat Codes There are many other special purpose cheat codes to boot Knoppix on diffi cult hardware Here are some bits of voodoo that have worked for other lap tops For some notebooks that use proprietary PCMCIA CD ROM drives the cheat code ide2 0x180 nopcmcia has been known to work by bypassing PCMCIA support in favor of direct BIOS support for the drive If the PS 2 mouse on the laptop does not work boot with pci irqmask 0x0e98 to spec ify a specific PCI address For the worst cases you might have to disable parts of the hardware to get the laptop to at least be partially usable The cheat codes outlined in Hack 8 can help particularly noapic nofirewire or noscsi On some lines of Dell laptops passing nosmp has made the difference in being able to boot For a time on my Fujitsu laptop I needed to boot Knoppix with ideo ata66 ide1 ata66 to work around a bug in my IDE chipset If the power manage ment support for your laptop is unstable for instance the laptop goes to sleep but you can t wake it back up you might want to disable power management completely with noapm and acpi o
208. aracter Now that you have both directo ries identified copy the settings with the command knoppix ttypo knoppix cp a yyyyyyyy default home knoppix mozilla firefox xxxxxxxx default If prompted whether you wish to overwrite any files type y Now when you start Firefox you should see all of the same settings that you used under Windows The prefs js file which contains many of your Firefox prefer ences stores a lot of Windows specific directory paths If you don t mind your home directory being littered with a few oddly named directories leave this as is Otherwise the following search and replace script should remedy most of the paths knoppix ttypo knoppix perl pi e s C 2Desktop home knoppix Desktop s g3 s C s1t home knoppix mozilla firefox xxxxxxxx default home knoppix mozilla firefox xxxxxxxx default prefs Be sure to replace each instance of xxxxxxxx default with the name of the random profile directory Firefox created under Knoppix 84 Chapter 3 Tweak Your Desktop Use Your Windows Desktop Settings OpenOffice org OpenOffice org is another application that you might use under both Windows and Knoppix Under Windows OpenOffice org stores its con figuration files along with the program under C Program Files OpenOffice org1 1 1 with the final part of the directory name differing depending on which version of OpenOffice org you have installed To copy your Open Office org se
209. ardware detection program will execute and notice that all of the hardware has changed It is important to select the Keep Configuration for any old SCSI or network device that kudzu detects has been removed and select Ignore for any new SCSI or network device kudzu detects Any other device such as video sound or USB devices are safe to remove and reconfigure After the system boots all of your normal services should start up as usual and since you have kept the same networking configuration you should be able to remotely access these services via the same network address If your network does not come up a possible reason is that your network configu ration file in Redhat this would be under etc sysconfig network scripts had the MAC address for the old network adapter hard coded If this happens just comment out or remove that line from the file and restart the network ing service service network restart under Redhat 252 Chapter 6 Repair Linux CHAPTER SEVEN Rescue Windows Hacks 87 95 Whenever I have to use the Windows Recovery CD I cringe It isn t because my Windows system needs to be rescued I ve come to expect that What I dislike is the actual recovery CD itself and I don t think I m the only one who feels that way While the Windows Recovery CD does an adequate job with a few tasks that is resetting an MBR replacing a boot ini file or restor ing default system files expect to come
210. arger hard drive and migrate the system While there are many different ways to copy files from one hard drive to another some work better than others when transferring the full directory This hack outlines a method to transfer full systems and partitions from one machine to another Why This Can Be Complicated When you copy a full Linux system from one partition to another there are a few issues you need to consider Preserve permissions If your files aren t owned by the same people and have the same permis sions your new system probably will not run as expected Properly handle special files Certain methods of copying a system don t properly handle the dev and proc filesystems As a result you may boot on the new drive only to find you have no device entries listed Span filesystems When you copy one filesystem to another especially the root filesys tem you don t want to span across filesystems For example if you have a new hard drive mounted at mnt temp and you recursively copy to mnt temp and allow filesystem spanning you could end up with mnt temp copied into mnt temp mnt temp and mnt temp mnt temp copied to mnt temp mnt temp mnt temp not to mention the rest of the filesys tem you have copied to mnt temp To avoid this most copy programs have an option to copy only the mounted filesystem it is started from without continuing to other mounted filesystems Knoppix removes some of these complications
211. as possible so you are only putting strain on the bad drive long enough to make a single copy and then you can browse around the image from a fully functioning drive While you can do the complete drive rescue with the dd_rescue tool there is a helper front end tool called dd_rhelp that automates and speeds up much of the process Dd_rescue doesn t stop when it hits bad sectors but it does slow down significantly If your drive has a number of bad blocks in a row it can take dd_rescue a long time to move past them into recoverable data If the drive is going to fail quickly this means your drive can fail while dd_ rescue is waiting on bad blocks Dd_rhelp speeds up this process by assum ing that bad blocks are generally in groups When dd_rhelp sees that dd_ rescue has hit a bad block it skips ahead a number of blocks and reads from that point in reverse until it hits another bad block It uses this method to map out sections of bad blocks on the drive and attempts to recover the good blocks first Then when it has recovered the good blocks it goes back and tries to recover from the group of bad blocks Time is precious when a drive is failing so dd_rhelp tries to spend more time recovering good data and then goes back to recover questionable data if it can There are other benefits to dd_rhelp such as it can use the logs that dd_ rescue generates to resume a rescue operation that you have stopped with 218 Chapter 6 Repair Linux
212. asy for you to manage software You always know what gets installed where and if you want to uninstall an application you simply delete its cmg file and then remove that application s files under kde share applnk klik to remove the application from the KDE menu Every application is self contained in one file It is important to know that you can safely play around with klik and try as many applications as you want without the risk of breaking the system Klik installs all software to the current user s desktop by default Knoppix uses a ramdisk for the home directory which contains the desktop direc tory so if you want to keep the software that you have installed with klik to stay across reboots make your home directory including your desktop per sistent see Create Persistent Knoppix Settings Hack 26 For the technically curious When you click on a klik link the klik client asks the server for a klik recipe A klik recipe is required to install software using klik and essentially tells the client where to obtain packages and how to transform them into cmg files The klik server generates recipes for most applications automatically Most Linux software is designed to look for files in places such as usr var bin and etc In order to make programs run from nonstandard locations klik needs to apply various tricks such as binary patches Since these are transparently done by the klik client you will likely not noti
213. at s more damaging the evidence through lack of practice is not an option either KR Practice these techniques before you need them Invariably Further Reading e http en wikipedia org wiki The_Sleuth_Kit e http en wikipedia org wiki Clamav Firewalls Firewalls are devices that connect networks together and allow only certain types of traffic to pass between them based on a list of criteria you define the rulebase The general principle creates zones that separate completely trusted such as your internal LAN partially trusted such as a web server 296 Chapter 8 Knoppix Reloaded Full Protection with S T D zone and completely distrusted networks like the Internet from each other S T D includes iptables which offer extremely powerful firewall functional ity and these are included in nearly every Linux distribution This makes it a must learn subject for the security enthusiast To help you on your way S T D includes the following firestarter A wizard to walk you through the process of setting up a rulebase Shorewall A more advanced firewall package Hogwash A packet scrubber that automatically blocks packets that trip snort IDS rules see IDS later in this chapter If you are connected to the Internet in any way with S T D you should hit the key combo Alt F12 This shortcut activates a blockall script which installs a very simple firewall rulebase automatically This script allows all
214. at Code Purpose noppix screen 1280x1024 Use specified screen resolution for X noppix depth 16 Use specified color depth for X noppix xvrefresh 60 or vsync 60 Use 60 Hz vertical refresh rate for X noppix xhrefresh 80 or hsync 80 Use 80 kHz horizontal refresh rate for X noppix xmodule ati fbdev mga nv Use specified Xorg module radeon savage s3 svga i810 noppix wheelmouse Enable IMPS 2 protocol for wheel mice noppix nowheelmouse Force plain PS 2 protocol for PS 2 mouse noppix vga normal No frame buffer mode but X b1280x1024 Use fixed frame buffer graphics 1 b1024x768 Use fixed frame buffer graphics 2 b800x600 Use fixed frame buffer graphics 3 Tweak the Monitor Settings Knoppix attempts to automatically detect the highest resolution at the high est color depth your computer supports and starts X at that resolution and depth For some computers these maximum settings might be hard on the eyes Screen flicker may occur when refresh rates are too low or tiny icons may occur when a resolution is too high In these circumstances you can usually fix the problem by using a few cheat codes to change your X server settings The screen cheat code lets you specify exactly at which resolution to run X For instance if your 15 inch monitor can support 1024 by 768 but 800 by 600 is more comfortable on your eyes type the following at the boot prompt screen 800x600 16 Chapter 1 Boot Knoppix Straighten Out Your X Sett
215. at certain video and audio codecs are not free to distribute in particular countries such as the U S without the permission of the patent holder for that particular codec How ever it is possible and easy to add these codecs once Knoppix has booted Before you begin be sure to check with your lawyer you always have him on hand before installing software right to confirm that you may legally install commercial codecs Then add a new package repository to Knoppix s list sudo bin sh c echo deb http debian multimedia org stable main gt gt etc apt sources list Then update your list of packages and install a few packages that provide you with various codecs and libraries you need sudo apt get update sudo apt get install w32codecs libdvdcss Next if you would like to install the latest flash and video plugins for your browser along with acrobat reader type sudo apt get install flashplugin nonfree mozilla mplayer kmplayer plugin acroread Now you should be able to not only watch any videos you may have on the system you will also be able to watch DVDs provided you have an extra drive bay of course as well as most videos on the Internet Take advantage of Knoppix s persistence features K gt Knoppix gt Configure gt Create to make a persistent Knoppix disk image so you only have to download and install the files once Chapter 3 Tweak Your Desktop 111 CHAPTER FOUR Install Linux with Knoppix H
216. at instead of using custom Knoppix tools or hacks to install software you can use standard Debian tools to add remove and even upgrade software to the live disk The main limit you will face when you install programs to a live disk is stor age space Since you will be using the ramdisk you will have a limited amount of space to add software Also any changes you make to the filesys tem are erased the moment the system reboots unless you configure a persis tent disk image see Create Persistent Knoppix Settings Hack 26 A persistent disk image has other benefits as well including the fact that you will likely have the option of more space on a disk image than you will with your ramdisk so you can install more software Knoppix has included a simple graphical tool called Synaptic that Debian also uses for graphical package management To launch this tool click K gt Knoppix gt Utlities gt Manage software in KNOPPIX The main window is divided into a few sections see Figure 3 7 The sidebar displays the differ ent package categories so that you can quickly drill down to a particular group of packages like games and not have to read through packages in other categories The first category All displays all packages On the right side of the window along the top is the list of packages along with informa tion about whether they are installed and what the latest version is If you select a particular package detailed info
217. at you are recovering and mnt hdb1 with the mount point where you are saving the image As dd_rhelp scans the drive it prints out all of its progress including any errors it finds When it finishes you should have two files in your recovery drive the image and a log from dd_rescue in case you want to audit its progress Now run fsck on the image to attempt to repair any filesystem errors that might have occurred Hack 70 by typing this command knoppix ttypo knoppix sudo fsck y mnt hdb1 hda1i_rescue img fsck 1 35 28 Feb 2004 e2fsck 1 35 28 Feb 2004 mnt hdb1 hda1_rescue img clean 12 131072 files 187767 262111 blocks The y option tells fsck to automatically repair any filesystem errors it finds Mount the image with the o loop option and you should be able to access your files at that mount point as if it were a hard drive 220 Chapter 6 Repair Linux HACK Back Up and Restore 73 knoppix ttypo knoppix sudo mount o loop mnt hdb1 hda1i_rescue img mnt hda1 wa Back Up and Restore 73 Use the classic tar command with Knoppix to quickly back up and restore important files If you have just gone through a filesystem repair unsuccessfully then you probably have lost some files No problem You can just restore them from your backup If you don t back up all of your important files then there s no time like the present to start Knoppix comes with the venerable tar com mand which is used by syste
218. ata written to the drive is striped across all drives in the array along with parity information This parity information effectively uses up the space of one of the drives so if you combine three drives into a RAID 5 array the array has the capacity of two of the drives combined With this parity information if any drive fails the remaining drives can continue running and once a replacement drive is available they can restore all of the data including parity information to the new drive Unlike RAID 0 or RAID 1 RAID 5 requires at least three par titions so this example creates a RAID 5 partition out of dev hdal1 dev hdb1 and dev hdc1 sudo mdadm create dev mdo auto yes level 5 raid devices 3 dev hda1 dev hdb1 dev hdc1 mdadm array dev mdO started Creating the RAID Regardless of which RAID you configure once you have run one of the above commands mdadm automatically starts your array for you At this point you can read proc mdstat to check the current status of the newly created RAID drive For example after you create a RAID 0 array you see the following output cat proc mdstat Personalities raido mdo active raido hdb1 1 hda1 o 2088320 blocks super 1 0 64k chunks At this point you can treat dev mdo like any other disk partition and for mat it mount it and copy files to it If you have an existing Linux installa tion on a different partition and want it to use the RAID make sure that it
219. ating 264 ReiserFS file systems 212 reiserfsck tool 212 remastering booting modifying 363 366 CDs auto building Morphix 356 358 automating 351 353 customizing 334 340 deleting applications 341 344 modifying languages 358 Morphix 353 356 personalizing Knoppix 344 349 updating 349 initrd tweaking without 366 kiosk disks 89 without remastering 360 363 Remote Authentication Dial In User Service RADIUS 293 Remote Desktop Protocol RDP 129 131 remote desktops FreeNX connecting with 133 138 running 129 133 removable drives 49 reports nessus tool 172 repositories Debian 122 packages 107 resetting passwords 239 261 264 resizing file systems 258 261 partitions 209 211 resolution optimizing 16 RESTOREDIR variable 217 restoring all deleted files 216 grub to MBRs 203 205 kernels 246 lilo to MBRs 202 system files 267 269 tar command 221 223 results nessus tool 172 resurrecting MBRs 206 root kits chkrootkit tool 296 scanning for 174 176 root partitions creating 118 root passwords creating 34 root privileges 71 route command 142 routers creating emergency 139 146 RPM packages installing 245 rsync method 224 rsync tool 249 Run Command menu 33 Run Command window 105 runlevels 240 modifying 241 running distccKNOPPIX 315 emergency services 154 158 on Intel based systems 273 275 lilo 202 remote desktops 129 133 tar command 221 see also starting run_wardrive
220. ating packages 349 configs tbz file 361 desktops 34 38 appearance and themes 35 38 duplicating Windows 38 personalizing 344 349 nessus tool 170 D daemons clamd 271 distcc 314 inetd Unix 156 LISa 139 Damn Small Linux 281 284 Dance Dance Revolution 90 databases apt get shrinking 343 MySQL running emergency 156 dcfldd 296 dd tool 180 184 206 218 336 dd_rescue tool 218 dd_rhelp tool 218 Debian distribution branches of 112 converting to 122 124 packages managing 243 244 debootstrap command 357 deborphan 343 default languages modifying 358 default window managers modifying 346 deleting applications 341 344 files recovering 214 217 orphans 343 packages 342 dependencies 342 depth cheat code 17 desktop anonymous browsing enabling 109 111 applications developing 97 99 Aufs using 72 74 customizing 34 38 appearance and themes 35 38 duplicating Windows 38 Damn Small Linux 283 DVD only window managers 68 70 environments 66 68 games 49 adding 90 94 saving 93 hardware support using peripheral devices 46 49 help 65 Index 373 desktop continued Internet connecting 55 connecting with GPRS Bluetooth 57 62 navigating 62 65 kiosks creating 86 90 klik installing applications with 104 106 Linux using settings 79 83 live disk installing applications to 107 109 local sharing 132 modifying 34 multimedia 50 55 installing codecs
221. ation Given the popularity of Knoppix and the vast number of people working on derivative versions of Knoppix it doesn t come as a surprise that people have been working to make Knoppix easier to modify and more flexible to use In early 2003 people who used Knoppix as a base on which to build live CDs which used Debian GNU Linux developed Morphix http www morphix org a remastered version of Knoppix What Makes Morphix So Special As you have seen in this book there are a number of ways to change Knop pix to your liking particularly with remastering which is covered in the next chapter However these possibilities have always been and probably will always be fairly limited Knoppix was made for different goals to detect your hardware as quickly and correctly as possible to be a good dem onstration of Linux and to include as much commonly used Linux software as possible Morphix on the other hand is built on the idea of modules You have one module that boots your live CD and detects your hardware another that contains your live CD filesystem and zero or more extra modules that can contain minor or major changes and additions to the system This way Morphix promotes the reusing of smaller existing modules instead of one large KNOPPIX KNOPPIX file If it seems complicated a look at a typical Morphix live CD might help This is the structure of Morphix 0 4 1 Light GUI one Morphix flavor base base boot img
222. aximum speed One round trip is tolerable but imagine that you have to make 1000 round trips and you have to wait each time for the answer over a link with high latency which is very slow This effect is especially bad with modern tool kits such as QT or GTK because they are typically pro grammed to run on the same machine not over the network NX solves round trip problems locally by usage of an nxagent that groups requests and then sends them chunked to the client Chapter 5 Put Knoppix in Your Toolbox 135 HACK 47 HACK 47 Run X Remotely with FreeNX Compression of X Images NX uses state of the art compression techniques like PNG and JPEG to compress huge bitmaps VNC uses this technique too but VNC always compresses the entire screen along with fonts because it cannot distin guish between the different elements on the desktop With NX just the X Images are compressed and the fonts and most other elements on the desktop are crystal clear Chunking of image data Image data is the biggest part of a desktop to be transferred over the net work Even if it s possible to compress it you still want to use the desk top while a huge image transfers NX never uses all of the bandwidth and always has a small control channel so that it can stop the transfer of the chunked images to react to a mouse click or similar events As a result the desktop is more responsive Set Up NX Server NoMachine sells a commercial
223. ber 176 files and directories 178 icat 214 216 388 Index john 303 Kismet 312 LinNeighborhood 301 booting 19 242 expert mode 22 GPRS connections 61 62 MD5sum creating 8 help 29 65 mdadm 227 230 234 INSERT 284 287 Memtest86 23 26 Linux MMaker 356 358 mp3encode 294 multimedia installing codecs 111 ncplogin 301 ncurses 319 nessus 166 173 310 networks 301 adding extra drives to RAID 235 configuring RAID 227 230 converting servers to VMware 247 252 copying kernels 246 disabling init scripts 240 243 file systems 211 214 Nikto 310 installing RPM packages 245 Nmap 310 managing Debian ntfsresize 258 packages 243 244 Ntop 302 migrating RAID 230 235 office 39 43 Kontact 42 43 OpenOffice org 39 42 outguess 294 POf 311 partimage 180 184 passwords 303 QTParted 209 258 Quantian 323 reiserfsck 212 rsync 249 shred 184 185 Sleuthkit 176 Smart Boot Manager 3 smbclient 301 Snort 300 S T D 290 314 steganography 294 stegbreak 294 stegdetect 294 Synaptic 107 TCP Tools S T D 306 tcpdump 305 tcpkill 307 tcpreplay 307 wellenreiter 313 wireless 311 xfs_check 213 xfs_repair 213 migrating to hard drives 223 225 mounting LVM partitions 237 239 mounting RAID 225 recovering deleted files 214 217 rescuing files from hard drives 217 221 resetting passwords 239 resizing partitions 209 211 restoring and backing up MBRs 2
224. bin ifconfig etho Link encap Ethernet HWaddr 00 A0 CC 32 BF 88 inet addr 192 168 0 2 Bcast 192 168 0 255 Mask 255 255 255 0 UP BROADCAST RUNNING MULTICAST MTU 1500 Metric 1 RX packets 3927 errors 0 dropped 0 overruns 0 frame 0 TX packets 3240 errors 1 dropped 0 overruns 0 carrier 2 collisions 0 txqueuelen 1000 RX bytes 5278944 5 0 MiB TX bytes 1692461 1 6 MiB Interrupt 5 Base address 0x1000 lo Link encap Local Loopback inet addr 127 0 0 1 Mask 255 0 0 0 UP LOOPBACK RUNNING MTU 16436 Metric 1 RX packets 16 errors 0 dropped 0 overruns 0 frame 0 TX packets 16 errors 0 dropped 0 overruns 0 carrier 0 collisions 0 txqueuelen 0 RX bytes 896 896 0 b TX bytes 896 896 0 b Chapter 5 Put Knoppix in Your Toolbox 191 HACK 61 Copy Settings to Other Distributions This utility is standard on every major Linux distribution and when run without any arguments it lists all network devices on the system In this example it has found an Ethernet card etho and displays its MAC address IP address broadcast and other networking information In addition it dis plays how many bytes have been received RX bytes and transmitted TX bytes across the interface For probing all the hardware on your system use these commands If you are probing the hardware to check for Linux compatibility but aren t plan ning on installing Knoppix itself to your hard drive then check out the next hack for information on how to copy Knoppix con
225. bles DMA by default DMA on hard drives gives a noticeable performance boost and on DVD drives DMA prevents movies from skipping Sometimes you must force Knoppix to enable DMA on devices that you know support it Use the dma boot parameter to enable DMA As you can see there are many advanced cheat codes to pass to Knoppix at boot time To get Knoppix to boot on a difficult system the best combina tion of cheat codes depends heavily on the hardware involved Hardware forums and newsgroups are great resources to search when trying to get Linux working with a particular chipset Often other people have already done much of the guesswork for you Pay particular attention to threads involving Linux installation even if the thread isn t about Knoppix as those threads often list kernel parameters that work around or fix problematic hardware 20 Chapter 1 Boot Knoppix HACK Run Knoppix ona Laptop 9 Run Knoppix on a Laptop i With laptop sales on the rise it is increasingly common that your desktop machine is actually a laptop Knoppix provides cheat codes and other options so it can boot on laptop hardware If any type of hardware will make you resort to cheat codes and kernel parameter voodoo to boot Knoppix laptops will Laptop manufacturers often resort to using special proprietary hardware that often has little to no support in the Linux kernel Some laptops don t even include an internal IDE CD ROM drive and instead have
226. bout a system From the moment Knoppix boots you are presented with information about what it is doing and which hardware it is detecting Through the proc interface you can also ask the kernel to display very detailed information about all of the hard ware on the system This is particularly useful to test hardware that you want to get working on another Linux distribution pe You can also leverage this hardware detection when shop kad ping for a new computer or laptop Simply bring a Knoppix disk with you and get the clerk to agree to let you boot the CD ROM for hardware compatibility testing This sort of test is quick and much less painful than discovering that a major piece of hardware does not yet work under Linux after you have bought it This hack covers the major commands that provide you with hardware information under Linux I can t possibly cover all of the different hardware that Linux can support and where it is configured but after reading this hack you should know where to look and what to do to check whether Knoppix has detected your hardware and you should be able to check and copy the configuration for the major hardware on your system General Hardware Probing When booting Knoppix you can t help but notice a lot of information about your hardware scrolling by in the text output Once the desktop starts load ing however you can no longer see it and what you could see might have scrolled by too fast for you to
227. bute Compiles with distccKNOPPIX Hack 102 is a partner and developer for Open Door Software Inc a Linux service corporation in Aurora Ontario Canada James manages vary ing tasks ranging from bookkeeping to database administration and SQL programming His first experience with Linux was in 1994 while attending York University in Toronto He has been running Debian Unstable since 2000 Alex de Landgraaf Master Morphix Hack 96 Morph Morphix Hack 114 and Auto Build Morphix Modules MapLab Tutorial Map Hack 115 is an AI student at the Vrije Universiteit in Amsterdam and part time code monkey at the web design company AddMissions A relative newcomer to free software open source software Alex s motto is to be xvi Credits as lazy as possible but not lazier than that He started Morphix in early 2003 and he believes the production of flexible live CDs is the way toward solving annoying problems and monopolies Georges Khaznadar Educate Yourself with Freeduc Hack 97 is a teacher of physics and chemistry at Lyc e Jean Bart in Dunkerque France He is a member of OFSET the Organisation for Free Software in Education and Training Matthias Mikule INSERT Security Here Hack 99 is the creator of INSERT He finished his diploma thesis in theoretical physics Numer ical analysis and simulation of a socio dynamic group model at the Universitat Stuttgart in 1996 He is t
228. button that appears and select Allow popups for to allow the kiosk popup Click the Home icon one final time and you should see your kiosk page ready to use DVD kiosk mode If you boot the DVD with the kiosk cheat code you get a totally different result than with the CD For one the first window you see on your desktop asks you whether you want to create a new profile based on your old Netscape 4 profile Click Convert Profile to display the main browser page What has happened here is that while the CD has aliases mozilla to run firefox iceweasel the DVD has installed the actual Mozilla suite under the name iceape There are two ways to set up the DVD to a full kiosk mode depending on whether you prefer to use firefox or iceape Chapter 3 Tweak Your Desktop 87 HACK 29 HACK 29 Make a Kiosk If you want to use iceape if you are still viewing the window that asks you about your Netscape 4 profile then click Convert Profile In the browser window that now appears click No to disable popup blocking Next hit Ctrl W to close your kiosk page and reveal the full browser win dow hiding beneath Type about config in the URL bar and hit Enter to dis play all of the browser settings Then like with the CD type close_windows in the field labeled Filter to display only the option you want to change Double click dom allow_scripts_to_close windows to set it to true Finally hit Ctrl Q to close this window Knoppix will au
229. ce It s a true testament to your ingenuity that Knoppix is so flexible and just plain useful that it has been used by so many other projects xviii Credits Preface As with so many great open source projects Knoppix started because Klaus Knopper had an itch to scratch Klaus wanted to take many of his favorite open source tools with him so he could work wherever he went and on any computer he had access to Because he didn t want the expense of a laptop or the worry of losing or damaging it he created a bootable Linux CD distri bution called Knoppix With Knoppix Klaus was able to go from computer to computer and get right to work with an operating system and environ ment he was familiar with and without the need to install software on every computer he came into contact with Many people only view Knoppix as a Linux demo disk a job it does perform quite well but even from the begin ning Knoppix was to be used to get real work done Klaus wanted to be able to work on any computer regardless of the hard ware in the system so he continued to improve the hardware support for Knoppix until it was able to recognize and automatically configure much of the hardware it came in contact with There are a lot of live Linux CDs but Knoppix s excellent hardware support combined with the general flexibil ity of the included software has made Knoppix the most popular Over the years I have used many different live CDs both as demo
230. ce them In some rare cases however these tricks do not work and hence some applications cannot be used with klik Luckily KDE applica tions generally do not use hard coded paths Simon Peter Chapter 3 Tweak Your Desktop 105 HACK 35 HACK 36 Create Your Own Klik Recipe Create Your Own Klik Recipe Klik might be of interest to you even if the application you need is not on the Knoppix CD Originally klik stood for KDE based Live Installer for Knoppix but it is not really limited to KDE or to Knoppix Currently though klik links work only in native KDE applications such as Konqueror The klik server tells a klik client where to download software from and how to install it using klik recipes A klik recipe is required to install software using klik and is essentially a shell script that tells the client where to obtain packages and what to do with them So to install your own software using klik you must write your own recipe The best way to start writing klik recipes is to learn from existing recipes You can view sample klik recipes in the point and klik software store at http klik sf net Test your shell script locally and if it works please contribute it to klik Most Linux software is designed to look for files in places such as usr var bin etc and so on In order to make programs run in nonstandard loca tions klik has to run the software using a wrapper script inside each applica
231. code copies the complete CD image to a parti tion on your hard drive This partition can be almost any filesystem that the Knoppix supports including Windows filesystems such as FAT FAT32 and NTFS Keep in mind that FAT filesystems don t support DVD sized files so if you use the DVD you can only use the tohd cheat code on NTFS and Linux filesystems This cheat code expects you to pick the partition using Linux device names so if you want to use the first partition on your Primary IDE hard drive type tohd dev hda1 If you are unsure which device name to use simply boot Knoppix from the CD and make note of the names on the hard drive icons on your desktop You can use any one of these devices that has enough available space As with the toram cheat code tohd requires you to have over 700 MB free on your partition for the CD and over 4 4 GB free for the DVD Knoppix cop ies its disk image into a directory called knoppix at the root of the partition that you specify One advantage to using the tohd cheat code is that the knoppix directory it copies is not deleted when you reboot In subsequent boots you can refer ence the already copied image by using the fromhd cheat code So if you have previously used the cheat code tohd dev hda1 on a computer type this command to use the same image again fromhd dev hda1 You can even just type fromhd without any arguments and Knoppix scans the hard drive partitions for you 14 Chap
232. configurations it will use and gives you the option to change them Select yes to launch a full ncurses based X configuration tool with options to configure your mouse keyboard monitor video card screen and layout This option is great for systems needing some extra tweaking to get X working correctly as you get a finer level of control over options than cheat codes can provide After X is configured Knoppix fin ishes its configuration and launches into the graphical desktop environment Check RAM for Errors with Memtest86 Memtest86 is a stand alone BIOS based memory test designed for x86 computers It s an updated version of the original Memtest86 software that adds more updated hardware compatibility The official project page is at http www memtest org and lists detailed information about the program This software is included with Knoppix and can be launched with the memtest kernel mode option Instead of booting into Knoppix you boot directly into the Memtest86 software and start the scan Memtest86 runs a number of different types of memory tests in an indefinite loop but a sin gle pass should be sufficient to determine whether a system has bad memory Chapter 1 Boot Knoppix 23 HACK 11 HACK 11 Check RAM for Errors with Memtest86 and should be replaced RAM errors can lead to frustrating system instabil ity and random lockups Memtest86 runs several relatively quick tests that include writing dif
233. connected to them The standard output should Chapter 5 Put Knoppix in Your Toolbox 187 HACK 60 HACK 60 Test Hardware Compatibility give you some basic information about which devices Linux has detected on the system lspci 0000 00 00 0 Host bridge Advanced Micro Devices AMD AMD 760 MP IGD4 2P System Controller rev 11 0000 00 01 0 PCI bridge Advanced Micro Devices AMD AMD 760 MP IGD4 2P AGP Bridge 0000 00 07 0 ISA bridge Advanced Micro Devices AMD AMD 766 ViperPlus ISA rev 02 0000 00 07 1 IDE interface Advanced Micro Devices AMD AMD 766 ViperPlus IDE rev 01 0000 00 07 3 Bridge Advanced Micro Devices AMD AMD 766 ViperPlus ACPI rev 01 0000 00 07 4 USB Controller Advanced Micro Devices AMD AMD 766 ViperPlus USB rev 07 0000 00 0c 0 Ethernet controller Lite On Communications Inc LNE100TX Linksys EtherFast 10 100 rev 25 0000 00 0d 0 Multimedia audio controller Aureal Semiconductor Vortex 2 0000 01 05 0 VGA compatible controller nVidia Corporation NV11 GeForce2 MX MX 400 rev a1 In this output there are two basic columns The first column lists the bus slot and function for a device in hexadecimal The next column lists the type of device and any identification it can find for the device The first few lines of output simply list information about different bridges on the moth erboard but the last few lines list a number of devices that are connected to the PCI
234. correct path to your tarball If you don t have the DVD If you don t have access to the Knoppix DVD then you will need to download a copy of the kernel source that matches the Chapter 3 Tweak Your Desktop 101 HACK 34 HACK 34 Install Nvidia 3D Drivers kernel version your Knoppix CD is using To check the current version of your kernel type knoppix Knoppix uname r 2 6 19 Then go to ftp kernel org and download the tarball that matches that kernel source and extract it in the usr src directory Then you will need to actually build the kernel tree so that the Nvidia installer has the files it needs noppix Knoppix wget ftp kernel org pub linux kernel v2 6 linux 2 6 19 tar gz noppix Knoppix cd usr src noppix Knoppix usr src tar xfvz home knoppix linux 2 6 19 tar gz noppix Knoppix usr src cd linux 2 6 19 noppix Knoppix usr src linux 2 6 19 cp boot config 2 6 19 config noppix Knoppix usr src linux 2 6 19 make oldconfig noppix Knoppix usr src linux 2 6 19 make bzImage Note that depending on the kernel source tree you might need more than 512 Mb available to build this tree If your machine doesn t have this much ramdisk you can still install the Nvidia drivers but you will need to mount external storage either a local hard drive or a USB key and dump the kernel source there then create a symlink to that source tree within the usr src directory For instance if you have
235. cover Chapter 8 Knoppix Reloaded 295 HACK 101 Full Protection with S T D a deleted file or you need a full case management system Autopsy Sleuth kit provides it all wrapped in a well designed web frontend Sleuthkit uses a predefined mount point named mnt evidence as its evi dence locker and stores all of its output under S T D By mounting anything you want to the mount point you can carry Sleuthkit output from machine to machine This mount point might be a local drive or a remote share although it is probably more convenient to use an encrypted USB stick In addition to the forensic workhorse dd S T D provides dcfldd The U S Department of Defense Computer Forensics Labs extension to the standard dd Among other things it can automatically produce an MDS hash as part of a forensic backup Foremost Used to search through a forensic backup for specific file types such as JPG or DIVX files ClamAV A GPL antivirus program You can boot a suspect machine with S T D mount the local hard drives and scan for viruses without having to trust the host OS see also Scan for Viruses Hack 93 The command to scan is clamscan If you have Internet access you can also update to the most current signature set by running freshclam chkrootkit Looks for your standard root kit infection see also Check for Root Kits Hack 56 there are time constraints when you are called upon to do forensics work Wh
236. cp general icmp admdog 5101 tcp NFS or llS 10254tcp lt lt BP PPP O Aust F J t To prevent null sessions see MS KB Article Q143474 NT 4 0 S 172181 34 Q246261 Windows 2000 Note that this won t completely disable null sessions but will prevent them from connecting to IPC Please see http msgs securepoint com cgi bin get nessus 020 All the smb tests will be done as in domain WORKGROUP CVE CAN 1999 0504 CAN 1999 0506 CYE 2000 0222 CA BID 494 990 tll gt Save report Close window Figure 5 7 Results from a Nessus scan Drawbacks to Using Nessus The drawbacks to using nessus are mainly that it can be slow if you re deal ing with a large number of hosts damaging if you don t pay attention and illegal if you don t have permission It can also give a false sense of security no program catches everything and it s quite noisy HIDS NIDS detect both scans and probes from nessus Remember that security is a pro cess it isn t a problem that can be solved simply by throwing software solu tions at it It s also worth noting that this is simply one part of a good security analysis of your network Another more comprehensive audit is cer tainly called for Nessus may be up to the task but I d recommend some thing more apt for the job such as metasploit If you re seriously interested in security t
237. ctories to this list You can even modify a configs tbz file after the fact to update add or delete files This can provide a quick shortcut to recreating the entire file as you can add remove or update individual files or directories You might use this if you are mostly pleased with the files that saveconfig backs up and only want to add one extra directory You will need to decompress the tar file first with the following bunzip2 configs tbz To add a file replace the c argument create with the r argument append tar rpPf configs tar path to file To delete a file replace the c argument with the delete argument tar delete pPf configs tar path to file When you are happy with your changes compress the tar file and rename it to its original name BZIP2 9 bzip2 configs tar mv configs tar bz2 configs tbz Install Programs While this setup is typically used for saving your settings you can also work around having to install programs with this method One way to do this is to include the deb package for the program you want to install inside the KNOPPIX directory on the CD along with your configs tbz and knoppix sh file In the knoppix sh file just add a line that says dpkg i cdrom KNOPPIX packagename deb Advantages Over Remastering There are other advantages to using these tweaks over a full remaster For one you can carry your custom knoppix sh script and any other files it needs with you on a U
238. cute it This script will extract configs tbz and otherwise restore your settings If you are the kind of person who likes to hack around with things you might think to yourself Hmmm I bet I could tweak that knoppix sh script and do other things at boot And you would be right the knoppix sh script is the key to remaster Knoppix without remastering 360 Chapter 9 Knoppix Remastered Remaster Knoppix Without Remastering The knoppix sh script The knoppix sh file is a simple shell script When Knoppix boots it scans the KNOPPIX directory on the CD for a knoppix sh file or if you use the myconfig scan cheat code it will also scan other devices on your system If it finds this file it will execute it Windows users can think of this file as an autoexec bat script You can basically put any series of commands into this script and Knoppix will execute them upon startup A typical knoppix sh script looks like this bin sh id u o echo You need root privileges to modify the system gt amp 2 exit 1 d 1 amp amp CONFIGS 1 configs tbz f CONFIGS CONFIGS cdrom KNOPPIX configs tbz f CONFIGS CONFIGS mnt floppy configs tbz if f CONFIGS then echo 1mExtracting config archive CONFIGS Om tar jpPtf CONFIGS while read i do rm f i done tar jpPxf CONFIGS chown R knoppix knoppix home knoppix fi The best way to get starte
239. d how to use some other common Windows file locations under Knoppix To use your Windows program settings locate the Windows equivalent of the home directory For Windows 2000 and XP this directory should be called Documents and Settings and is usually at the root of the C drive Click on each of the hard drive icons on your Knoppix desktop and look for this directory and find all the user directories that contain user specific applica tion configuration files In my examples the user is called knoppix so all of the configuration files are stored under C Documents and Settings knoppix Mozilla Mozilla is probably the most likely application you would use both in Win dows and under Knoppix As I mentioned in Hack 27 Firefox stores its con figuration settings under a directory with a randomly generated name so you must first find that directory both in home knoppix and on your Win dows partition Make sure you run Firefox under Knoppix at least once and make note of the directory name under home knoppix mozilla firefox which should resemble xxxxxxxx default with each x replaced with a ran dom character Assuming your Windows partition is hdal make sure the drive is mounted open a terminal and type knoppix ttypo knoppix cd mnt hda1 Documents and Settings username Application Data Mozilla Firefox Profiles Type 1s here to reveal a directory named yyyyyyyy default where each y is replaced with a different random ch
240. d reports that there are fixable corruptions then the next step is to fix those corruptions with the following command knoppix ttypo knoppix sudo reiserfsck fix fixable dev hda1 Otherwise if reiserfsck reports fatal corruptions and exits with a status of 2 then you must make a backup of the complete partition if possible with dd or another tool Hack 58 Then cross your fingers and attempt to rebuild the entire filesystem with this command knoppix ttypo knoppix sudo reiserfsck rebuild tree dev hda1 It is important that you do not interrupt the rebuild process If you do inter rupt it the filesystem remains in an unmountable state until you finish rebuilding the tree XFS Like ReiserFS XFS comes with its own set of filesystem check and recovery tools XFS uses xfs_check and xfs_repair for these tasks To check an XFS filesystem for inconsistency run knoppix ttypo knoppix sudo xfs_check dev hda1 Replace dev hda1 with your partition Xfs_check generates output that indi cates that it has found inconsistencies on the filesystem that must be repaired To repair the filesystem run knoppix ttypo knoppix sudo xfs_repair dev hda1 The xfs_repair utility outputs information about the repairs it is making but does not prompt you to approve any of the changes so be sure you have backed up any important files before running the repair just in case The xfs_check manpage also lists xfsdump and xfsrestore to mov
241. d the attack and alert you that something untoward is happening Most attackers are relatively sloppy during their initial investi gation and testing period where they are feeling you out If you have an IDS and pay attention to what it is telling you it is very likely you will catch an attack long before it escalates In the world of IDS Snort reigns supreme It is an extremely powerful open source IDS system that is mature widely supported by a huge community of helpful users and under constant development If you are interested in learn ing about IDS then Snort is the place to start your reading S T D includes Snort and also contains MySQL to log the Snort data and ACID as a web frontend to monitor and manage alerts In the current version of S T D there is a small bug in starting S A M snort ACID MySQL In order to get S A M to run properly under S T D you must do the following From a shell initiate Snort knoppix ttypo knoppix sudo usr bin ids snort init This copies the necessary files from the CD to RAM to make them read write Now we start S A M from FluxBox or preferably from the console knoppix ttypo knoppix sudo usr bin ids acid start Starting MySQL database server mysqld Starting web server apacheProcessing config directory etc apache conf d gt Barnyard lt Version 0 1 0 Build 17 By Andrew R Baker andrewb snort org 300 Chapter 8 Knoppix Reloaded HACK Full Protection with S
242. d very stable Its current version XFCE4 has kept these key features Here is the struc ture of the 10 drawers that appear in the desktop s menu bar of Freeduc CD version 1 4 Basic computer access Includes killing destroying a window formatting a floppy and opening a terminal Internet Includes Mozilla gftp and sylpheed Mathematics Includes Dr Geo gnumeric and gtkgraph Sciences Includes gstar pymol kstars and chemtool Audio Includes audacity rosegarden and gmplayer Technology Includes dia pcb tkgate qcad tuxpaint and the Gimp Geography Includes xrmap and grass Languages Includes gnome dictionary hanzim and collatinus Educational games Includes gcompris freeciv xlincity and xboard Word processing and help tools Includes OpenOffice org abiword scribus and tkman About 40 applications for education and teaching are available on the CD ROM some such as GCompris and Dr Geo we developed ourselves Newer releases of Freeduc CD have been published 280 Chapter 8 Knoppix Reloaded HACK Damn Small Linux 98 Freeduc CD version 1 5 is targeted to primary schools and it contains a very complete set of applications dedicated to basic lessons for reading count ing and so on that are named Logiciels du Terrier and were written by a large team of teachers In addition there are two creativity environments kidistb the kid s storyboard editor and the powerful Squeak environment The
243. d with tweaking this file is to run the saveconfig script once to generate a knoppix sh file to work from There are various checks this script runs but its basic function is to extract the configs thz file Based on the settings you saved this file will overwrite settings in etc or home knoppix You can simply change the configs tbz file if you want to add or remove files with the settings you want It s important to remember that at the time knoppix sh runs home knoppix doesn t exist yet that directory is copied from etc skel later so while you might think that you can just add a cp filename home knoppix command to the script it will fail when you run it If you want to copy files to home knoppix you will need to create a tarball from that includes those files This way the home knoppix directory will be created for you when the tar ball is unpacked during the boot process Customize configs tbz Because configs tbz is just a tar file compressed with bzip2 you can bypass the normal saveconfig script altogether and use the same tar command it uses on the command line Doing this enables you to specify exactly what you want to backup For example this command would back up my Mozilla including Firefox settings BZIP2 9 tar cpPjf configs tbz home knoppix mozilla Chapter 9 Knoppix Remastered 361 HACK 117 HACK 117 Remaster Knoppix Without Remastering You can add any number of files and dire
244. date with the latest news and tips 332 Chapter 8 Knoppix Reloaded CHAPTER NINE Knoppix Remastered Hacks 109 120 Were it not for open source software Knoppix as we know it today would not exist Almost all of the software on the Knoppix disk including Klaus s own scripts uses the GPL or a different OSI approved license Because these licenses allow and even encourage the reuse and modification of software Klaus Knopper was able to piece together software that he wanted to use and put it on a disk of his own without having to hire an attorney to navi gate copyright legalities or pay any licensing fees Knoppix itself is an open source project and as Chapter 8 shows many people have taken Knoppix and have further customized it for their own needs Many Knoppix based projects have been started simply because someone wanted Knoppix to have an extra piece of software Other more involved projects have taken the Knoppix base and changed it almost com pletely Creating your own customized Knoppix disk isn t that difficult especially once you get the hang of it If you have started using Knoppix but have found that there is a certain piece of software missing that you want or need this chapter is for you Once you start creating your own Knoppix based distributions you will dis cover many more uses for Knoppix than you may have previously thought possible Many of these uses are of particular interest for a business As m
245. default option tells the boot loader which operating system to boot if the timeout has passed In and below the default option for each operating system notice the syntax that looks like multi 0 disk 0 rdisk 0 partition 1 This syntax describes which partition the operating system is on Each section of that partition description has a special meaning regarding which IDE adapter the parti tion is on which disk is on that adapter and so on but the section that is probably of most interest is rdisk 0 partition 1 The rdisk 0 section denotes which disk on an adapter to boot from numbered from 0 and partition 1 lists which partition on the drive to boot from numbered from 1 In the example the second section of the operating systems line tells the boot loader where to find the Windows system files on that partition Typi cally this is either the WINNT or WINDOWS directory The next part of the line in quotes controls which text the user sees in the boot loader menu You can change this setting to label the operating system of your choice As an example assume that you have a system like the boot ini describes a Windows 2000 installation on the first partition of an IDE drive and Windows XP Professional installed on the second partition You can resize the Windows 2000 partition and create a second partition from the empty space from within Knoppix which makes Windows XP Professional the third partition After you resize change your set
246. der Knoppix ramdisk the next time you reboot unless you set up persis RK Remember that all these settings will be deleted from the tent settings described in Hack 26 Chapter 3 Tweak Your Desktop 85 HACK 28 HACK 29 Make a Kiosk Make a Kiosk i Turn a regular Knoppix disk and a computer into your own kiosk for a tradeshow an Internet caf or even a basic web terminal A great way for a business to provide custom web applications to a cus tomer or single task employees is to set up a low priced computer as a kiosk A kiosk allows a user to perform a limited range of options such as watch a demonstration browse through a set of instructional pages or search a com pany s intranet In terms of software these applications need only a web browser with most of its functions disabled and a web page for the browser to load A few tweaks turn a vanilla Knoppix disk into your own personal kiosk In the original version of this hack I went over steps to create a custom HTML page with JavaScript to create the kiosk Since the book was pub lished though the kiosk hack has been incorporated into Knoppix itself To enable kiosk mode use the following cheat code at the boot prompt boot knoppix desktop kiosk url http www oreilly com When you specify the kiosk desktop that tells Knoppix to create a home knoppix kiosk html file with the special JavaScript then to start X without any window management Instead
247. dirk eddelbuettel com quantian html adds a quantitative facet to Knoppix Based on ClusterKnoppix Hack 103 Quantian adds software with a quantitative numerical and scientific focus several computer algebra systems higher level matrix languages data visualization tools a variety of scientific numeric and engineering applications as well as many different programming languages and librar ies A particular focal point is the R language and environment for statistical computing With its unique combination of the Knoppix based ease of use and the addi tions of both openMosix cluster computing and a very rich set of scientific packages Quantian can be of immediate use It allows to e Create computing clusters from standard hardware in order to speed up embarrassingly parallel tasks e Re use computer labs by enabling temporary use of a parallel comput ing environment booted off a DVD that can netboot other machines e Enable students and coworkers to work in identical environments with minimal administration cost by distributing DVDs e Provide convenience to users so they do not have to chase down new software releases and then manually configure and install them e Provide easier installation of a normal scientific workstation by booting off Quantian and installing that system to hard disk resulting in over 7 GB of configured software e Provide a familiar environment to work in during trips to conferences or other campuse
248. disconnect by pressing Ctrl C in the GRPS connection terminal Jake Appelbaum Explore the Internet f Browse the web check your email and chat with your friends with Knoppix s Internet applications While Knoppix contains plenty of useful tools that don t require a network connection with connectivity you can use Knoppix to browse the Web check your email send instant messages to friends chat and even set up a video conference This hack covers many of the utilities located under the K Menu gt Internet menu 62 Chapter 2 Use Your Knoppix Desktop Explore the Internet Web Browsers Chances are the one thing you want to do most on the Internet is browse the web Knoppix includes two web browsers Konqueror and Iceweasel which should be adequate for all your web browsing needs Konqueror is KDE s default web browser and is actually the web browser that greets you as you start the Knoppix desktop If you want to immedi ately browse the Web simply type the URL into the location bar at the top of the Konqueror window Konqueror supports tabbed browsing To open a new tab hit Ctrl Shift N or middle click on a link in the browser window Konqueror is configured to support Java and JavaScript but Flash support requires that you visit the http shockwave com and install the Flash plug in If you hate web pop up ads you re in luck Konqueror supports blocking pop up windows To enable blocking click Settings
249. distribution as you can get Knoppix is based on the Debian GNU Linux distribution but Knoppix uses a unique mix of packages from the stable testing and unstable branches as well as from other unofficial Debian repositories As a result even if you select the Debian system install type you won t get the same system as if you had installed Debian unstable from scratch There are some steps you can perform however to get closer to a Debian unstable system The installation process for this system is almost exactly the same as for Hack 41 Remember with the Debian system type Knoppix does not include its hardware detection scripts in the install so make sure that you have all of your hardware detected and configured before you start the install In order to convert the install to Debian the real work begins after the files have been copied and you boot into the new system 122 Chapter 4 Install Linux with Knoppix Convert Knoppix to Debian Unstable Configure APT Once you boot into your new Knoppix install you must change your Advanced Package Tool APT settings APT is a management system for software packages Under Debian it provides a series of tools to ease install ing removing and updating packages The most commonly used APT tool is apt get which automates downloading packages and their dependencies for installation When you tell apt get to install a package it finds the new est version of the package from
250. djust the date and time you must create a root pass word To do so click K gt Knoppix gt Set password for root or open a ter minal window and type knoppix ttypo knoppix sudo passwd Enter new UNIX password Retype new UNIX password Passwd password updated successfully Experiment with the panel Click and drag icons to move them around on the panel Drag the applet handles to move them Right click icons and applets to see a list of options for the applet including removing it from the panel com pletely Drag icons from the desktop or the K Menu and drop them on the panel to add them To resize the panel right click on it and choose your size from the Size menu Remember that all of the changes you make are not per sistent unless you save your Knoppix configuration Hack 26 j 13 Customize the Desktop Look The look of Knoppix s default desktop doesn t appeal to everyone KDE has many tools to change the look and feel of the desktop Let s face it People have different tastes The themes window borders fonts and colors that Klaus Knopper has chosen for himself might not appeal to you If you don t like how Knoppix looks by default you ll be pleased to find that Knoppix s flexibility extends to changing how it looks 34 Chapter 2 Use Your Knoppix Desktop Customize the Desktop Look Appearance and Themes Probably all of the changes you want to make in how the desktop looks and feels can be made fro
251. dows icons and strange panels are for If you have successfully booted Knoppix as mentioned in Chapter 1 you should now be looking at the default Knoppix desktop as shown in Figure 2 1 s g o Knoppix 5 1 0 Konqueror Location Edit View Go Bookmarks Tools Settings Window Help E gt Location cdrom index html O CD inhaltsverzeichnis KNOPPIX Webseite Hard Disk ESES KNOPPI Figure 2 1 The default Knoppix desktop The Desktop Probably the first element that grabs your attention is the Konqueror web browser window that opens when K Desktop Environment KDE is started KDE is one of the two most popular desktop environments for Linux Gnome being the other KDE s job is to manage your complete desktop environment It draws your wallpaper provides you with access to your pro grams through the menus and icons on the desktop and manages the win dows that appear once you launch an application Once KDE starts the first thing you see is the Knoppix help page This web page contains information and help for Knoppix in many different languages and includes links to sites to purchase Knoppix CD or DVDs as well as get additional information 28 Chapter 2 Use Your Knoppix Desktop Explore the Desktop The help is available offline which makes it very useful even when your net work connection isn t working The desktop itself contains shortcuts to the hard drives
252. e yes checking for gawk gawk checking whether make sets MAKE yes checking for a BSD compatible install usr bin install c checking for bash bin sh configure creating config status config status creating Makefile config status creating src include begin sh config status creating src include copyright sh config status creating src include end sh config status creating src include vars sh rm f dd_rhelp echo bin sh gt dd_rhelp cat src include begin sh gt gt dd_rhelp cat src include copyright sh gt gt dd_rhelp cat src include GPL sh gt gt dd_rhelp echo TODO gt gt dd_rhelp cat TODO sed s g gt gt dd_rhelp cat src include vars sh gt gt dd_rhelp echo Including libcolor sh gt gt dd_rhelp cat src include libcolor sh gt gt dd_rhelp echo Including libcommon sh gt gt dd_rhelp cat src include libcommon sh gt gt dd_rhelp cat src dd_rhelp sh gt gt dd_rhelp cat src include end sh gt gt dd_rhelp chmod ugo x dd_rhelp knoppix ttypo dd_rhelp 0 0 6 sudo make install Chapter 6 Repair Linux 219 HACK 72 HACK 72 Rescue Files from Damaged Hard Drives Mount the drive to which you are saving the image with read write access You don t need to mount the problem drive if the drive is far enough gone you aren t able to mount it anyway Then run dd_rhelp knoppix ttypo knoppix sudo mount o rw dev hdb1
253. e These are the three branches of Debian that Morphix is derived from lt arch gt With this tag you define the architecture for which you are building your module Using an architecture different from the host system isn t recommended and can lead to very interesting errors It defaults to the architecture of your host system which should be fine most of the time There are a few other tags and command line options for Mmaker consult the documentation for details After your module is built which takes some time without a local Debian mirror your uncompressed module exists in a directory in your tmp direc tory MMaker outputs details of how to recompress it if necessary Hope fully MMaker is useful in letting Morphix work for you See Also e The Mmaker Wiki page at http hwww morphix org wiki index php ModuleMaker e MapLab tutorial map 116 Change the Default Language on an ISO Image Change the language of a Knoppix release without remastering A common request Knoppix users make is How can I change the default language without using a cheat code Knoppix releases usually come in German and English varieties but if neither of those are your default lan guage you probably don t want to hassle with a cheat code every time you boot In addition there are special Knoppix releases that appear online every year that are created specifically for CeBIT the German computer expo 358 Chapter 9 Knopp
254. e convert it to a tar file and then untar it in the mounted root directory Here are the steps to use tar and alien to install the package Alien is a handy tool that acts as a translator between tgz rpm and deb packages and can convert a file in one format to any of the others Use alien to convert the package to a tar file before unpacking knoppix ttyo knoppix ttyo knoppix ttyo knoppix ttyo knoppix sudo alien to tgz dpkg _version_i386 deb knoppix sudo mv dpkg_version_i386 tgz mnt hda1 knoppix cd mnt hda1 hda1 tar xzvf dpkg_version_i386 tgz While there are many other packages you can leverage on Knoppix to fix broken Debian systems generally it s best to fix the Debian system while you are booted into the system itself Use Knoppix to repair those packages that prevent you from booting then boot into Debian and repair the rest from there 244 Chapter 6 Repair Linux HACK Repair RPM Packages 84 7 Repair RPM Packages i fef e741 Knoppix not only comes with Debian packaging tools it also comes complete with support for creating and installing RPMs While it might not be news to you that Knoppix comes with Debian packag ing tools it might surprise you to know that Knoppix also comes with many corresponding RPM packaging tools including rpm rpmbuild rpmquery and rpmverify With these tools you can actually use Knoppix to repair packages on an RPM based system that is preventing it from booting T
255. e testing and unstable packages Be sure when you upgrade that you use apt get upgrade and not apt get dist upgrade otherwise all the stable packages on the system are upgraded to testing Also even if you are running a com plete Debian unstable system apt get dist upgrade should still be avoided as it installs all packages that have been held back temporarily even if installing the packages results in removing other essential files on the system F4 By default Knoppix uses a mixed repository of Debian As this command runs you can watch as package lists are downloaded from each repository If you have trouble connecting to one of the repositories exit the program with Ctrl C and rerun the command If you still have trou ble connecting you might need to wait until the repository is responding before you update After the program completes your system has a list of the new package versions available and it s time to upgrade the packages to the new versions root ttypo apt get upgrade Reading Package Lists Done Building Dependency Tree Done The following packages have been kept back The following packages will be upgraded Chapter 9 Knoppix Remastered 349 HACK 112 Keep Your Custom Disk Up to Date 397 upgraded O newly installed 0 to remove and 21 not upgraded Need to get 275MB of archives After unpacking 21 1MB of additional disk space will be used Do you want to continue Y n A good ge
256. e your computer is still fully functional while you compile the base Gentoo system which provides you with some additional advantages First the compilation pro cess for a Gentoo install can take hours so with Knoppix you can browse the Web play games and get work done while the system compiles in the background Second you can browse the Web with a graphical web 124 Chapter 4 Install Linux with Knoppix Install Gentoo with Knoppix browser so if you run into a roadblock in the installation process you can head straight to the Gentoo forums at http forums gentoo org to ask a ques tion The installation instructions are also readily accessible http www gentoo org doc en handbook handbook x86 xml so there is no need to print them out The instructions are very thorough and explain not only what each step is but also why it is necessary These two reasons are also true for installing Gentoo from a RK chrooted environment on an existing Linux install if you didn t want to install via the Knoppix method Knoppix gives you the advantage of using the entire hard disk for your Gentoo install If you have only a single hard drive and Linux is already on it you can t exactly wipe it entirely clean while you are in the middle of using it Installing Gentoo from Knoppix requires very few additional steps First boot your Knoppix CD with the noswap cheat code This cheat code tells Knoppix not to automatically use any exis
257. e CD included with the original Knoppix Hacks I didn t want to change around the actual KNOPPIX compressed filesystem but I wanted to create a custom back ground and add a few links to the desktop I created a tarball of the desktop links and changed the background jpg on the CD This way I wouldn t unknowingly risk introducing any bugs into the compressed filesystem something that was rather important since I couldn t modify the CD after it was shipped with a book If you are a Knoppix user who is thinking of starting the remastering pro cess I recommend trying knoppix sh tweaks first You ll likely save yourself time and blank CDs in the process Change default boot settings on the CD without changing the compressed filesystem Y7 Change Boot Defaults Without Remastering E One of the more common reasons people remaster is that they would like to use a particular cheat code every time Knoppix boots For instance if you use Knoppix s kiosk mode Hack 29 you might want to create a custom CD that always boots into that kiosk without having to type anything in While you could resort to completely remastering Knoppix to make these kind of changes instead you can just create a copy of the CD and change just a few of the files This not only saves you from the time it takes to compress the Knoppix filesystem but it also reduces the risk of introducing bugs on the disk All the files Knoppix references for boot defaults ar
258. e Employ Knoppix as a system administration multitool to replace failed servers and more e Rescue Windows systems with Knoppix to repair file systems back up files and settings hack the registry and more e Create a kiosk or other special use computer e Create quick and dirty wikis nameservers and file servers for temporary or emergency use e Explore other live CDs based on Knoppix e Easily install popular Linux distributions including Debian and Gentoo with all your hardware detected and configured e Remaster Knoppix to include your favorite software or custom branding Whether you re a new Linux user power user or system administrator this book helps you take advantage of Knoppix and customize it to your needs You may just find ways to use Knoppix that you never considered Got a Hack Go to hacks oreilly com O REILLY US 34 99 CAN 41 99 www oreilly com ISBN 10 0 596 51493 X ISBN 13 978 0 596 51493 8 gt bey mum iting Safari meessse 9 8 780596 51493 Books Online Details on last page
259. e a new image named webcam jpg under var www While you could just load webcam jpg directly you might as well set up a quick index html file for your webcam server Start up your text editor again with root privileges and open var www index html Replace the contents inside with the following very basic page lt HTML gt lt HEAD gt lt META HTTP EQUIV Refresh CONTENT 60 URL gt lt TITLE gt Welcome to the Webcam lt TITLE gt lt HEAD gt lt BODY gt lt H1 gt Welcome to the Webcam lt H1 gt lt p gt Powered by Knoppix lt p gt lt img src webcam jpg gt lt p gt Updates every minute lt p gt lt BODY gt lt HTML gt This page will display the image and automatically refresh every 60 sec onds The final step is to start the web server on Knoppix so it can serve this page sudo etc init d apache start Now browse to http localhost in your browser and you will be able to see your new webcam page If you want to view the page from another com puter just browse to your server s external IP address Type sbin ifconfig into a terminal to find out the current IP address for your external interface likely something like etho Rad Now that you have set up the webcam server you can create a persistent disk image see Create Persistent Knoppix Set tings Hack 26 and restore your webcam settings the next time you boot wr Create a Weekend Wiki 64 Use Knoppix for a quick wiki platform f
260. e found in the boot directory on the disk Here are a list of the files along with their function Chapter 9 Knoppix Remastered 363 HACK 118 Change Boot Defaults Without Remastering boot isolinux boot Configuration files for the messages that appear at the boot prompt bootfisolinux f2 Messages that appear at the boot prompt when you hit F2 boot isolinux f3 Messages that appear at the boot prompt when you hit F3 boot isolinux german kbd German keyboard settings boot isolinux isolinux bin The ISOLINUX boot loader for the CD boot isolinux isolinux cfg Configuration settings for ISOLINUX This file contains each of the possible kernel options for the boot prompt and what they do It also controls which files are referenced for the boot messages I discuss this file in more detail later in this chapter boot isolinux linux The Linux kernel image boot isolinux logo 16 This is the ISOLINUX compatible logo that appears on the boot screen To edit this image copy it to a temporary location and convert it to PPM format so that you can edit it with a program such as the GIMP lss16toppm lt logo 16 gt logo ppm Once you are finished editing the image convert it back to its original format and then copy it back to boot isolinux ppmtolss16 lt logo ppm gt logo 16 boot isolinux memtest The Memtest86 kernel Change Cheat Codes The boot isolinux isolinux cfg file is the main file to look for wh
261. e hcitool program to manually scan for discoverable Bluetooth devices knoppix ttypo knoppix sudo hcitool scan Scanning 00 0A D9 7D B8 93 Get Hacked 00 60 57 4F 49 98 Fonbot After you find your device and its address enter the address at the prompt Assuming that the script finds your device it will present you with a list of devices Select your device in my case Fonbot and click OK Next you are prompted for your Bluetooth PIN Nearly all phones and Bluetooth devices default to a PIN of 1234 just like my luggage combina tion a very strong default password it s clearly hard to guess The next screen asks you if you would like to set dev modem to point to your newly configured device Click Yes You are now given a list of cell phone providers to choose from see Figure 2 14 This is the tricky part My Nokia 3650 has service with T mobile in San Francisco but if you choose the Knoppix default of T Mobile Chapter 2 Use Your Knoppix Desktop 59 HACK 20 HACK 20 Connect to the Internet with GPRS Bluetooth it does not work This means I have to manually enter the correct init string for my provider so I select Other GPRS Provider Please select your cellphone provider default No Change wo 02 we E Plus wV Vodafone w t T Mobile nther ITNTT Strinm o Figure 2 14 List of GPRS providers If you select Other you are asked to enter the custom i
262. e index This configuration window won t let you install Venetian blinds on your desktop but you can change how the titlebar and borders on your windows look Click on the drop down menu to select among many different win dow border options Look in the preview window below the options to watch your changes in action To change the order buttons appear on the titlebar check Use custom titlebar button positions and drag buttons around in the example window How s that for customization Look Like That Other OS Now that you are familiar with how to change the look of your desktop let s practice changing settings Here s a quick recipe for making your desktop look like that other operating system Versions of Windows prior to XP came with various solid color default backgrounds To duplicate the look of a Windows 2000 desktop open the background configuration window check No picture and select Single Color in the Colors drop down menu Then click on the first color by default it should look blue and make sure that it is set to the following R 30 G 114 B 160 a bit of red a dab of green and a dollop of blue give you the final desktop color Then click Apply to commit the changes Windows 2000 has a very pleasing blue and gray color scheme To use a very similar scheme in Knoppix click on Colors in the index select Red mond 2000 from the Color Scheme list and click Apply The finishing touches are to give your
263. e labeled TIMEOUT are some isolinux settings you can tweak including how long to wait before booting the default image and what files to reference when you hit the different function keys For instance if you wanted to create a special page that appeared when you hit F4 add a line below F3 f3 So that it looks like F3 f3 F4 f4 Then copy the boot isolinux f3 file to boot isolinux f4 and edit it to say what ever you like Each line that begins with LABEL describes a new set of boot options For instance the line that begins with LABEL knoppix is the default Knoppix image selected when you type knoppix at the boot prompt To add cheat codes that apply whether the user hits Enter or whether they add cheat codes of their own add them not only to the default label at the top of the file but also here Chapter 9 Knoppix Remastered 365 HACK 119 Tweak the initrd Without Remastering Once you complete any changes to these files just create a new CD or DVD with the files you have changed replacing the originals Modify startup scripts in the initrd file to change boot behavior without remastering i 19 Tweak the initrd Without Remastering When the Knoppix kernel boots it mounts a special filesystem located in boot isolinux minirt gz This filesystem has modules and binaries essential to booting In addition this file contains some of crucial boot time scripts that Knoppix runs You can take advantage of these scripts to
264. e modular structure of Morphix under neath An interesting ability of mainmodules is that these don t neces sarily have to be Debian based Morphix has Slackware Fedora and SUSE derivatives showing the flexibility mainmodules provide minimod Minimodules are a third type of module Essentially compressed images with a script inside minimodules can be as simple or as complex as you want them to be They are mounted alongside the mainmodule at boot time For demonstration purposes here are a few examples e Morphix Game 0 4 1 has an Enemy Territory minimodule This module seamlessly integrates with Morphix Game 0 4 1 and if a morpher decides he doesn t want to include Enemy Territory he sim ply removes its minimodule e Morphix Gnome and KDE 0 4 1 have a WINE minimodule Like wise if a morpher doesn t want to include WINE on his live CD he simply has to remove this file from his live CD image There are minimodules for console specific tools Quake 3 Arena and Unreal Tournament 2003 demos OpenOffice org Speedtouch USB modems PHP4 Nanoweb MySQL and a whole range of others Morphix offers preliminary scripts to automatically generate these minimodules from Chapter 9 Knoppix Remastered Morph Morphix Debian packages however this area is still under quite a lot of discussion and development You can also do more down to earth changes using minimodules If you want to have different minimodules containing diffe
265. e partition type the filesystem and any flags the partition has Reference this information as you use the resize command Once you have found the partition you want to resize note its minor num ber where it starts and then where you want it to end Parted displays the start and end values in megabytes so if you want to grow a partition by 500 MB add 500 to the end value If you want to shrink the partition by 500 MB simply subtract 500 from the end value Once you are ready to resize type parted resize 1 0 031 2000 000 where 1 is the minor number for your partition 0 031 is the starting point in megabytes and 2000 000 is the ending point in megabytes Of course replace these values with the actual values of your partition Once you are finished exit by typing parted quit There are many other filesystem specific tools on Knoppix that can resize partitions such as resize2fs resize_reiserfs and xfs_growfs but QTParted and parted take much of the work and risk out of resizing your partitions and if possible I recommend trying these utilities before using filesystem specific utilities Ma Repair Damaged Filesystems 70 Benefit from utilities included with Knoppix to repair corrupted filesystems including ext2 ext3 ReiserFS and XFS Whether it s due to a system that has lost power due to a drained UPS a bad IDE cable an IDE bus error or some other bug filesystems are sometimes damaged and must be repaired
266. e password and save your changes unmount the filesys tem and reboot knoppix ttyp1 config cd knoppix ttyp1 knoppix sudo umount mnt hda1 Chapter 7 Rescue Windows 263 HACK 90 HACK 91 Edit the Windows Registry When you boot back to Windows the password should be blank so you can log in and change the password with the regular Windows tools Edit the Windows Registry The chntpw tool not only resets an Administrator password but it also comes with a full fledged registry editor This makes it a useful tool for solving other types of Windows problems for example deleting the registry keys put in place by a virus or worm without booting into Windows The chntpw tool mentioned in Hack 90 works by changing the values in the Windows registry This tool uses the same ability to enable you to navigate through the Windows registry much like you would navigate through a Linux filesystem and to edit values you find there Although this tool can be useful in a pinch I recommend you edit your registry using the tools included in Windows such as regedit exe This example assumes that you are using chntpw to edit a registry value that is preventing you from booting Windows Directly editing your Windows registry can be very risky and should be left to seasoned Windows administrators One bad change could render your machine unbootable Always back up your complete registry and make sure you know what you are doing be
267. e process is quite similar specify the partition to which you want to restore to and specify the image file s path that has already been created Check Restore partition from an image file instead of Save partition into a new image file Wipe a Hard Drive Securely wipe a hard drive of file traces before you get rid of it A paper shredder is a common tool in offices particularly in offices that handle financial data The shredder ensures that while it might still be possi ble to piece together a sensitive document it takes a lot more time and effort than if the piece of paper were just crumpled up Companies shred financial information yet when many companies upgrade their computers they don t bother to erase all of the sensitive data that every computer contains Even if a company formats and reinstalls an operating system on a drive that alone does not necessarily erase the files that were on the drive before and with a little effort and some recovery software an attacker could potentially recover sensitive data from the drive Knoppix contains a handy tool called shred that strives for the same goal as a paper shredder to make file recovery difficult and not worth the effort While a dedicated attacker might be able to recover a file you have shred ded it takes a lot of money and sophisticated equipment 184 Chapter 5 Put Knoppix in Your Toolbox Wipe a Hard Drive If you are truly paranoid about your dat
268. e sure that your KNOPPIX Once the script completes and the master KNOPPIX KNOPPIX file is cre ated go through the other files in the master KNOPPIX directory and cus tomize them to your liking One file of interest is master KNOPPIX background jpg which is the default background Knoppix uses for your desktop If you want to change that default simply copy a new jpg file in its place such as one from usr share wallpapers After all of the files in the master directory are customized there is just one step before you create the actual ISO image that you burn to a disk Knop pix uses md5sums to check file integrity you have changed at least one of the major files master KNOPPIX KNOPPIX so you need to regenerate its list of checksums root ttyp1 hda1 cd master root ttyp1 master xm f KNOPPIX md5sums root ttyp1 master find type f not name md5sums not name boot cat exec md5sum gt gt KNOPPIX md5sums root ttyp1 master cd root ttyp1 hda1 Now the CD image is ready to be generated This requires one final but rel atively quick mkisofs command root ttyp1 hda1 mkisofs pad 1 r J v V KNOPPIX no emul boot boot load size 4 boot info table b boot isolinux isolinux bin c boot isolinux boot cat hide rr moved o knoppix iso master Once this command is completed you should see a new knoppix iso file in the root of your partition You can burn this image to a disk just like any other Knoppix ISO
269. e the filesystem to a newly created XFS partition in lieu of the in place repair that xfs_repair performs While I have listed the primary methods you should use to check and repair a filesystem with Knoppix there are also many other filesystem specific options you can pass to these programs to suit a particular error your filesys tem might have Each of these programs has in depth manpages accessible on the Knoppix CD To list options and standard usage run knoppix ttypo knoppix man programname Chapter 6 Repair Linux 213 HACK 70 HACK 71 Recover Deleted Files Some of the more sophisticated filesystems particularly XFS have many unique options that are worth referencing as they differ from fsck See Also e The fsck manpage by typing man fsck in a console rr Recover Deleted Files Wai Recover accidentally deleted files with fls and icat When you use 7m to remove a file in Linux you generally consider that file completely gone Unlike in the DOS days you can t simply run through a list of undeleted filenames hoping your file hasn t been overwritten because Linux unlinks a file when it is removed and no longer keeps track of it other than to note that the space is free But if you have accidentally removed a very important file there is still a chance you can recover the file especially if the file is small by using the fls and icat utilities included as part of the Sleuth Kit http www sleuthkit
270. e without mapping your results will quickly become meaningless Fakeap Is a Perl script that when used in conjunction with the hostAP driver saturates the air with fake access point beacons Whilst we are not in general fans of security through obscurity there is no denying that this tool confounds many new wardrivers and can wreak havoc as part of a vulnerability test Use with caution HACK 101 Further Reading http en wikipedia org wiki Kismet_ 28program 29 http en wikipedia org wiki Airsnort Hotkeys It is worth quickly mentioning in closing that S T D has altered the pre con figured FluxBox hotkeys to be specific to the most common security tasks and tools Get to know this list It will save you time in the long run Hotkeys key binding Alt F1 Action First workspace Alt F2 Second workspace Alt F3 Third workspace Alt F4 Fourth workspace Alt F5 Root shell Alt F6 Root file manager Alt F7 Mozilla Firebird Alt F8 Text editor Alt F9 Nmap Alt F10 Nessus Alt F11 Ethereal Alt F12 Block all inbound TCP Chapter 8 Knoppix Reloaded 313 HACK 102 Distribute Compiles with distccKNOPPIX Acknowledgments We wish to thank all open source security developers out there S T D is no more than an amalgamation of a number of people s hard work and energy No matter what the press says programmers who release source code are not the enemy A special mention goes out to e All the
271. ead the report and its results Depending on the probing depth that you have selected this part of the process varies in completion time The Results If you ve made it this far you re looking for results After the progress bars reach their end the Nessus NG report is displayed with the familiar setup window For my sample scan I choose to probe a local machine The results are shown with a split screen view that makes it easy to asses the results for many hosts and subnets see Figure 5 7 In this example the results are broken into five main sections Subnet Host Port Severity and Descriptions You can see the number of open ports detected for each selected host and for each port you can see the severity of the potential security hole This host has a number of security warnings notes and holes Each different alert suggests fixes for the various problems that it has It s quite obvious that this machine is running Windows 2000 and is lacking all of the needed updates available from Microsoft Save the Report You can save the report in a variety of formats including NBE NSR XML HTML LaTeX ASCII text or even HTML with pie charts and graphs To revisit any past reports click on the load report button 172 Chapter 5 Put Knoppix in Your Toolbox Audit Network Security I netbios ssn 139 tcp nethios ns 137 udp microsoft ds 445 tcp loc srv 135 tcp general udp general t
272. ealing with a It is also possible to flood a switch with fake ARP packets If you generate enough fake ARP packets many switches will start to operate in hub mode by design ronment without practice It is relatively reliable but can on occasion cause all sorts of problems F4 Do not experiment with ARP spoofing on a production envi For the new security enthusiast sniffing is a great place to start Connect a hub to your desktop or server and attach a S T D machine and capture some traffic Sit and read the results and Google everything you do not under stand Your level of IP knowledge will increase very quickly You will also be surprised how much traffic comes from your network that you did not know about Once you are generally happy with the techniques try to pick out specific traffic features like single web pages from your desktop If you also learn to reject traffic you don t care about your sniffing will be more legible S T D includes a number of powerful sniffing tools as follows Ethereal The old name for the sniffer Wireshark and probably the most popular sniffer of all time It is licensed under the GPL available for just about every platform and allows more complex analysis with features like the ability to follow a full TCP stream Ettercap Is the next most popular sniffer Use Ettercap ARP options to sniff on a switched network and conduct MITM attacks Tcpdump A command line packet sniffer This is the clas
273. ears and carries a Swiss Army knife and a Knop pix CD with him at all times Kyle is currently the president of the North Bay Linux Users Group in California hitp nblug org Contributors The following people contributed their writing code and inspiration to Knoppix Hacks e John Andrews Damn Small Linux Hack 98 is the creator of Damn Small Linux He has no formal IT or technical computer training He likes to play with GNU tools and loves an efficient open source desk top e Jacob Appelbaum Connect to the Internet with GPRS Bluetooth Hack 20 Wardrive with Knoppix Hack 54 and Audit Network Security Hack 55 is a security professional whose interests include cryptography covert channels of communication tunneling monitoring wireless devices music activism and reading He would also like to note that he went warflying with Knoppix using kismet in the San Francisco bay area before the Tom s Hardware people did it in Southern California e Bill Childers Knoppix on Intel Macs Hack 95 is Director of Enter prise Systems for Quinstreet Inc He s been working with Linux and XV Unix since before it was cool and previously worked for Sun Microsys tems and Set Engineering In his spare time he works with the Gilroy Garlic Festival Association as one of its chairmen and enjoys playing with his children Mark Cumming Full Protection with S T D Hack 101 is a partner
274. ebian packages does require some RAM and each package increases the time your live CD takes to boot make sure you don t put too many packages in here When you want to install large packages using mini modules or mainmodules quickly becomes a better alternative Your First Morph Now that you know how a Morphix live CD can be structured it is time to make a new live CD Even if you skimmed over the last section morphing isn t hard to start with This first example is simple It changes the default background of a live CD There are plenty of scripts available to automate Chapter 9 Knoppix Remastered 355 HACK 114 HACK 115 Auto Build Morphix Modules MapLab Tutorial Map most or all of the process but I won t use them here Please note that you must be root for some of these commands For this morph you must change the contents of your CD ROM ISO So you must make sure you can access the files on it Make a directory and mount the ISO mkdir tmp morphlight mount o loop MorphixCombined LightGUI 0 4 1 iso tmp morphlight Alas you can t directly modify the files on the ISO so you must copy the files on the ISO to a new directory mkdir tmp mylivecd cp a tmp morphlight tmp mylivecd The background is located at morphix background png Instead of figuring out in which module it is located use the copy directory to copy your new background located at mybackground png for this example ov
275. ected Select the device to use and Knoppix will back up your settings to that device Knoppix stores its configuration settings in the root directory of the device in a bzipped tar file called configs thz along with a script that Knoppix runs to restore this configuration called knoppix sh To examine just which files Knoppix has saved click on configs tbz in a file manager Konqueror auto matically displays the contents of archives or run the following command in a console knoppix ttypo knoppix tar tvfj configs tbz The size of the file depends on how many program settings are being saved and if you are saving your desktop the size of any files stored there Now that you have your settings and data saved you need some way to use what you ve saved in subsequent boots This is where myconfig comes in If you have saved your settings to a removable USB drive at dev sdal boot with the cheat code myconfig dev sda1 76 Chapter 3 Tweak Your Desktop Create Persistent Knoppix Settings If you don t know which device the settings are stored on then boot with myconfig scan This command instructs Knoppix to scan for your settings on all devices it finds In general it is easier to just use the scan option unless you have saved settings at different times on different devices in which case you may prefer to explicitly tell Knoppix which device to use After Knoppix boots it then runs the knoppix sh script it created
276. ects tab 37 eight bit wide pattern of walking ones and zeros 25 email 43 applications 63 servers 150 154 emergency email servers creating 150 154 emergency file servers creating 146 148 emergency routers creating 139 146 emergency web servers creating 148 Emulators submenu 31 enabling anonymous browsing 109 111 DMA 20 DRI 191 etherboot 94 hardware 20 encryption libraries 294 enlarging NTFS partitions 259 environments advanced cheat codes 19 20 chroot 202 desktop 66 68 desktop see desktop desktops reconfiguring settings 346 PXE 94 adding 194 197 Qemu 5 errors memory 24 see also troubleshooting Index 375 etherboot 94 Ethereal 305 eTrex serial adapters 160 Ettercap 305 expert cheat code 22 expert mode booting from 22 exporting desktop settings 80 ext2 file system 212 ext3 file system 212 F failsafe mode 20 fakeap 313 fb cheat codes 18 21 fb1024x768 16 fb1280x1024 16 18 fb800x600 16 fbdev module 17 fdisk tool MBRs 207 file servers creating emergency 146 148 file systems Aufs using 72 74 compressing 344 NFS running emergency 157 remastering 336 resizing 258 261 troubleshooting 211 214 viewing 29 files boot ini creating 256 editing 255 bzimage 246 configs tbz customizing 361 copying 120 deleting recovering 214 217 grave robber 178 grub configuring 203 hard drives rescuing from damaged 217 221 linuxrc 366 l
277. ed by Fabian Franz for Knoppix Version 3 4 Maybe a Knoppix custom izing toolkit would allow you to individually create such personal editions with a collection of software and drives But currently it seems to be virtu ally impossible to automate every single step of the customization process though Morphix has made some interesting progress in this direction The Book This book takes Knoppix s boot process apart explains how to do hard ware autoconfiguration describes some of the excellent GNU Linux tools for recovery of data or system repair and assists you in finding out more about operating systems in general Perhaps some part of this book will encourage you to create your own live CD with your own toolkit collection installed You can do this by using the included Knoppix CD as a base or by downloading a fresh version from the Internet This book shows you how Happy hacking Klaus Knopper LinuxTag e V KNOPPER NET Foreword xiii Credits About the Author Kyle Rankin is a system administrator who enjoys troubleshooting problem solving and system recovery He is also the author of Knoppix Pocket Refer ence Linux Multimedia Hacks and Ubuntu Hacks for O Reilly Media He has been using Linux in many different forms since 1998 and has used live CDs to demo Linux and troubleshoot machines from DemoLinux to the LinuxCare bootable toolbox to Knoppix He watched too much MacGyver during his developmental y
278. ed to dev md0 You must also edit lilo or grub configuration files on both mnt temp and on your root drive Make sure that any root device con figuration now references dev md0 instead of dev hda1 Be sure to leave any boot device configuration alone so that it installs the boot code onto dev hda instead of dev md0 If you use lilo as your boot loader you must also run lilo to update the MBR as covered in Repair Lilo Once you update all of the configuration files the safest way to proceed is to reboot into your new system to make sure that the system is capable of booting from software RAID If you didn t do so when creating your parti tions use fdisk cfdisk or QTParted as root to change the partition type for each partition in the RAID to RAID autodetection By default Linux parti tions are of type 83 but there is a special partition type fd set aside for Linux RAID autodetection Once you change the partition type for the parti tions write the changes and reboot A Linux kernel that supports software RAID autodetection automatically starts the device during boot and stops the device during shutdown Once your machine has successfully booted run df to confirm that your new RAID device is in fact acting as the root drive df Filesystem 1K blocks Used Available Use Mounted on dev md o 3115048 2245224 711588 76 tmpfs 267596 0 267596 0 dev shm tmpfs 10240 84 10156 1 dev settings by just changing back the
279. ee how Knoppix can trump Windows on its home turf These days Knoppix can even write directly to NTFS partitions without any special voodoo Many of these hacks aren t too complicated Not too long ago a friend of mine had a problem with her Windows machine Her daughter had come home from college and accidentally infected the machine with a virus The machine refused to boot My friend was pretty upset because there were some important files on the drive including tax receipts and more impor tantly some irreplaceable photos Although she could have just attempted to reinstall Windows over the top and hoped that it fixed things she was nervous about risking the loss of those files If she accidentally installed with the wrong option she could format the drive and lose everything I had my laptop handy so I burned a Knoppix CD for her and explained how it worked She would boot up click on the hard drive icons on the desktop and locate her important files She happened to have a USB key drive so I explained how she could simply drag and drop files from the hard drive to the key drive and then back them up to another machine The next time I saw her she met me with a big grin The CD had worked perfectly and she was able to recover everything She even gave me a USB key drive as a token of her appreciation something currently carry with me and use all the time T Fix the Windows Boot Selector 7 If a Windows boot ini file ge
280. eed to focus on the grep command Reuse this command to find other files by simply replacing n dll dll with the file name you are searching for KR While this magic spell might seem complicated you only If you can t seem to find a cab file on your system with the files you need you can also use cabextract to extract files directly from Microsoft s official service packs As Hack 94 mentions Microsoft s TechNet page http www microsoft com technet allows you to download full standalone executable patches for your system including service packs Use the search engine on TechNet s page to find service packs for your version of Windows For instance if you type Windows 2000 Service Pack the first few links direct you to the latest service packs Even though these files end in exe these service packs are actually self extracting cab files and cabextract works with them the same way 268 Chapter 7 Rescue Windows HACK Scan for Viruses 93 If you are given a choice between the Express Install version and the Network Install version choose the Network Install The Express Install does not actually contain all the system files and instead runs a program that downloads the ones your particular system needs You want to extract specific files so download the Network Install which includes all the system files If you have not yet mounted your system with write permissions right click on the icon
281. ego tools Stego tools hide data in other data often in plain sight Examples of stego tools included on S T D are as follows Gifshuffle Hides data in a GIF image outguess Hides data in a JPEG images mp3encode Hides data in an MP3 file There are also tools to detect and break stego encrypted files such as the following stegdetect As the name suggests stegdetect can detect several types of steganogra phy data hidden in images automatically stegbreak Once you have detected hidden steganography data stegbreak can be used to launch a dictionary attack on it Let s try some simple stego First we make a folder for our data knoppix ttypo knoppix mkdir stegotest Move into this folder knoppix ttypo stegotest cd stegotest Populate the folder with an image file to use knoppix ttypo stegotest cp KNOPPIX usr share apache icons penguinlogo1 jpg stego no jpg 294 Chapter 8 Knoppix Reloaded HACK Full Protection with S T D 101 Create a message we want to hide knoppix ttypo stegotest echo Hello World gt message txt Now hide this message using the password letmein knoppix ttypo stegotest outguess k letmein d message txt stego no jpg stego yes jpg Now we have a stego image we can test to see if we can extract the message knoppix ttypo stegotest outguess k letmein r stego yes jpg message decoded txt knoppix ttypo stegotest cat message decoded txt Hello World
282. em or if he does it might not be kept up to date When the worst happens you must make sure that the virus doesn t spread to other computers on the network Chapter 7 Rescue Windows 269 HACK 93 Scan for Viruses or damage your files If you install a virus scanner you must be sure that the virus can t find a way to infect disable or hide from it There are several advantages to using Knoppix as a virus scanner over the alternatives as follows e You are booting off read only media While Knoppix is writable from its ramdisk all the system files are still on read only media Even if a virus can somehow infect Knoppix it isn t able to modify any of the system files and any files it can infect are deleted at the next reboot Also all the underlying partitions are mounted read only by default Unless you purposely mount a partition read write it is not possible for an infection to spread to your partitions e The possibly infected system is not running Knoppix is running outside of your underlying system so any viruses that might have been loaded into memory have been erased and the hard drive itself is in effect frozen in time so you don t have to worry about a virus evading deletion This also means you don t have to worry about the virus spreading so you can connect the machine to the net work while it is running Knoppix to read any advisories or download any files you might need e You are booting
283. em 128M Specify memory size in megabytes knoppix dma Enable DMA for all IDE drives knoppix noideraid Disable IDE RAID detection Solve Knoppix Booting Problems Sometimes you might need to skip parts or full sections of Knoppix s hard ware detection so that it will boot on a particular system On some hard ware certain parts of Knoppix s hardware detection are known to freeze a system On other systems you might want to disable certain pieces of hard ware you know are unstable Knoppix allows you to use all of the standard Linux kernel parameters to disable as much of the hardware as you want To disable a particular part of the hardware just type no followed by the type of hardware to disable such as noaudio to disable sound card detection If you aren t sure which phase of hardware detection is failing the expert mode Hack 10 walks you through each phase step by step so you can see how far along Knoppix gets before running into trouble KR The complete list of kernel parameters is listed along with every kernel s documentation in the Documentation kernel parameters txt file which can be found at usr src linux Documentation kernel parameters txt on the Knoppix CD Chapter 1 Boot Knoppix 19 HACK 8 Use Advanced Knoppix Cheat Codes There are many different kernel parameters you can use to disable hard ware but a few of these are well known for booting Linux on problematic machines A commonly suggested fi
284. empt to automatically configure the wireless card and connect to the first wireless access point it sees when you boot This will not work if you need to enter special settings such as a WEP key to connect to your wire less network To get around this click K Menu gt KNOPPIX gt Network Internet gt Wavelan configuration to launch a program that lets you enter some information about your wireless network It is safe to stick to the defaults if you are unsure of what to enter into the fields you see Knoppix also offers a shortcut here to KDE s wireless lan tool just click K Menu gt KNOPPIX gt Network Internet gt Wireless LAN For ISDN connections run the included Red Hat ISDN configuration pro gram with K Menu gt KNOPPIX gt Network Internet gt ISDN Connection With this program you can configure the settings for your ISDN hardware for your provider and then connect to the network To successfully use a modem under Knoppix it must either be an internal or external hardware modem a modem that performs all its logic on the hard ware itself a PCMCIA modem or a cell phone or PDA with Internet con nectivity As software modems commonly called WinModems are generally incompatible with each other and require special drivers to be written to work correctly under Linux you probably will not be able to eas ily connect to the Internet using a software modem under Linux 56 Chapter 2 Use Your Knoppix Desktop Connect
285. en tioned in Make a Kiosk Hack 29 you could create a custom Knoppix disk that acts as a kiosk for your business If you are a system administrator who images a lot of systems you could create your own customized live CD to automate the process After the CD boots it could launch a script you have written that chooses from a series of images stored on a file server and then images the local machine Hack 58 Happy remastering Maybe your disk will be the next big Knoppix based distribution 333 HACK 109 Create a Customized Knoppix Mw Create a Customized Knoppix 109 One reason there are so many different Knoppix based distributions is that they are so easy to create With these steps you will be creating your own custom Knoppix CD in no time The amount of software that Knoppix is able to fit on a disk is really amaz ing but at some point you might find that one of your favorite programs is missing You can create your own custom Knoppix disk that includes the programs you want through a process known as remastering The remaster ing process looks complex but is pretty simple once you get the hang of it The basic process is to copy the current Knoppix system to disk chroot into it change the system to the way you would like it and then create a new disk image based on the new system First boot from your Knoppix disk If you plan on installing any new pack ages on your custom disk make sure that y
286. en So if you want to free up around 358 MB of uncompressed space on your CD delete the openoffice de en package by running the following root ttypo apt get purge remove openoffice de en This command not only removes the openoffice de en package but with the purge option it also clears the system of any configuration files the pack age might have used You will find that every little bit helps when you are trying to make space Dependencies When you remove a package apt get also removes any packages that depend on that package For instance if you remove the sun java5 bin pack age you see that other packages are also removed freeing up a total of 115 MB Apt get lists the amount of disk space that will be freed once you remove a package and prompts you to continue so you can pretend to remove a package just to see how much space will be freed without actually doing any damage Just make sure to answer no when you are prompted to continue root ttypo apt get purge remove sun java5 bin Reading package lists Done Building dependency tree Done The following packages will be REMOVED sun java5 bin sun java5 demo sun java5 jdk sun java5 jre sun java5 plugin O upgraded O newly installed 5 to remove and 1 not upgraded Need to get OB of archives After unpacking 115MB disk space will be freed Do you want to continue Y n n Abort Dependencies are also important to consider as you remove programs
287. en saved in root ssh id_dsa pub The key fingerprint is cb b6 e2 6a 57 ca c5 1d 42 4d 7a 83 9f df ff 22 root Knoppix root ttypo root cp root ssh id_dsa pub root ssh authorized_keys root ttypo root echo n gt gt root ssh known_hosts On Node2 copy the ssh key from Nodel and place it in the list of autho rized keys knoppix ttypo knoppix sudo mkdir root ssh knoppix ttypo knoppix sudo scp root 10 33 1 14 root ssh authorized_keys root ssh The authenticity of host 10 33 1 14 10 33 1 14 can t be established RSA key fingerprint is e8 7b 56 eb 02 62 85 bb 93 c8 e7 49 0e 92 0b f5 Are you sure you want to continue connecting yes no yes Warning Permanently added 10 33 1 14 RSA to the list of known hosts Password authorized_keys 100 668 0 7KB s 00 00 Now go back to Nodel and confirm that the key has been copied correctly root ttypo root ssh 10 33 1 6 The authenticity of host 10 33 1 6 10 33 1 6 can t be established RSA key fingerprint is 8a 80 b8 2b fb cd a1 90 39 36 ca 03 57 6c b0 5a Are you sure you want to continue connecting yes no yes 320 Chapter 8 Knoppix Reloaded HACK Distribute the Load with ClusterKnoppix 103 Warning Permanently added 10 33 1 6 RSA to the list of known hosts root 0 root exit root ttypo root exit Now you are ready to run openMosixview on Node1 knoppix ttypo knoppix sudo openmosixview You can now manage your nodes from t
288. en when Windows no longer boots 256 Chapter 7 Rescue Windows Back Up Files and Settings Knoppix picks up where the Windows Recovery CD leaves off with the ability to navigate through your entire filesystem FAT FAT32 and NTFS and back up important files to many different kinds of media from other connected hard drives floppies USB key drives writable CD ROMs and even other computers on the network Besides you can browse through your filesystem graphically and open up files along the way so you can tell if P0311231923 jpg is that important baby picture and whether Untitled1 doc is a blank document or your graduate thesis Back That Thing Up To back up your important data determine what you need to back up and where you want to put it First find your Windows partition If Windows is the only operating system installed on your computer this should be easy just click on the single hard drive icon that should appear on your Knoppix desktop it is usually labeled dev hda1 If you have more than one operating system installed or more than one partition on your hard drive you may need to search for it Click on each hard drive icon Check for directories named Documents and Settings and Program Files to help you identify your Windows partition Open your Windows partition with the Konqueror file manager and browse through your directories to decide which files you need to back up To back up all of the user s files a
289. en you want to change default cheat codes The first couple of lines of the file will give you a clue as to the sorts of things that you can change with this file DEFAULT linux APPEND ramdisk_size 100000 init etc init lang us apm power off vga 791 initrd minirt gz nomce loglevel 0 quiet BOOT_IMAGE knoppix TIMEOUT 300 PROMPT 1 DISPLAY boot msg F1 boot msg F2 f2 F3 f3 364 Chapter 9 Knoppix Remastered Change Boot Defaults Without Remastering LABEL knoppix KERNEL linux APPEND ramdisk_size 100000 init etc init lang us apm power off vga 791 initrd minirt gz nomce loglevel 0 quiet BOOT_IMAGE knoppix LABEL expert KERNEL linux APPEND ramdisk_size 100000 init etc init lang us apm power off vga 791 initrd minirt gz nomce BOOT_IMAGE expert LABEL memtest KERNEL memtest APPEND foo At the beginning of the file are the boot settings for the default image This is executed when you hit Enter at the boot prompt or wait for the 30 sec onds delay to time out So if I wanted to add a kiosk cheat code that was executed on every boot I could edit this DEFAULT linux APPEND ramdisk_size 100000 init etc init lang us apm power off vga 791 initrd minirt gz nomce loglevel 0 quiet BOOT_IMAGE knoppix to read like this DEFAULT linux APPEND ramdisk_size 100000 init etc init lang us apm power off vga 791 initrd minirt gz nomce loglevel 0 quiet BOOT_IMAGE knoppix desktop kiosk url http www example com Starting with the lin
290. equences 25 Nvidia 3D drivers installing 100 103 NX Connection Wizard 132 NX servers 131 FreeNX connecting with 133 138 0 OCR Optical Character Recognition 47 Oehler Martin 114 Office submenu 31 office tools 39 43 Kontact 42 43 OpenOffice org 39 42 oinkmaster 301 Open Source Security Testing Methodology Manual OSSTMM 289 openMosix cluster 315 321 openMosixview 319 OpenOffice org 39 39 42 Quantian 323 settings copying 82 85 openssl 294 Optical Character Recognition OCR 47 optimizing booting 13 15 display settings 21 monitor settings 16 video cards 17 options backgrounds 36 firewalls 144 Home 78 Init 79 installer main menu 115 lilo 202 loopback mounting 182 nessus tool 170 Overwrite 79 Partition 114 System 79 see also customizing Originate time 308 orphans 343 OSSTMM Open Source Security Testing Methodology Manual 289 outguess 294 Overwrite option 79 P POf 311 packages APT configuring 123 Debian managing 243 244 deborphan tool 343 deleting 342 downloading 244 grub 203 installing 108 management 107 remastering 338 mdadm 228 modutils 243 repositories 107 RPM installing 245 updating 349 Packard Keith 282 packet sniffers S T D 290 314 Palm PDAs KPilot 43 PAN Personal Area Networking protocol 57 panels navigating 33 parted commands 211 partimage tool 180 184 Partition option 114 partitions backing up a
291. er reload its configuration This varies on differ ent Linux distributions but the command should be something like etc init d nfsd reload run as root 196 Chapter 5 Put Knoppix in Your Toolbox Set Up a Webcam Server in a Snap After your NFS server is configured don t forget to edit any configuration files under pxelinux cfg that use Knoppix and change the nfsdir cheat code so that it points at your NFS server and its exported directory At this point you should be ready to boot a machine off the network If Knoppix is set up as the default image any machine you PXE boot should boot into Knoppix by default Otherwise you will need to make sure that the machine you want to boot into Knoppix has a corresponding pxelinux configuration file I like the idea of Knoppix being the default PXE image so when you need to rescue a machine you don t have to track down its MAC address and configure your pxelinux server you can just netboot it and go Alternatively you might want to examine how Knoppix provides a menu on its pxelinux server and create a custom menu of your own with options for Knoppix and other boot images Set Up a Webcam Server in a Snap A webcam a computer Knoppix and a few commands are all you need to create an instant webcam server It s true that for the most part people use webcams with their main desktop computer either for video conferencing or so their friends can see what they are doing However if
292. er the origi nal one at boot time mkdir tmp mylivecd copy morphix cp mybackground png tmp mylivecd copy morphix background png Now make a new CD ROM ISO from the tmp mylivecd directory mkisofs 1 v J V My New LiveCD r b base boot img c base boot cat hide rr moved o tmp mylivecd iso tmp mylivecd Well that s it You can burn your ISO using your favorite CD R burning tool and you re done One freshly baked live CD with your own back ground coming right up cdrecord speed 8 dev 0 0 0 tmp mylivecd iso Of course this was a pretty simple morph You can do quite amazing things using Morphix without remastering modules directly For lots of step by step recipes and more elaborate documentation take a look at the HOW TOs at http www morphix org i 15 Auto Build Morphix Modules MapLab Tutorial Map Morphix is already easy to change due to its modular nature but you can make module creation even easier and more powerful by using Module Maker to automate building Morphix modules Morph Morphix Hack 114 looks at how you can easily customize an exist ing Morphix live CD This hack takes a look at Module Maker or MMaker a tool for auto building Morphix modules Remastering modules is all fine and good and you can do this just as you can with a compressed KNOPPIX image However laziness is seen as a 356 Chapter 9 Knoppix Remastered Auto Build Morphix Modules MapLab Tutorial Map
293. erencing 64 Musix 329 331 viewing applets 34 boot prompts 4 file systems 29 virtual machines creating 248 CE Virtual Network Computing VNC servers 129 130 virtualized Knoppix booting 5 viruses clamav 286 scanning for 269 272 visualization Quantian 323 vmlinuz file 195 VMware servers converting to 247 252 VNC Virtual Network Computing servers 129 130 vulnerability assessment 309 scanners nessus tool 166 173 Ww wardriving 159 166 312 warflying 312 warwalking 312 watch command 224 web browsers 63 anonymous browsing 109 111 kiosks configuring for 86 web servers creating emergency 148 webcam servers configuring 197 wellenreiter 313 wheelmouse cheat code 18 wide memory chips 25 Widget Style menu 37 widgets grouping 37 wiki platforms creating 198 200 Window Decorations 38 Windows booting from 5 desktop using settings 83 85 desktops duplicating 38 MDSsum creating 8 Recovery CD 256 Safe Mode 256 shares browsing 138 troubleshooting backing up files and settings 256 258 backing up registries 264 267 bootloaders 254 256 downloading patches 272 resetting passwords 261 264 resizing file systems 258 261 390 Index restoring system files 267 269 running on Intel based systems 273 275 scanning for viruses 269 272 windows default managers modifying 346 DVD only window managers 68 70 FluxBox 291 KDevelop 99 Konqueror web browser 28
294. ertificate of Nessus Note that this information will NOT be sent to anybody everything stays local but anyone with the ability to connect to your Nessus daemon will be able to retrieve this information CA certificate life time in days 1460 Server certificate life time in days 365 Your country two letter code FR Your state or province name none Your location e g town Paris Your organization Nessus Users United You ll be prompted for information about the certificate You can use the defaults if you have no preference and you just want to take nessus for a spin After creation you should see something like Congratulations Your server certificate was properly created etc nessus nessusd conf updated The following files were created Certification authority Certificate var lib nessus CA cacert pem Private key var lib nessus private CA cakey pem Nessus Server Certificate var lib nessus CA servercert pem Private key var lib nessus private CA serverkey pem Press ENTER to exit 168 Chapter 5 Put Knoppix in Your Toolbox Audit Network Security At this point you ll want to start the nessus daemon root Knoppix etc init d nessusd start Using the nessus Client You re now ready to login to the nessusd host from your nessus client Make sure the host port login and password fields under the Nessusd host tab are filled out with localhost 1241 knoppix and kno
295. ervice see GPRS Gentoo installing 124 126 Geographic Information Systems GIS 325 geography Freeduc 280 german kbd file 195 Gifshuffle 294 GIMP Graphical Image Manipulating Program 47 settings copying 82 GIS Geographic Information Systems 325 GIS Knoppix 325 326 global positioning system see GPS glxinfo command 191 gmplayer 54 Gnome 69 278 GnomeMeeting 64 gpart tool 208 GPRS General Packet Radio Service connecting to Internet with Bluetooth 57 62 gprsconnect shell script 58 GPS global positioning system applications 325 configuring 160 wardriving hardware 159 gpsd program 160 gpsdrive 313 gqcam program 49 197 Graphical Image Manipulating Program GIMP 47 settings copying 82 graphics Damn Small Linux 283 Musix 329 331 Quantian 323 subsystem settings saving 76 Graphics submenu 31 GRASS 325 grave robber 176 files and directories 178 grouping widgets 37 grub MBRs restoring to 203 205 updating 122 Gtans 50 gtkam 48 Guitar Hero 90 hackers 292 309 hacks definition of xx hard disks creating ramdisk 13 hard drives Aufs using 74 changes saving 75 79 cloning 180 184 files rescuing from damaged 217 221 formatting 120 migrating to 223 225 wiping 184 185 hardware compatibility adding 23 26 testing 186 192 configuring 23 Damn Small Linux 283 detecting 16 18 troubleshooting 19 enabling 20 general probing 186 laptops booting from 2
296. es No servers have been added Click here to add a server Extent Max Y Bas 130 03491115 Min X Max X 2223907296548 1847611 20345 16 Min Y l C e OF E Applet RosaAppiet started Figure 8 4 MapLab tutorial map The fact that all of this software is included on a live CD means that you can take your GIS data out to the field with a GPS and a laptop boot GIS Knop pix and get to work TI TiVo Your Computer 106 Use KnoppMyth to quickly turn any computer into a standalone TiVo like PVR using MythTV KnoppMyth http www mysettopbox tv knoppmyth html is a unique Knop pix variant because its primary function is to install MythTV not to act as a portable Linux distribution KnoppMyth uses the excellent hardware auto configuration of Knoppix and bundles it with scripts and software to install and configure MythTV automatically Knoppix remaster While the interface is similar this release is built from scratch from the Debian Linux distribution combined with some Knoppix tools Sir The latest version of KnoppMyth R5 is actually no longer a 326 Chapter 8 Knoppix Reloaded TiVo Your Computer MythTV http www mythtv org is an open source PVR project with the goal of being the mythical all in one media machine for your home MythTV allows you to schedule recordings watch live TV with features such as paus ing and rewinding live TV listen to music
297. es or custom branding you desire This chapter walks you step by step through the remastering process and features special tricks and tweaks to make the most out of your personalized distribu tion Conventions Used in This Book The following is a list of the typographical conventions used in this book Italics Used to indicate URLs filenames filename extensions and directory folder names For example a path in the filesystem will appear as the fol lowing Developer Applications Constant width Used to show code examples the contents of files and console output as well as the names of variables commands and other code excerpts Constant width bold Used to highlight portions of code typically new additions to old code Constant width italic Used in code examples and tables to show sample text to be replaced with your own values Color The second color is used to indicate a cross reference within the text You should pay special attention to notes set apart from the text with the following icons This is a tip suggestion or general note It contains useful supplementary information about the topic at hand Preface xxiii This is a warning or note of caution often indicating that your money or your privacy might be at risk The thermometer icons found next to each hack indicate the relative com plexity of the hack i beginner l moderate expert Using Code Examples This book is here to help you get your
298. es are still potentially retrievable from the drive Even the par tition table itself is recoverable with the right tools Hack 68 Resurrect the MBR If you deleted your boot sector in the last section you probably want to restore it now To do this copy the backup you made earlier to your home directory in Knoppix and run knoppix ttypo knoppix sudo dd if home knoppix mbr_backup of dev hda bs 446 count 1 Because of the bs 446 element this command only restores the boot code in the MBR I purposely left out the last 66 bytes of the file so the partition 206 Chapter 6 Repair Linux HACK Find Lost Partitions 68 table would not be overwritten just in case you have repartitioned or changed any partition sizes since your last MBR backup If you have acci dentally corrupted or deleted your partition table restore the full 512 bytes to the MBR with knoppix ttypo knoppix sudo dd if mbr_backup of dev hda bs 512 count 1 How Do fdisk mbr Knoppix also provides a useful tool called install mbr that allows you to manipulate the MBR in many ways The most useful feature of this tool is that it can install a default master boot record on a drive which is useful if you want to remove lilo or grub completely from the MBR so Windows can boot by itself or so you can install Windows to a hard drive that previously used Linux The results are the same as if you were to type fdisk mbr in DOS To remove the traces of lilo
299. es as it finds them When it is finished scanning the drive gpart outputs a com plete list of partition tables it has found Read through this list of partitions and make sure that it reflects the partitions you have created on the disk It might be that gpart can recover only some of the partitions on the drive Once you have reviewed the partitions that gpart has guessed run gpart again but with the W option to write the guessed partition table to the disk knoppix ttypo knoppix sudo gpart W dev hda dev hda This isn t a typo you actually do put dev hda twice in the command Potentially you can tell gpart to write the partition table to a second drive based on what it detected on the first drive Once the partition table has been written reboot and attempt to access the drives again If you get errors when mounting the drives check the partitioning within Knoppix with a tool like fdisk cfdisk or QTParted to see whether gpart has incorrectly guessed where your partition ends I ve had to modify a partition that gpart ended 4 MB too early but afterwards the filesystem mounted correctly and I was able to access all of my files 208 Chapter 6 Repair Linux HACK Resize Linux Partitions 69 If you aren t too familiar with your partitioning scheme it 3 might be difficult to know whether gpart guessed correctly A good rule of thumb is that typically partitions will take up the maximum amount of space they can so
300. ess bits in all memory banks by using a walking ones address pattern A walking pattern initializes the RAM to zero then writes a one or other pattern to a location and reads all other loca tions to make sure that they are still zero Then it verifies the first loca tion reinitializes all of the RAM to zero and repeats the pattern at the next location until all of the RAM has been tested Test 1 Address test own address Each address is written with its own address and then is checked for consistency In theory previous tests should have caught any memory addressing problems This test should catch any addressing errors that somehow were not previously detected Test 2 Moving inversions ones and zeros This test uses the moving inversions algorithm with patterns of all ones and zeros Cache is enabled even though it interferes to some degree with the test algorithm With cache enabled this test does not take long 24 Chapter 1 Boot Knoppix HACK Check RAM for Errors with Memtest86 11 and should quickly find all hard errors errors that always occur and some more subtle errors This test is only a quick check Test 3 Moving inversions eight bit pattern This is the same as Test 1 but uses an eight bit wide pattern of walk ing ones and zeros This test will better detect subtle errors in wide memory chips chips that store data more than one bit wide A total of twenty data patterns are used Test
301. etWare server LinNeighborhood A GUI frontend to Samba similar to the familiar Microsoft Network Neighborhood S T D also includes some network management tools such as the following Chapter 8 Knoppix Reloaded 301 HACK 101 Full Protection with S T D cheops Used for mapping and monitoring your network via an attractive net work diagram Ntop Short for Networktop Ntop allows you to monitor your network using a large number of filtering criteria such as bandwidth usage pro tocol and who is talking to whom via graphs matrices charts and more To access the web frontend launch ntop start from the FluxBox menu and then use a web browser to connect to http Nocalhost 3000 Let s scan the local subnet for machines running NetBIOS First launch the scanner knoppix ttypo knoppix sudo nbtscan r 10 0 0 0 24 IP address NetBIOS Name Server User MAC address 10 0 0 0 Sendto failed Permission denied 10 0 0 2 JABBA lt server gt JABBA 00 00 00 00 00 00 10 0 0 10 DESKTOP lt server gt lt unknown gt 00 13 46 2a 42 34 As you can see by default the results are in a nice human readable format This simple example yields some interesting results 10 0 0 0 failed as it is obviously not a real machine IP and in this case is the network address of the subnet 10 0 0 2 responds nicely to the scan but the MAC address is obviously fake If you are using this tool you will often see 00 00 00 00 00 00 as it
302. ev mdo root ttyO root mdadm stop dev mdo Replace mdo with the name of your array Once the RAID is stopped use fdisk or cfdisk as root to change the partition type for each partition in the RAID to RAID autodetection By default Linux partitions are of type 83 but there is a special partition type fd set aside for Linux RAID autodetec tion Once you change the partition type for the partitions write the changes and reboot A Linux kernel that supports software RAID autodetec tion automatically starts the device during boot and stops the device during shutdown Conclusion Configuration of software RAIDs under Linux is pretty straightforward and with Knoppix you can easily experiment with RAID configurations on a system full of blank disks You can also modify an existing RAID and unmount stop and start the RAID even if you are configuring a root parti tion In addition you can also leverage most of the filesystem and partition copying methods referenced in other hacks to easily copy entire systems Chapter 6 Repair Linux 229 HACK 76 HACK 77 Migrate to Software RAID over the network to a newly created software RAID even if your particular distribution doesn t necessarily support installing to RAID by default See Also e Clone Hard Drives Hack 58 e Migrate to a New Hard Drive Hack 74 Mr Migrate to Software RAID 77 Move your entire root partition to RAID 1 or RAID 5 without a bac
303. ew disk sudo mdadm grow raid devices 4 dev mdo At this point all of the disks involved in this array will become very active as all of your data is migrating If you want to monitor its progress look at proc mdstat watch cat proc mdstat Once the resync completes you will need to resize the filesystem to take advantage of the new space If you have mounted the filesystem unmount it then follow the steps in Hack 69 that match your particular filesystem Since mdadm took care of resizing the actual partition for you you only need to worry about the command to resize the filesystem itself For instance if dev mdO were an ext3 partition you would resize it with sudo resize2fs dev mdo With the filesystem resized you can now reboot back into your system 236 Chapter 6 Repair Linux HACK Mount LVM Partitions 80 See Also e The mdadm documentation usr share doc mdadm directory on your Knoppix disk e The mdadm manpage type man mdadm in a console 7 Mount LVM Partitions 80 It only takes a few extra steps to rescue data stored on an LVM partition There are a number of distributions these days that make use of Logical Vol ume Management LVM to provide you with all sorts of useful features such as snapshots and the ability to more easily expand your storage The Fedora distribution for instance even defaults to using LVM One down side to LVM partitions are that they require a few ex
304. ewall is doing enable this option to log firewall access through syslog so it can be found under var log syslog The medium option should be sufficient for most of your needs unless you need to directly edit the text file that contains all of the firewall rules If you are very experienced with iptables rules and do need that functionality then select expert otherwise stick to medium For most firewall situations you will only need to bother with the Open Ports option enable the firewall and then save your settings See Also e The official netfilter page at http www netfilter org documentation in particular the packet filtering HOWTO e The Advanced Routing HOWTO at http www ibiblio org pub Linux docs HOWTO other formats html_single Adv Routing HOWTO html When files need to be transferred quickly over the network Knoppix can serve as a quick makeshift file server i 50 Create an Emergency File Server There are many different occasions that might call for creating an emer gency file server For instance you might have a file server with multiple drives that has suffered hard disk failure on the root drive All of the hard disks that have shared data are fine but you still need to serve files while waiting for the replacement drive This is the perfect environment for any one wanting to learn how to configure Samba or start up a quick temporary file server For experienced systems administrators this makes it easy to
305. extra instructions you type at boot time that change many of Knoppix s settings On some hardware these codes may be necessary to get the most out of Knoppix Knoppix is good at automating many of the tasks that Linux users often conduct manually such as hardware configuration setting up the network and logging into a desktop If you want to customize options or change what Knoppix automatically runs you can enter special commands at the boot prompt which Knoppix refers to as cheat codes Cheat codes are a reference to the secret passwords or key sequences entered in video games to get unlimited lives or other special items Fortunately cheat codes in Knoppix are simple words you type at the boot prompt and not complicated joystick sequences like up down up down left right left right B A The cheat codes aren t secret either Open the Knoppix disk under your current OS and browse to the KNOPPIX directory The cheat codes file is called knoppix cheatcodex txt You can also reference a list of the most frequently used cheat codes by pressing F2 at the boot prompt To use cheat codes at the boot prompt type knoppix to select the default kernel followed by the cheat codes you wish to use For example if your Knoppix disk doesn t work the way you expect you can test it for any physi cal errors on the disk at the boot prompt type the following command knoppix testcd Table 1 1 lists many of the settings and options you can
306. f on the back now Etherboot Etherboot takes a bit more work First go to http www rom o matic net Click on production and select your NIC Next click on Get ROM to download the ROM to your computer Then put a formatted floppy in your floppy drive go to a console and type the following dd if eb 5 2 4 yournic zdsk of dev fdo Replace eb 5 2 4 yournic zdsk with the path to your downloaded ROM image If you are not sure which NIC you have you can download an image from http drbl nchc org tw kernel drbl_nic_detect img then open up a console and type dd if drbl_nic_detect img of dev fdo Boot the client from the floppy and it will detect your NIC so that you know which ROM image to download Put the floppy disk with the corresponding ROM in the client Make sure the BIOS is set to boot from the floppy first and once the computer boots the client is added to your cluster as a node The CD ROM Boot Method Put ClusterKnoppix in every CD drive and then let the computers boot There you go instant cluster Unlike booting from the network when boot ing each computer from the CD openMosixview won t work out of the box but processes are still migrating After each node has booted just run mosmon on the master node and it should show a node for each computer This ncurses tool displays the load speed and memory of openMosix nodes as a bar chart in a console OpenMosixview is the X counterpart of mosmon a cl
307. ferent console keyboard knoppix xkeyboard us Use a different X keyboard knoppix tz America Los_ Angeles Use a particular time zone Chapter 1 Boot Knoppix 11 HACK 5 HACK 5 Speak Different Languages When changing language options the lang cheat code is the main cheat code to use To change the default language to Spanish for instance simply pass the cheat code at the boot prompt lang es This cheat code takes care of all of the locale options so that all menus prompts the desktop environment and the keyboard are set to the speci fied language differences in the German and English keyboard layouts make themselves apparent when you try to enter the lang us cheat code The key on the German keyboard can be entered with Shift 0 the key is located at Shift 7 and the _ key can be typed with Shift If you want to enter the keyboard or xkeyboard cheat code keep in mind that the Z and Y keys on the German keyboard are swapped compared to their English counterparts RK Many beta Knoppix CDs come only in German versions The To change the keyboard mapping separately from the default locale use the keyboard and xkeyboard cheat codes These options change the keyboard language used on the console and graphical desktop respectively If Knoppix doesn t choose your correct time zone you can either wait for the desktop to boot and right click on the clock in the bottom right hand corner to change it or you ca
308. ferent patterns of data to RAM and checking that the pat terns were written correctly and checking that neighboring blocks of RAM weren t influenced by what was written Even if you have bad RAM you might pass many if not most of the tests Memtest86 performs so by default Knoppix will have Memtest86 perform all of its tests each designed to highlight different potential RAM problems As Memtest86 runs it reports errors it finds at each phase of the test directly on the screen along with a running tally You also have the option of outputting a BadRAM pattern instead BadRAM is a Linux kernel patch cre ated by Rick van Rein and hosted at http rick vanrein org This patch allows you to tell the Linux kernel to ignore bad sections of memory so it can continue with what is left By doing this you don t necessarily have to throw away RAM that has errors To tell Memtest86 to output BadRAM patterns type c to pause the test and enter the configuration menu 6 to enter the Error Report Mode and 2 to select BadRAM patterns then hit 8 to restart the test if you are an advanced user you can press c to enter the con figuration menu and change test settings WR By default Memtest86 will launch directly into the test but If you are interested in what Memtest86 is doing on a basic level here are the different test descriptions from the Memtest86 documentation Test 0 Address test walking ones no cache Tests all addr
309. ff Explore Expert Mode Do it yourself types may not like all of the automatic configuration and hardware detection that Knoppix does For people trying to troubleshoot and for the just plain curious Knoppix provides an expert mode The goal of the Knoppix expert mode is to provide the user with complete control over the different steps that Knoppix performs when booting a sys tem Each step that Knoppix normally performs automatically behind the scenes is presented to the user with a prompt allowing you to configure exactly what Knoppix will do or won t do This can be particularly useful if you have a system that gets halfway through the boot process and then mysteriously restarts With the expert mode you can see exactly which step in the Knoppix boot process has caused the boot to fail so you can bypass that step next time Step Through the Expert Mode To start into the Knoppix expert mode simply type this cheat code at the boot prompt followed by any other cheat codes you might want to use expert Knoppix starts by listing all of the SCSI modules available on the system fol lowed by the question Load SCSI Modules At the prompt you have the option of typing in the names of any SCSI modules you wish to load or n for 22 Chapter 1 Boot Knoppix Check RAM for Errors with Memtest86 none If you just hit Enter Knoppix probes for which SCSI modules to load just like it does by default After making your cho
310. figurations to other distri butions Copy Settings to Other Distributions Knoppix s intelligent hardware auto detection can get all of a computer s hardware working out of the box You can copy and reference the system files Knoppix creates to ease configuration of a new or existing installation With new hardware always coming out and with many vendors failing to list their Linux support or lack thereof on the box it can sometimes be diffi cult to get all of your hardware working under Linux Although scanning the Web for HOWTOs searching for the module that corresponds to your hardware and configuring it by hand can be a good learning experience some people might prefer to simply copy the information they need from a working system This is where Knoppix comes in Because of the excellent hardware detection and configuration Knoppix performs there is a good chance that if the hardware is capable of working on your Linux distribu tion it works in Knoppix Many of the configuration files and modules are common across distributions if hardware works in Knoppix in many cases you can simply copy the configuration files and information you need to your distribution without any extra fuss Copy X Settings Even with some of the automated tools that are available to configure X it still seems to be one of the most problematic configuration files After spending hours trying to get X to work booting up Knoppix and having it work aut
311. files you need to bother with You simply need to load the right module for the hardware to start working Sometimes this means experimentation by load ing multiple network card modules one at a time to see which module works best for your network card Knoppix s kernel has support for most hard ware built as a module so it can load only the modules it needs to work on a particular system Most distributions have heavily modular kernels as well so you can reference the modules that Knoppix loads and load the same modules on your system to get hardware working This of course assumes that the same modules are built in your particular kernel The command lsmod shows all modules that are currently loaded in a sys tem Under Knoppix many different modules are loaded by default so it s best to have a general idea of which modules you might be considering for a device before digging through the output For instance if you are configur ing ALSA most of the relevant modules in the lsmod output are preceded by snd or reference other modules preceded by snd in the Used by column If you are really lazy you could simply copy the full list of modules and load them all but it s better to try only the modules you need Copy Kernel Configuration In addition to referencing the modules that Knoppix loads at boot you can also reference the complete configuration Knoppix uses in its kernel when building your own kernel Knoppix stores a copy of t
312. find your phone the Bluetooth adapter didn t even attempt a scan Make sure that you have a working hci0 device before you attempt to scan You can test whether you can see your Bluetooth device by issuing the hciconfig a command knoppix ttypo knoppix hciconfig a hcio Type USB BD Address 00 0A 3A 52 3A 20 ACL MTU 192 8 SCO MTU 64 8 UP RUNNING PSCAN ISCAN RX bytes 376 acl 0 sco 0 events 16 errors 0 TX bytes 305 acl 0 sco 0 commands 15 errors 0 Features Oxff Oxff OxOf 0x00 0x00 0x00 0x00 0x00 Packet type DM1 DM3 DM5 DH1 DH3 DH5 HV1 HV2 HV3 Link policy HOLD SNIFF PARK 58 Chapter 2 Use Your Knoppix Desktop Connect to the Internet with GPRS Bluetooth Connection Type Please select type of connection serial Serial connector i e Modem w usb USB connector i e Modem w irda Infrared wireless device i e cellphone PDA wv bluetooth Bluetooth wireless device i e cellphone PDA y Winmodem Scan for unsupported WinModems f UK x lt cancel Figure 2 13 GPRS connection type window Link mode SLAVE ACCEPT Name Knoppix o Class 0x000100 Service Classes Unspecified Device Class Computer Uncategorized HCI Ver 1 1 0x1 HCI Rev 0x20d LMP Ver 1 1 0x1 LMP Subver Ox20d Manufacturer Cambridge Silicon Radio 10 In the event that the script doesn t find a device and it did actually scan it prompts you for the address of the hidden Bluetooth device Use th
313. finitely a distribution to try if you are looking for the best in Linux multimedia appli cations Everything you need is all in one easy to carry disk you can boot anywhere on any machine and get to work Ze Contribute to Knoppix f 108 Want to give back to the Knoppix community Here s how So you ve used Knoppix for a while and love it and maybe you ve even remastered it a few times Hack 109 and now you want to contribute to the Knoppix project Even if you don t know how to program there are still plenty of ways you can contribute to the project file bug reports write doc umentation share your ideas for improvements and help others in the forums Become a Knoppix Developer Becoming a Knoppix developer and contributing to the project is an easy process e Subscribe to the debian knoppix mailing list e Send a patch to debian knoppix or Klaus Knopper himself e Be very patient Chapter 8 Knoppix Reloaded 331 HACK 108 Contribute to Knoppix The debian knoppix mailing list is the mailing list for Knoppix develop ment related discussion You can sign up for the mailing list at http sympa linuxtag net wws subrequest debian knoppix Note that since Knoppix is a German project sometimes threads are in German although many if not all of the active members on the list also speak English A majority of the development in Knoppix involves writing bash and dialog scripts and packaging files into debs so a
314. fore attempting to change things Prepare to Edit the Registry First obtain the chntpw tool Hack 90 to edit the registry This example assumes that you are editing the registry of a Windows partition on dev hda1 Click on the hard drive icon to mount it then right click on the icon and choose Actions gt Change Read Write Mode You can also type the fol lowing command knoppix ttyp1 knoppix mount dev hda1 Getting to Know Your Registry After you mount the filesystem you must find where Windows is storing the registry This is actually more difficult than just finding some Registry reg file tucked away in a corner of your filesystem Windows stores sections of the registry in different files called hives located in different directories on the drive I like to think they are called hives because it s easy to get stung while you are poking around in them Most of the important hives DEFAULT SAM SECURITY SOFTWARE and SYSTEM are stored under systemroot System32 Config where systemroot is usually WINNT or 264 Chapter 7 Rescue Windows Edit the Windows Registry Windows on Windows 2000 or newer systems The remaining hive is located in the NTuser dat file which is located in Documents and Settings username or in systemroot Profiles username These files correspond to specific hives in the registry as listed in the following table Registry Key Name Hive Filename HKEY_CURRENT_CONFIG SYSTEM HKEY_CURRENT
315. ft hand side of the window are a number of hardware categories and clicking on any of the categories displays information about that cate gory on the right hand side of the window Info Center is useful in that it not only lists the information that you might find by running lspci but it Chapter 5 Put Knoppix in Your Toolbox 189 HACK 60 HACK 60 Test Hardware Compatibility also scans through other parts of the system and lists whether modules have been loaded for certain devices To check whether your network card is run ning and has received an IP address click on Network Interfaces in the side bar to list all network devices their IP addresses and whether they are up To check that a sound card is working click on Sound in the sidebar to see which audio devices the Info Center has detected as well as their capabili ties Specific Hardware Testing Dmesg Ispci and the Info Center provide you with a lot of information about hardware on your system but these commands mostly tell you about hardware that has been detected not necessarily hardware that is working This section covers some common hardware and specific tests to confirm that it is working Sound card Rock Out with Knoppix Multimedia Hack 18 covers steps to test and configure your sound card but the first clue that Knoppix has got ten your sound card to work is the Initiating startup sequence sound you hear when KDE starts Video cards
316. g applications with 105 Linux RealVNC xvneviewer 130 nessus tool 169 NX Thin creating 96 partimage tool 183 cloning hard drives 180 184 OQ O02 lt 0 Index 371 closing Kismet 163 Clusterknoppix 315 321 clusters managing 324 cng mac script 165 code boot 205 Bootstrapping downloading 94 see also cheat codes codecs installing multimedia 111 collecting forensics data 176 180 colors modifying 35 36 commands apt cache 342 chroot remastering 337 dd 336 debootstrap 357 df 214 dmesg 186 ed 267 glxinfo 191 ifconfig 141 165 iptables 143 kwiki 199 Ismod 193 317 mkswap 336 nessus adduser 167 parted 211 route 142 Run Command window 105 sudo 71 sudo passwd 183 swapon 336 tar 221 223 watch 224 communities joining 332 compatibility hardware adding 23 26 testing 186 192 OpenOffice org 39 compiling with distccKNOPPIX 314 compressing file systems 344 LZMA 286 partition images 183 conferencing video 64 configs tbz file customizing 361 configuring 78 Apache servers 149 applications copying settings 82 APT 123 boot ini files 256 Clusterknoppix 316 desktops Aufs 72 74 using Linux settings 79 83 saving settings 75 79 using Windows settings 83 85 display settings 21 DNS 153 email servers creating emergency 150 154 file servers emergency 146 148 files grub 203 GPRS connections 58 61 GPS 16
317. g window for any error messages that might appear 32 Use the Knoppix NX Thin Client to set up a network of Knoppix computers with even fewer resources than with the regular network boot Knoppix i My Create a Knoppix Thin Client Hack 31 discussed how to set up a Knoppix disk so that other machines could boot from the same disk over the network This method uses the ini tial Knoppix terminal server as a file server for the system settings and appli cations but still uses the CPU and RAM of the system you have booted for any programs Depending on your needs this can be either a good or bad thing If you plan to use systems with fast processors and plenty of RAM and plan to use CPU or RAM intensive applications you will likely want to 96 Chapter 3 Tweak Your Desktop HACK Develop Applications 33 stick with the default Knoppix terminal server However if your computers aren t that fast or don t have much RAM you can use the Knoppix thin cli ent setup instead This setup actually uses the CPU and RAM of the initial machine so that your thin clients only need the minimal CPU and RAM necessary to boot and to connect to the remote system To start the Knoppix thin client follow the steps outlined in Hack 31 until you get to the point where you configure which terminal services to use By default all of the options will be checked except for squid and nx Check nx to enable the thin client setup Once you click
318. g within a chrooted environment If you have an RPM based system refer to Hack 84 for instructions on how to use rpm within a chrooted environment If you have built your own kernel you might still have a copy of the kernel on your system you can use Unless you ran a make clean since you have built your kernel a copy of the kernel might still be sitting in usr src linux archfi386 boot If you built a bzipped kernel image with make bzImage then the file should be named bzImage After mounting the drive read write type mount rw dev hda1 mnt hda1 in a terminal simply copy the bzImage file to boot and name it after the corrupted or deleted kernel If you wish you can also use Knoppix s own kernel on your system The Knoppix kernels are in the boot directory on the Knoppix root filesystem Copy the kernel image you want to use to the boot directory on your read write mounted root partition Finally copy your chosen kernel s modules directory located in lib modules on the Knoppix root filesystem to lib modules on your root partition For a root partition mounted at mnt hdal type knoppix ttyo knoppix sudo cp boot vmlinuz uname r mnt hda1 boot knoppix ttyo knoppix sudo cp a lib modules uname r mnt hda1 lib modules 246 Chapter 6 Repair Linux Turn a Physical Machine into a VMware Virtual Machine These commands use the shell command uname r to return the currently booted Knoppix kernel This meth
319. g your presentations run OpenOffice org Impress by clicking K Menu gt Office OpenOffice org gt OpenOffice org Impress Impress is OpenOffice org s presentation program with support for many different animations and other slide effects On starting Impress you are presented with the option of starting a blank presentation or using one of the predefined templates Impress includes After you have made your decision Impress loads the blank presentation and displays it with a layout and toolbars very similar to those in Writer and Calc With each slide you can choose from many different layouts that have already been created These layouts provide predefined bounding boxes for your text and graphics making it easy to just drop in the data without wor rying about lining up everything You use graphics backgrounds and ani mations much like with other presentation software Once your presentation is ready start the slide show by pressing F9 or click ing Slide Show gt Slide Show from the menu Click your mouse hit the left arrow key or hit the spacebar to move forward in the presentation right click your mouse or hit the right arrow key to move backwards in the pre sentation To exit the slide show hit Esc or the Backspace key To save your presentation click File gt Save As and select from either PowerPoint OpenOffice org s legacy Impress file format or the OpenDocument Chapter 2 Use Your Knoppix Desktop 41 HAC
320. ge to STDOUT which can then be piped through ssh to the remote machine So if you have an account on 192 168 0 2 to which you want to save the file issue the command sudo dd if dev hda1 ssh username 192 168 0 2 cat gt home username hda1_drive_image img After you enter your password dd copies the complete encrypted drive image over the network and stores it in hdal_drive_image img By storing a partition image in a file you can use Linux s loopback mount ing option to mount this file as though it were an actual partition and exam ine the files For instance if you have an image of an ext2 partition you can create a new mountpoint in mnt and mount the file under Knoppix with the following command sudo mkdir mnt temp sudo mount o loop t ext2 mnt hdb1 hda1_drive_image img mnt temp Now you can browse through the filesystem at mnt temp just as if it were the actual partition This also works for browsing through ISO images such as the Knoppix CD image or any other CD images you might have To reimage dev hdal with a file you have saved simply issue the dd com mand in reverse sudo dd if mnt hdb1 hda1_drive_image img of dev hda1 If you have saved your image over the network you can also reimage by reversing the command by typing ssh username 192 168 0 2 cat home username hda1_drive_image img sudo dd of dev hda1 With these commands you can easily image and reimage machines just from dd but
321. ger The addition of many GUlI based security programs such as Ethereal Etherape Nmapfe and so forth made the ISO size jump to 185 MB One of the rationales for keeping the ISO size limited to 185 MB was to nar row the focus of the distribution While other distributions had begun using a full size 700 MB CD for their ISOs I didn t feel a need to have large desk top environments games and full office productivity suites Each tool was evaluated and weighed for its positives and negatives which ensured that these high quality tools wouldn t duplicate the efforts of other tools During this time I added the toram boot option Hack 6 to allow the entire ISO image to be copied into the physical RAM of the computer This was a revolutionary addition because it freed up the CD ROM for burning CDs and other uses This addition also speeds up the entire distribution The distribution is under 185 MB in size so users with 256 MB of RAM can still use this functionality whereas a full Knoppix user requires 1 GB of RAM to do the same thing When the web site started receiving close to a million hits a month I real ized there was a need for a dedicated server I redesigned the entire web site and added a large download section over 20 GB to the server with mirrors to http wiretapped net and other security tools and projects After adding many more mirror sites all over the world LocalAreaSecurity com had offi cially become a hobby t
322. gt K3b to launch K3b KDE s easy to use CD writing application to back up the files to CD ROM If you have only one CD drive you can free it up with Hack 6 Of course this will only be use ful if the one drive you have can write CDs You can also back up files to shared directories on your network Follow the steps in Browse Windows Shares to mount the remote network filesystem to your Knoppix system Then you can simply drag and drop files from your local hard drive to the remote network share Here s the worst case scenario If you need to back up only a few small files and you have no other way of transporting them email the files to yourself Just follow the steps in Hack 21 to set up an email client and send the important files as attachments If you do this however keep in mind that most mail servers have a limit to how large file attachments can be Taa Resize Windows Partitions 89 Avoid spending money on Partition Magic or other commercial partitioning tools by using Knoppix to easily resize FAT FAT32 and even NTFS partitions There are two methods for resizing Windows partitions with Knoppix Use QTParted for all filesystems or ntfsresize for NTFS partitions QTParted is a much simpler program to use to resize partitions but for completeness I will also cover ntfsresize which requires more work and is more error prone QTParted is a GUI front end for the command line program parted Before resizing any W
323. guides below to change specific settings After you are finished making your changes unmount the proc filesystem with the following root ttyp1 umount proc Then press Ctrl D to exit chroot Now you are ready to pick up with the Make the Master CD Filesystem section of Hack 109 Change the Default Window Manager To get a better understanding of how the 45xsession script works I will demonstrate how to change which window manager Knoppix uses by default Boot Knoppix on a Desktop Hack 1 demonstrates how to use cheat codes to change the window manager Knoppix uses but if you always plan to use a different window manager you don t want to be bothered with typing in the cheat code every time The 45xsession script controls which window manager Knoppix uses based on the DESKTOP environment variable The script runs the etc sysconfig desktop script if it exists otherwise it defaults to using KDE If you want to default to FluxBox instead of KDE follow the remastering process to the chroot stage and create an etc sysconfig desktop file containing the follow ing line DESKTOP luxbox You can replace fluxbox with icewm xfce or any of the other window man agers that are on Knoppix Change Desktop Environment Settings If you dig further into the 45xsession script you might notice a section full of rsync commands similar to the following Copy profiles if not already present rsync Ha ignore exist
324. h century they had gained popularity in America because unlike sheathed knives which were suspicious looking pocket knives were easily and safely placed in pockets invisible to the eyes of potential enemies The cover image is an original photograph The cover font is Adobe ITC Garamond The text font is Linotype Birka the heading font is Adobe Helvetica Neue Condensed and the code font is LucasFont s TheSans Mono Condensed Linux KNOPPIX HACKS Tips amp Tools for Using the Linux Live CD to Hack Repair and Enjoy Your PC If you think Knoppix is just a Linux demo disk think again Klaus Knopper created an entire Linux distribution on a bootable CD and now a DVD so he could use his favorite open source tools on any computer This book includes a collection of tips and techniques for using the enormous amount of soft ware Knoppix offers not just to work and play but also to troubleshoot repair upgrade and disinfect your system without having to install a thing Knoppix Hacks is just like the distribution it covers a veritable Swiss Army knife packed full of tools Scores of industrial strength hacks many of them new to this second edition cover both the standard Knoppix CD and the feature rich DVD Maxi distribution included with this book With them discover how to use Knoppix to its full potential as your desktop rescue CD or as a launching point for your own live CD With Knoppix Hacks you can
325. h eyebrow raising names S T D is a nod to those 3 a m soda drinking code crunchers Keep on typin So What Is S T D S T D is a Knoppix variant dedicated to the daily tasks of an information security professional as well as a learning platform for those interested in exploring information security in a relatively safe and painless environment When you boot the disk you will find hundreds of open source security tools hidden away Here is where the fun part begins most of these tools are accessed via the command line This is often quite daunting for the new security enthusiast who is used to nice point and click GUIs or who has a background in Windows If you are serious about learning security tech niques you need to take the bull by the horns and start using command line tools You will come to see that it is well worth it in the end and you will never look back you may even find yourself trying to find command line options to GUI tools trust us The next cool thing is like most Knoppix distros when you boot S T D it runs completely in memory without changing the native operating system of the host computer 290 Chapter 8 Knoppix Reloaded HACK Full Protection with S T D 101 If you are using S T D for forensic purposes you must use the noswap cheat code when booting Failure to do so means S T D will use any existing swap files on the system poten tially erasing evidence So what does this actually mean to
326. h install that is currently on the machine to the latest version The Manual Install option is for advanced users and lets you manually parti tion your hard drive before KnoppMyth installs The KnoppMyth project continues to improve as time goes on There are still rough areas here and there such as installing only to dev hda but overall this is a great project that takes out many of the headaches of install ing and configuring a standalone MythTV PVR Visit the official site http mysettopbox tv for more tips and hints for getting the most out of this project Compose Musix Need an all in one multimedia live CD Look no further There are a number of live CDs out there both based on Knoppix and other wise who focus on multimedia purposes One of the latest Knoppix based CDs to come out Musix http www musix org ar contains basically every thing you would want for all sorts of multimedia needs from graphics pro duction music and video editing and more To get Musix go to the download page at http www musix org ar en download html and grab the latest version A few different mirrors are listed as well as a torrent Once you have downloaded the ISO image burn it to a CD and then reboot the machine The default Musix disk defaults to Spanish so if you are an English speaker boot with musix lang en Note that the keyboard will be different than you are used to as well so to hit the key press Shift 0 After M
327. h your applications and Ctrl Shift Tab cycles through the desktops By default Knoppix has four virtual desktops that Chapter 2 Use Your Knoppix Desktop 33 HACK 12 HACK 13 Customize the Desktop Look allow you to reduce clutter by grouping open programs onto different desk tops The pager highlights the active desktop so that you don t get lost Next to the pager is the task list which shows all of your open applications Click on the program name to raise and lower the program window Right click on any of the windows in the task list to see a list of actions you can perform on that window such as closing maximizing and moving the win dow to a different desktop After the task list are a few useful applets grouped in the system tray Many applications that run in the background put an icon here to allow you quick access to the program s options First you see a flag to represent the KDE keyboard tool that lets you change which keyboard locale you are using on the desktop Next you see a screen display applet Click on this applet to change screen resolution and monitor frequency on the fly If you have a detected sound card you will see a speaker icon that represents the KDE mixer applet which lets you change your volume settings If Knoppix is unable to configure your sound card you should notice that the mixer applet has a red slash through it Finally at the far right of the panel is a clock Before you can a
328. hall Check that it has reverted properly by knoppix ttypo knoppix sudo iptables L Chain INPUT policy ACCEPT target prot opt source destination Chain FORWARD policy ACCEPT target prot opt source destination Chain OUTPUT policy ACCEPT target prot opt source destination Further Reading e http en wikipedia org wiki Netfilter Honeypots Honeypots are used to monitor hacker activity in a relatively safe environ ment When launched a honeypot gives the hacker a target to attack which looks real but in reality has no valuable data or assets Honeypots also isolate the hacker so that the target cannot be used as a hop ping point to escalate attacks to other systems While the attacker is doing their thing the honeypot tracks all their activities so that you can learn about new techniques tools and get an idea of what kind of threat vectors you are vulnerable to We would recommend not jumping into the whole honey pot arena until you are well versed in all things security By running a honeypot you are intentionally increasing your attack profile thus making you more interesting to an attacker Should you encounter a skilled hacker there is a high probability they will persevere and attack one of your real systems after being lured in by the honeypot 298 Chapter 8 Knoppix Reloaded HACK Full Protection with S T D 101 S T D includes the following Honeyd The main honeypot daemon labrea
329. hapter 6 Repair Linux 235 HACK 79 Add an Extra Drive to a Software RAID 5 Array Some expensive hardware RAID controllers support adding new drives to RAID 5 arrays without requiring a backup and restore With Linux software RAID you can also grow RAID 5 drives with the mdadm tool This hack is a step by step guide to adding a fourth disk to a three disk RAID 5 array Hot adding a disk to a software RAID 5 array is serious RAID voodoo Whenever you reconfigure a RAID array on the fly you risk the loss of your data so be sure that any important data is backed up and say a little prayer before try ing this Now that all the caveats are out of the way let s talk about the example RAID used in this hack It is a 20 GB three disk RAID 5 array at dev md0 that contains the root partition for a filesystem that spans three hard drives dev hdal1 dev hdb1 and dev hdcl which are 10 GB each You then add a fourth 10 GB drive to this array located at dev hdd1 which makes the final four disk RAID 5 array 30 GB First make sure that the drive is assembled under Knoppix If it isn t follow the steps in Mount a Linux Software RAID to assemble the array To add a drive to md0 first use mdadm just as though you were hot adding any other drive to an array sudo mdadm add dev mdo dev hdd1 Next use the grow option for mdadm to tell it to expand the number of disks in the current RAID5 array from 3 to 4 to include this n
330. hapters provide you with a guide to the Knoppix desktop and a primer for the major desktop software Knoppix includes If you find you really like the Knoppix desktop and want to use it on a system permanently go to Chapter 4 for steps to install Knoppix directly to your computer The middle chapters cover more advanced uses for Knoppix particularly for system administration and recovery Use these chapters as a quick reference when you need to repair a system or just as a simple way to do much of your daily work with a single CD Use the final chapters in the book if you are interested in creating your own Knoppix based CD There s a chance the features you need have already been included in another live CD based on Knoppix so check out the other Knoppix based distributions in Chapter 8 before you start through the remastering process You can use the final chapter in the book as a step by step reference for the remastering of your own Knoppix CD with the soft ware and features you want How This Book Is Organized Knoppix is incredibly flexible and can be used for many tasks but these tasks generally fall into a few different categories desktop use system administration system recovery and live CD remastering The first few chapters act as an introduction to Knoppix and help you boot Knoppix on your hardware and then use it as your Linux desktop The middle chapters feature Knoppix as a system administrator multitool with tips on how t
331. hat had gotten way out of hand With my work schedule expanding and the needs of the site also growing I felt it was time to find talented people to help contribute to the development of L A S Linux as well as to the content of the web site Today the L A S team has grown to four people with numerous partnerships with other information security organizations and groups To satisfy the requests of our users we have also created a slightly larger ver sion of L A S Linux to fit on 210 MB mini CDs This allows for the addi tion of the Mozilla Firefox web browser and a handful of additional tools not on the 185 MB version while still being small enough to fit into 256 MB of RAM using the toram option We pride ourselves on our somewhat regular release schedule for new ver sions The security tools L A S Linux contains are continuously being improved with new releases and our users always have an up to date ver sion of a tool with the latest signatures unlike a lot of other security toolkit live CDs which have come and gone or are updated very seldom 288 Chapter 8 Knoppix Reloaded Download Local Area Security People have found many interesting uses for L A S Linux Some of my favorites are the following One user dropped me an email that informed me how L A S Linux had saved the day at his place of employment It seems that its NT Pri mary Domain Controller went down So he booted L A S Linux and used Samba to mo
332. hat is examine your boot grub menu Ist or etc lilo conf file iden tify which configuration is chosen by default and then look for what initrd file is referenced there Once you have identified it move it out of the way and then create a new initrd for the corresponding kernel For instance on a server that uses the Redhat 2 4 21 32 0 1 ELsmp kernel I would run the following mv boot initrd 2 4 21 32 0 1 ELsmp img boot initrd 2 4 21 32 0 1 ELsmp img bak mkinitrd boot initrd 2 4 21 32 0 1 Elsmp 2 4 21 32 0 1 Elsmp Chapter 6 Repair Linux 251 HACK 86 HACK 86 Turn a Physical Machine into a VMware Virtual Machine If you aren t using a Redhat system you might use a differ ent tool to create an initrd file For instance Debian systems gt use the mkinitramfs tool instead If that is the case then be sure to check out the manual page for the program type man programname to learn about how to correctly create the initrd file Now you are ready to reboot the virtual machine To prevent any potential IP conflicts you might want to take the precaution of powering off or at least unplugging the network cable from your physical server On the vir tual machine type exit to exit the chroot environment unmount any mounted filesystems on the virtual machine and then reboot only this time boot off of the hard drive instead of the Knoppix CD As the system boots up if it is a Redhat system likely the kudzu h
333. have to edit your PPP options In the file etc ppp options are two options you need to change as follows Icp echo interval 30 Icp echo failure 4 The lcp echo interval variable controls how many seconds between each echo request and the Icp echo failure variable controls how many failed echo requests to allow before giving up Experiment with changing 1cp echo interval and lcp echo failure to higher values so you will not be dis connected as quickly If you come across no carrier errors such as after a forced disconnect you will probably see the following log output Jun 10 06 53 19 Knoppix chat 2732 timeout set to 120 seconds Jun 10 06 53 19 Knoppix chat 2732 abort on BUSY Jun 10 06 53 19 Knoppix chat 2732 abort on ERROR Jun 10 06 53 19 Knoppix chat 2732 abort on NO CARRIER Jun 10 06 53 19 Knoppix chat 2732 send ATE1 M Jun 10 06 53 19 Knoppix chat 2732 expect OK Jun 10 06 53 19 Knoppix chat 2732 M Jun 10 06 53 19 Knoppix chat 2732 NO CARRIER Jun 10 06 53 19 Knoppix chat 2732 failed Jun 10 06 53 19 Knoppix chat 2732 Failed NO CARRIER Wait until pppd tries to auto reconnect and the second time around it should work If this still fails turn off the phone and start again Once you are connected use the connection like any other Internet connec tion On average I can get between 1 and 3 Kbps just enough for a shell connection or some web browsing When you are finished
334. he co owner of Inside Security IT Consulting GmbH Simon Peter Point and Klik to Install Applications Hack 35 has been using Knoppix for years and is the initial developer of klik At the time of this writing he is conducting research on economic and business implications of open source software and Nanocompetition just after having completed his studies of economics and management at Witten Herdecke Germany Purdue and Harvard University He can be reached at http www simon peter de Karl Sigler a k a tlck_t0ck Full Protection with S T D Hack 101 has been teaching information security for nearly a decade and is cur rently a security instructor in Atlanta GA In his spare time he is the creator maintainer of the Knoppix STD Linux distribution Wim Vandersmissen Distribute the Load with ClusterKnoppix Hack 103 is a system network administrator and he has been using Linux for over ten years now and still likes to play with it He is the creator of ClusterKnoppix Jascha Wanger Download Local Area Security Hack 100 has been a network and security consultant for the past ten years At 22 Jascha began doing security work in Texas as co owner of a systems integra tion firm Jascha currently works with Local Area Consulting where he holds the position of VP of Security Solutions With his work Jascha has forged new ground designing security solutions and compliance tools for HIPAA and Sarba
335. he configuration file for its kernel in the boot directory in the format config kernel_version If you have a standard unpatched kernel that s the same revision as the one Knop pix uses then you can simply copy the configuration file to the root of your Chapter 5 Put Knoppix in Your Toolbox 193 HACK 61 HACK 62 Add Knoppix to Your PXE Boot Environment kernel source tree and name it config to start using it If your kernel source is located at usr src linux 2 6 19 for instance copy Knoppix s configura tion to usr src linux 2 6 19 config If your kernel revision is greater than the one Knoppix uses for instance you want to build 2 6 20 but the version of Knoppix you have uses a 2 6 19 kernel then after you copy the configura tion file to the kernel source tree and name it config you must run the fol lowing command from the root of the kernel tree to see new kernel options root ttypo linux 2 6 20 make oldconfig Once the configuration is copied and ready you can edit the configuration and build the kernel as you would normally Do not use the kernel config for an older revision of the kernel for instance Knoppix uses 2 6 19 but you want to use 2 6 17 because while it might work problems may arise due to options that exist in the Knoppix kernel that don t exist in the kernel you are building Copying some of these settings from Knoppix to your system can definitely save you time when trying to get ha
336. he first time First it will ask you for the gen eral type of configuration choose Internet Site Next it asks you where root mail should go Leave this blank and select OK Next you will be prompted for your local mail server name This is the name that remote mail servers will see when they connect to you You can either leave this as Knop pix or specify a different hostname you have assigned to this machine The next screen asks you which domains postfix should consider as the final des tination Leave this field as is Also accept the default on the next screen that prompts you to use synchronous updates The next screen allows you to identify the networks this host will relay mail for If you only intend for this host to spool mail for your primary mail server then you will probably want to set this to 127 0 0 0 8 If you intend on using this host to send mail from your network out to the world also add any other networks that will connect to this host and send mail through it Chapter 5 Put Knoppix in Your Toolbox 151 HACK 52 HACK 52 Make an Emergency Mail Relay For instance if all of your internal machines need to send mail through this host and your network is 192 168 1 x set this field to 127 0 0 0 8 192 168 1 0 24 Be careful with this option Any networks you add here will be able to relay mail through your host If you add a public IP network here you could potentially turn your mail server into an o
337. he master node using openMosix view see Figure 8 2 i Geek nents Ete yew Config Colector Heip a BO EN f F openMosticollector status W ciustemodes load balancing eMiciency over overall used memory all memory all cpu aih nodes cr 7 T A S12 Male f 10 3316 y I NI j 7 a vit 2 it ZA PERELE DI Ee mag BRR Figure 8 2 openMosixview in action Test the Cluster There are a lot of tools to be found on the openMosix web site from simple programs to stress test suites but you can simply run the following script to test your cluster This script creates a nested loop that counts from 0 to 10 000 10 000 times and is an easy way to fully load your processor knoppix ttypo knoppix awk BEGIN for i 0 i lt 10000 i for j 0 j lt 10000 j amp Run this script a number of times so that there are multiple processes for openMosix to distribute among the nodes then run mosmon in another shell and you should see the load being balanced between each node in your cluster Chapter 8 Knoppix Reloaded 321 HACK 104 Analyze Quantian See Also e The official ClusterKnoppix page at hitp bofh be clusterknoppix e The official openMosix page at http openmosix sf net Wim Vandersmissen T Analyze Quantian f 104 Quantian is an extension of Knoppix and ClusterKnoppix tailored to numerical and quantitative analysis The Quantian live DVD distribution http
338. he rule is going to apply to In both of these cases the rule applies to all services The second field is the list of hosts this rule applies to in either IP address or hostname form The third field deter mines whether this rule allows access or denies access For example if you want to allow your local subnet access to your FTP server add a line read ing in ftpd 192 168 0 ALLOW Notice the use of the wildcard This tells hosts allow to apply this rule to any host with an IP between 192 168 0 0 and 192 168 0 255 Any changes to this file affect any new connections so you don t need to restart inetd The hosts deny file uses the same patterns but uses them to opposite effect NFS Samba isn t the only file sharing method Knoppix supports NFS Network File System the most commonly used Unix file sharing protocol is also Chapter 5 Put Knoppix in Your Toolbox 157 HACK 53 HACK 54 Wardrive with Knoppix available To configure NFS you must first establish which directories you wish to share If for instance you wish to share a mounted filesystem such as mnt hda1 you must make sure that the filesystem is mounted before NFS is started Also keep in mind that you are unable to unmount this filesystem as long as NFS is running The etc exports configuration file determines which directories are shared by NFS Edit etc exports as root and add the directories you need to share The syntax for this file is
339. hed with the partition to unmount it cleanly sudo umount dev VolGroupo0 LogVoloo Reset Linux Passwords 81 Use Knoppix to reset forgotten Linux passwords If you have forgotten a user s password under Linux and you have root access you don t usually need a rescue disk because you can reset the pass word with the root account Even if you have forgotten the root password most Linux distributions let you log in to single user mode add the single or init 1 argument to the kernel at the boot prompt and change the pass word from the root account A paranoid system administrator might password protect or disable single user mode altogether in etc inittab but you can still get to a root prompt to reset the password if you pass init bin sh to the kernel when you boot However if the boot loader itself is password protected and you forgot the password you must have some sort of rescue disk to reset the password both in the boot loader reference Hack 65 or Hack 66 for steps to reconfig ure the boot loader and in the etc passwd file It is simple to reset a password in Linux and to reset a password with Knop pix requires just one extra step Boot the Knoppix CD and mount your Linux system with read write permissions knoppix ttypo knoppix sudo mount o rw dev hda1 mnt hda1 Replace hda1 with your root partition Now run passwd under chroot so that the passwd command changes the root password for the mounted syste
340. her Sourcepole project http vww sourcepole com sources software mapdesk MapDesk is a map editor and viewer for MapServer TerraView A geographic data viewer that can use both vector and raster based data JUMP A GUI workbench for viewing and processing spatial data GPS applications GPSdrive GPSman and support for GPS peripherals To get a sense of what GIS Knoppix can do try one of the demos included on the disk Click the GIS folder on the desktop and then click MapLab In the Mozilla window that appears click File Menu gt Open Map and select the tutorial see Figure 8 4 You can toggle which information MapLab displays from the toolbar on the left including roads cities and national boundaries You can also use MapLab to create your own map data from scratch To open the MapLab editor click the icon that looks like a pencil drawing on the earth which is in the upper left corner of the page Chapter 8 Knoppix Reloaded 325 HACK 106 TiVo Your Computer MapLab Mozilla i a File Edit View Go Bookmarks Took Window Hep Q http localhost mapisb a a Zi Home E Bookmarks S CD Inhaltsverz S4 KNOPPIX We LinuxTag We MapLab MapBrowser JJIA eF 3 oaa 8 2 tutorialmap Legend Active Layer ao RHH ma M grid gt popplace on road ROSA is r ral 2 Ean C p a fedlimit C prov_bound gt drainage drain Data Stor
341. hing entirely different and colorful without even planning to The Past When in 1999 bootable business card sized Linux Rescue CDs appeared as giveaways at computer expos I was extremely curious about how they worked And since they were free software I was able to look inside and try to figure out how the software worked After I successfully made a bootable CD I decided to make a personal rescue CD That way it would be possi ble to use the software that I needed from a CD rather than carry around an expensive and fragile laptop Computers are available everywhere anyway so why not just have the software in your pocket instead The idea was to put in the CD and start working right away without having to worry about installation or configuration of any kind But hardware is evil Everyone knows this even if he s not a computer expert Vendors seem to create their own standards on demand which are not standardized at all and don t even provide technical specifications Compatibility in hardware depends more on luck or chance than on approved norms so I had to decide among choosing a system that was so cheap in its hardware requirements that it would work on virtually every PC which would probably mean that graphics worked only in VESA mode at xi best installing a manual hardware selector in order to load the necessary drivers or scripting some kind of automatic configuration For some reason the last
342. his hack is actually very similar to Hack 83 as it makes use of the root option of rpm which allows it to install packages from within a chrooted environment This example uses the same scenario as the previous hack a broken modutils package that prevents the system from booting correctly To fix this problem go to the package repository for your distribution find the previous version of the modutils package and copy it to your home directory Then mount the root directory for your distribution read write in this example dev hdal1 Once the partition is mounted install the modutils package with knoppix ttyo knoppix sudo rpm root mnt hda1 i modutils version i386 rpm You can also use the same method to repair rpm itself if it is broken or cor rupted because you wouldn t be able to use rpm on the system to fix itself Download the replacement rpm package from your distribution package repository and then run knoppix ttyo knoppix sudo rpm root mnt hda1 i rpm version i386 rpm Or use tar and alien to fix rpm with knoppix ttyo knoppix ttyo knoppix ttyo knoppix ttyo knoppix sudo alien to tgz rpm version i386 rpm knoppix sudo mv rpm version tgz mnt hda1 knoppix cd mnt hda1 knoppix tar xzvf rpm version tgz With all of the included rpm tools you definitely want access to a Knoppix disk for system rescue even if you don t run Debian Similar to Debian repair do most of your repairs from withi
343. his method is the least destructive to the host USB key that is I don t have to format or repartition it for this method to work While most newer BIOSes support this boot mode some can only boot USB drives via the older USB ZIP method If your system won t boot the key in USB HDD mode then check out the documentation on http www knoppix net wiki Bootable_USB_Key for the USB ZIP method RK The method I use to boot Knoppix uses the USB HDD boot 368 Chapter 9 Knoppix Remastered Numbers 3D installing Nvidia drivers 100 103 45xsession script 346 A access Freeduc 280 ACID 300 acpi off cheat code 20 adding 194 197 extra drives to RAID 235 games 90 94 hardware compatibility 23 26 PXE 194 197 source trees to kernels 101 addresses NAT configuring 143 testing 24 advanced cheat codes 19 20 Advanced Package Tool APT configuring 123 airsnort 312 algorithms Modulo X 26 moving inversions 24 analysis forensics data collecting 176 180 Quantian 322 324 anti aliasing 37 Apache servers modules 149 wiki platforms creating 199 Index appearance customizing 35 38 Apple Macintosh computers Intel based 273 275 applets Desktop Sharing 132 viewing 34 applications Audacity 53 Bittorrent 7 cfdisk 115 Damn Small Linux 283 dd program 218 developing 97 99 email 43 Find Files 32 Freeduc 280 Gaim 64 games 49 GIMP 47 gmplayer 54 GnomeMeeting 64
344. how others approach systems and problems is often the quickest way to learn about a new technology Knoppix Hacks provides the hacker with an excellent multi purpose tool for all of their hacking needs The sheer flexibility of Knoppix means the clever hacker can get all of her work done with a single CD Rescue CDs often bring out the hacker in people since you must often find clever ways to get a system functional again or recover lost data Knoppix gives you all the repair xx Preface tools you need as you go from plan A to plan Z and Knoppix Hacks shows you how to use those tools in ways you may never have considered How to Use This Book You can read this book from cover to cover if you like but each hack stands on its own so feel free to browse and jump to the different sections that interest you most If there s a prerequisite you need to know about a cross reference will guide you to the right hack It s important to note that although Knoppix can be installed directly to a hard disk and indeed there is an entire chapter devoted to that in this book the hacks in this book assume you are running Knoppix directly from CD unless otherwise noted The first chapter is an introduction to Knoppix itself and the Knoppix live CD boot process Refer to this chapter if you have any problems getting the CD to boot on your particular hardware or if certain hardware doesn t function If you are new to Linux itself the next two c
345. ian s mirrors In this case modutils is located at http http us debian org debian pool main m modutils This mirror contains packages for the architectures that Debian supports so make sure to grab the package corresponding to your architec ture likely the package ending in i386 deb Once you have obtained the package that corresponds to your architecture run dpkg in its chroot mode to install the package to the mounted Debian system In this example the Debian root directory is mounted at mnt hdal so the command is knoppix ttyo knoppix sudo dpkg root mnt hda1 i modutils_version_i386 deb Of course replace the mount point to match where your Debian root parti tion is mounted and change the package to whichever package you need to install Dpkg runs through the full downgrade with any reconfiguration you might need to perform and once dpkg is finished you should be able to reboot into the system with a fixed package You can also use this method to fix a broken or corrupted dpkg package Obviously if your package installation program is broken you can t use it to fix itself But you can use Knoppix s working dpkg to install a new pack age manager in a chroot environment After you download the appropriate package from http http us debian org debian pool main d dpkg run this command knoppix ttyo knoppix sudo dpkg root mnt hda1 i dpkg_version_i386 deb You can also download the replacement packag
346. ian with MythTV mary IDE drive on the first bus There is a roundabout method to install to a different drive listed on the Knopp Myth site but if you have such a setup it is better to go with the manual install WR Currently the auto install works only for dev hda the pri KnoppMyth reboots once the install finishes and then boots back into your new Debian install Enter your root password at the prompt and then the KnoppMyth install asks some final questions including your network con figuration DHCP versus manual configuration and whether to use i586 or i686 optimized modules i586 for Pentium class processors and i686 for PentiumPro and above and any Athlon processors When KnoppMyth s own configuration is done it launches the MythTV setup program Use this GUI to tell MythTV about any TV Tuner cards your system has which channel to default to which type of TV service you use broadcast cable digital cable etc your Zap2It account information and so on Once MythTV is set up the way you want hit Esc to exit and watch as new television listings are downloaded This process can take some time so be patient Afterwards the MythTV frontend the main program you use to watch and record TV launches Now you can go through the interface and schedule recordings and watch live TV 328 Chapter 8 Knoppix Reloaded Compose Musix The Auto Upgrade option is fairly straightforward and simply upgrades the KnoppMyt
347. ical partition tool and a series of 278 Chapter 8 Knoppix Reloaded HACK Educate Yourself with Freeduc 97 configuration tools have been under development and are likely to be part of Morphix by the time this book comes off the press In addition to these classic Morphix ISOs all at version 0 4 1 there are a number of other newer ISOs available on their site as follows MorphixLiveKiosk This Morphix release contains a locked down Firefox browser and is ideal for creating a custom kiosk CD It is based on the MorphingMor phix ISO and includes the Matchbox window manager MorphingMorphix This release was designed to make it easy for anyone to create his own Morphix based release It includes a number of HOWTOs and exam ples you can step through for your own custom release Morphix 0 5 preX Morphix also has a new 0 5 release that is still in prerelease versions as of the time of this writing Currently there is a base ISO to provide a starting point to create other Morphix releases On the site you will also see Gnome KDE LightGUI and IceWMGUI customizations on this core release To find out more about the structure of Morphix and how to use Morphix to create your own CDs check out Morph Morphix Hack 114 See Also e The official Morphix page at http www morphix org Alex de Landgraaf I Educate Yourself with Freeduc f 97 Freeduc is a Knoppix based distribution with a focus on providing free software t
348. ice you should notice that in expert mode Knoppix gives much more output telling you which partic ular devices it is probing for and if the modules load successfully or not Next Knoppix asks Do you want to load additional modules from floppy disk Y N This option gives added flexibility to Knoppix in the case that the default Knoppix kernel doesn t have a third party module that you need for your hardware After you answer this question Knoppix enables DMA acceleration for IDE devices creates the ramdisk and starts the init process Knoppix then notifies you that you have entered the interactive configura tion s second stage The interactive second stage gives you the opportunity to reconfigure many of your hardware settings through a series of questions The first question is Do you want to re configure your console keyboard Y N If you forgot to set the console keyboard to match your locale you can now configure it Following that is an option to configure your sound card Select yes to launch the sndconfig program which tries to detect your current sound card and loads the appropriate module for it After you configure the sound card you can set up your mouse Select yes to start a mouse configuration pro gram that asks you questions such as how your mouse is connected and which protocol it uses After the mouse is configured Knoppix detects your graphics settings and displays which default X
349. if ferent KDevelop options based on which language you would like to pro gram in Select KDevelop Multilanguage IDE to launch the standard KDevelop Multilanguage IDE The default window see Figure 3 4 has a number of toolbars that provide you with quick access to common func tions so you can compile execute and debug your program with the push of a few buttons On the toolbar are also shortcuts to all of the classes and functions in a program Along the bottom of the window is a tab bar that lets you switch the bottom panel to show output from compiler messages application output CVS output and a number of other programs This hack walks you through the steps of building a simple Hello World program using KDevelop so you can see just how easy it is to manage a pro gram this way To start a new project click Project New Project In the project wizard that appears select the language in which you wish to program to see a list of KDevelop s predefined templates For most languages KDevelop dis plays only basic Hello World templates but for C and C especially KDevelop provides templates for a basic Gnome application and a number of KDE applications applets and plug ins Select your language and tem plate and name your project If you are using CVS or Subversion on your project for version control select it in the next window Then configure the header for your source code files Here you can put any licensing or
350. if gpart ends 4 MB early as it did in my case I can be pretty certain that I need to extend it to the end It is scary to be in a position where you must think about partition table recovery At least with Knoppix and gpart it s possible to recover the parti tion table without completely reinstalling the operating system rs Resize Linux Partitions 69 Use utilities such as QTParted and parted to resize ext2 ext3 linux swap ReiserFS and XFS partitions Despite even the best planning files sometimes fill up a partition In the case of a drive with multiple partitions you might end up moving one of the par titions to a second drive back up the first drive increase the size of the first partition and restore Of course to back up and restore you must have a spare drive large enough to store your important files which may not always be the case If you have a Knoppix CD handy you can quickly and easily resize partitions without having to back up and restore While resizing partitions does not require a backup and restore resizing partitions is always a potentially dangerous activity that could result in data loss Back up any important data on a partition if possible before you attempt to resize it Use the QTParted utility to resize partitions easily This graphical tool lets you add delete move and resize partitions with many filesystems includ ing ext2 ext3 ReiserFS XFS FAT FAT32 and NTFS To start QT
351. ify the preexec line for the disk in question in smb conf to read preexec sudo bin mount o rw mnt hda1 Chapter 5 Put Knoppix in Your Toolbox 147 HACK 50 HACK 51 Create an Emergency Web Server Replace mnt hda1 with the drive you are configuring To allow anyone to access the share without requiring a password add the following line to the share s configuration guest ok yes You do not need to restart Samba for share level disk level changes to take effect However changes you make to the global configuration under the global header require you to restart Samba To share individual directories from the hard drives you can add new shares to the default configuration It doesn t matter which script option you chose earlier just add the new configuration to the end of the file The following example creates a new directory called share under the home directory knoppix and configures it as a guest share under Samba First create the share directory mkdir home knoppix share Then edit etc samba smb conf as root and add the following lines share comment Knoppix share browseable yes path home knoppix share writeable yes guest ok yes Once you save your changes your new directory immediately appears as a shared disk and anyone is able to view add and delete files in that direc tory Keep in mind that this share is running off of your home directory that is in a ramdisk by
352. in doubt you can always select all listed devices Firewall Active This is a basic option that allows you to enable and disable the firewall Save configuration Use this option to save the changes you made so you can restore them later By default the Knoppix firewall is set to easy mode This means that only the above options are listed and if the firewall is enabled it will block all incoming access and only allow outgoing connections If you do not plan to run any services on your machine like a web server SSH server VNC etc these defaults should work fine for you To enable the firewall just double click on the Firewall Active option choose Start Firewall Now and then click OK If you do plan on enabling some services on your computer you will want to switch to either medium or expert mode so you can allow access for 144 Chapter 5 Put Knoppix in Your Toolbox Create an Emergency Router Main Menu KNOPPIX FIREWALL TOOL External Devices ippp ppp eth Firewall Active Save configuration j OK x cancel Figure 5 3 Default Knoppix Firewall window specific services To choose the medium mode double click the Mode option select medium in the new window that appears then click OK Once medium mode is enabled a whole new list of options appear Open Ports This option lets you configure which incoming ports to allow through and provides a list of common services
353. inamp under Windows and can play most popular audio formats including MP3 WAV Ogg Vorbis and audio CDs To open the playlist editor click the button labeled PL on the inter face right click on XMMS and select Playlist Editor or type Ctrl E Within the playlist editor you can add delete arrange and sort tracks The audio settings are adjusted with the equalizer Display the equalizer by clicking the EQ button next to the PL button on the interface by right clicking and selecting Graphical EQ or by the keyboard shortcut Ctrl G X MULTIMEDIA SYSTEM Figure 2 11 XMMS Right click XMMS and select Options gt Preferences to access many addi tional XMMS plug ins Knoppix includes The shortcut is Ctrl P The prefer ences window has tabs organizing different XMMS plug ins and options and includes plug ins for audio and visual effects that add extra stereo makes the volume levels of all your tracks the same or displays your music in interesting and colorful ways 52 Chapter 2 Use Your Knoppix Desktop Rock Out with Knoppix Multimedia Some people find the default look of XMMS too techno Unfortunately Knoppix doesn t include any extra skins for XMMS but you can download new ones directly from XMMS s official site at http www xmms org and save them in home knoppix xmms Skins Right click on XMMS and select Options Skin Browser to choose one of the skins you have downloaded Editing Sounds Knoppi
354. indows partition it is very important that you defragment the drive from within Windows These resizing utilities work by basically truncating the partition and recreating it and if you don t defragment you lose the file fragments at the end of the drive When using Knoppix be sure that all of the filesystems on the disk are not mounted before resizing even if the partition that is mounted is not the partition that you plan to resize Also whenever you resize a partition you risk data loss so back up important files Once you defragment the filesystem that you want to resize boot into Knop pix and resize it with QTParted using the same steps outlined in Hack 69 To run QTParted click K Menu gt System gt QTParted choose the drive to resize right click on it and select resize and then drag the corners of the 258 Chapter 7 Rescue Windows Resize Windows Partitions partition as shown in Figure 7 1 until it is the size you want Finally com mit your changes to resize your filesystem r See ey Aji w izsiz partition y J Lxi Minimum Size 2632 MB Free Space Before fo 00 MB New Size 3628 1 5 aj MB Free Space After fieait 4 MB It is recommended to backup your data before do this operation Figure 7 1 Resize a partition with QTParted If you want to resize an NTFS partition and your version of QTParted does not support NTFS resizing you can also use the ntfsre
355. ine s NX client and other software included on Knoppix are licensed under the GPL and further information about the NX server can be found at http www nomachine com If you have an NX server to which you wish to connect start the NX Con nection Wizard by clicking K Menu gt Internet gt NX Client for Linux gt NX Connection Wizard The wizard asks you a series of questions about the server s IP address your connection type and the protocol the remote con nection is using to share the desktop Fill out the information in the wizard to see the NX Client login window and the session for the server you have just configured will be selected in the drop down Session menu Type in your NX server login and password and click Login to connect to the remote NX server and start your remote desktop connection For further help with using the included NX software Knoppix has a direct link to NoMachine s support page that is accessible by clicking K Menu gt Internet NX Client for Linux gt NX Help on the Web Share the Local Desktop Knoppix also supports sharing its own desktop with remote users by using the VNC protocol This is useful when you find yourself talking someone through repairing a system that is unable to boot The machine is unboota ble so you can t take advantage of any remote control utilities the computer may already have You know that with Knoppix you can use some of the advanced system recovery tools to fix the s
356. ine since the last sync are also deleted on the virtual machine Also note that you need to change the paths on the physical machine so that they point to where you mounted the partitions under mnt sudo rsync avx numeric ids progress delete remotehost mnt sda1 mnt sda1 sudo rsync avx numeric ids progress delete remotehost mnt sda1 mnt sda2 This final sync might be relatively quick or it might take a long time depending on how many files have changed since the first sync and how many files you have on the partition overall Once it completes you are now ready to perform the finishing steps on your virtual machine to make it ready to boot Perform Finishing Touches You will need to make some final tweaks to the virtual machine so that it can boot on its new hardware All of these tweaks should be done within a chroot environment so identify your root partition in my example it is mounted at mnt sda1 and then chroot into it sudo chroot mnt sda1 Restore the Boot Loader The first step in this chroot environment is to install the boot loader on the disk Examine the boot grub menu Ist file if you use 250 Chapter 6 Repair Linux Turn a Physical Machine into a VMware Virtual Machine grub or the etc lilo conf file if you use lilo in your chroot environment and if any disk device names are different on your virtual machine than on your physical machine for instance you went from an IDE to a SCS
357. ing etc skel acrorc Xdefaults gimp gconf bashrc nessus links local lynx qt xine tmp HOME 2 gt dev null USER knoppix amp amp rsync Ha ignore existing usr share knoppix profile acrorc Xdefaults bashrc nessus links lynx qt xine tmp HOME 2 gt dev null USER knoppix a f usr share knoppix profile fonts cache 1 amp amp rsync H ignore existing usr share knoppix profile fonts cache 1 HOME 2 gt dev null These series of commands copy default settings from the etc skel directory to home knoppix if they don t already exist To change the appearance of 346 Chapter 9 Knoppix Remastered Personalize Knoppix KDE click K Menu gt Settings gt Control Center and make your changes in the Appearance amp Themes section Once the wallpaper themes color scheme and the desktop itself are arranged to your liking open a terminal and synchronize your changes with the source KNOPPIX filesystem knoppix ttypo knoppix sudo rsync a home knoppix mnt hda1 source KNOPPIX etc skel If you are using a window manager other than KDE it is likely that the 45xsession script does not automatically copy over your settings This means that you must add a special entry to the source KNOPPIX etc X11 Xsession d 45xsession script yourself to manage copying over the settings For instance if you use fluxbox on the desktop all of your settings are stored in the fluxbox direct
358. ings Similarly the depth cheat code lets you configure how many bits per pixel for X to use to display color for instance the cheat code depth 16 starts X with support for 65 536 colors Set depth to 24 16 15 or 8 256 colors Use this cheat code when you want to use high resolutions with high refresh rates but your video card can display them only at lower color depths If Knoppix can t automatically detect the appropriate horizontal and verti cal refresh rates for your monitor it might cause X to start up at a much lower resolution and refresh rate than your monitor is capable of Alterna tively X might try to display the highest resolution possible leaving you with screen flicker from the low refresh rate In either case you can force Knoppix to try X at a vertical and horizontal refresh rate of your choice with the xvrefresh and xhrefresh cheat codes The documentation that came with your monitor should list in the technical specifications what range of vertical and horizontal refresh rates it supports If you don t have your moni tor documentation you can usually find technical specifications by search ing for your monitor s model number on the Internet Also some monitors actually list the horizontal and vertical refresh rates on a label on the back Once you have a list of valid refresh rates your monitor supports you can experiment with different values in the range until you find the optimal resolution color depth a
359. inirt gz file 366 Miscellaneous tab 37 mkisofs manpage 339 mkswap command 336 MMaker 356 358 Model_K 282 modems configuring 57 modes Change read write 29 expert booting from 22 firewalls 144 kiosk 87 Safe Windows 256 modifying backgrounds 35 36 BIOS boot order 2 booting defaults remastering 363 366 colors 35 36 Debian packages 243 244 default window managers 346 desktop 34 fonts 35 36 icons 35 keyboard mapping 12 languages 358 passwords 240 RAID 227 230 runlevels 241 screensavers 35 splash screens 35 styles 35 windows 35 modules Apache severs 149 information copying 193 md kernel 226 Index 381 modules coninued Morphix 277 auto building 356 358 SCSI listing 22 Modulo X algorithm 26 modutils package 243 monitor settings detecting 16 18 MorphingMorphix 279 Morphix 277 279 0 4 1 LightGUI 277 0 5 preX 279 auto building 356 358 Gnome 278 remastering 353 356 MorphixLiveKiosk 279 mosmon 319 mounting 29 loopback option 182 NFS remote connections 158 partitions LVM 237 239 scanning for root kits 175 Windows 255 RAID 225 mouse settings 18 moving desktop settings 80 files 120 hardware settings 192 194 kernels 246 RAID 230 235 moving inversions algorithm 24 Mozilla settings copying 84 mp3encode 294 multimedia applications 50 55 codecs installing 111 Damn Small Linux 283 Musix 329 331 Multimedia submenu 31 m
360. initial manual effort and free up valuable thinking time that you can use to focus in on the more interesting stuff You can update the nessus exploit plug ins to the most recent set by running nessus update plugins if you have internet access More information on using nessus to perform a network security audit is available in Hack 55 Nessus is an open source success story however newer versions are no longer GPL but still free for individual use Nmap Short for Network map Nmap is a host port and OS enumeration tool and probably the most famous security tool of all time One of your first jobs as a security enthusiast should be port scanning your target net work Before you do anything else you should know every live IP address the OS behind those addresses and every open port and the daemons listening on them There are many port scanners but none as powerful as Nmap If you learn only one tool well then make it Nmap it does more than you think Nikto Nikto is a CGI assessment tool that has replaced RFP s whisker This is an application level assessment tool 310 Chapter 8 Knoppix Reloaded Full Protection with S T D POf Passive OS Fingerprinting tells you the OS at a particular IP address just by monitoring the wire and seeing which sorts of packets it spits out You will also find within the shell usr bin vuln test src many exploits and exploit code for you to study and use in your practices We
361. into two parts the nessusd server which runs in the background and performs all of the actual scanning and the nessus client which provides an interface for nessus users to start network audits and view results Nessus allows for a detailed and noisy look at a given network or a given host It probes each subnet domain and host that it finds in the ways that you direct it to To make nessus as useful as possible new plug ins are published frequently You can get these plug ins for your nessus server by running the script nessus update plugins While this script eliminates the time consuming work of downloading plug ins it isn t without risk The plug ins are not signed and it is possible for an attacker to hijack your updates and replace them with their own malware so don t run this on an insecure network such as HOPE or Defcon This is a known risk the manpage has more information on this subject 166 Chapter 5 Put Knoppix in Your Toolbox HACK Audit Network Security 55 To run the update script you need root privileges so click K Menu gt KNOPPIX gt Root Shell Now edit etc nessus nessusd conf and change plugins folder usr lib nessus plugins to plugins folder etc nessus plugins Now run the nessus update plugins script and download all of the new plug ins root ttypo knoppix nessus update plugins v lt Josticket_view_attachments nas1 freebsd_php_438 nas1 php_strip_tags_memory_limit_vuln
362. iple platforms and to programmers who have improved the VNC protocol by adding encryption and compressions and incorporated it into their open source projects The current open source version of VNC is main tained by the company RealVNC and can be downloaded for free from its site at http www realvnc com Chapter 5 Put Knoppix in Your Toolbox 129 HACK 46 Run Remote Desktops Knoppix includes the Linux RealVNC client xvncviewer to connect to remote VNC servers For system administrators who are familiar with that program open a terminal and type this command to connect to a remote VNC server knoppix ttypo knoppix xvncviewer server display Now type the password for that server at the prompt The xvncviewer pro gram also has a large number of options to enable full screen mode and con trol settings such as color depth Use xvncviewer from the command line if you are already experienced with the program or your connection requires special options If you re not comfortable with the command line or don t have one open you can click on K Menu gt Internet gt More Applications gt xtightvncviewer to launch a GUI that makes connecting to remote machines quick and easy If you are completely new to VNC or you plan on managing multiple con nections at once you might find the included KDE application krdc for KDE Remote Desktop Connection to be a better choice Krdc allows you to manage multiple VNC and RDP sessions
363. is directory contains the normal boot files similar to the KNOPPIX directory The morphix file in this directory is comparable with the Chapter 9 Knoppix Remastered 353 HACK 114 Morph Morphix KNOPPIX file It is a lot smaller however 30 MB versus 700 MB and contains only the bare necessities for getting your live CD up and running A kernel kernel modules and hardware detection reside in the boot img and morphix files mainmod A mainmodule is essentially your filesystem after your live CD has booted up It contains everything from your command line tools to your window manager and graphical applications Typically most soft ware on a Morphix ISO is kept in the mainmodule Once base has done its work it attempts to find any files in the nainmod directory of your live CD If there are multiple files it prompts the user to select one of these mainmodules If there are none the user is dropped to a bash prompt The mainmodule that gets selected automatically or manually is then mounted The base module scripts link the necessary directories and copy the detected configuration files into the mounted mainmodule The system then chroots into the directory of the mounted mainmod ule Scripts in the morphix directory of this mainmodule are then exe cuted too For example in a normal Morphix ISO you can run startx and your favorite window manager pops up and you can do business as usual without even noticing th
364. istribu tions they are often found at etc rcrunlevel d tor example links to all runlevel 2 scripts are located in etc rc2 d If you look in one of these runlevel directories you should notice that many of the symlinks to scripts in etc init d have odd names that begin with an S K or D then a number and finally the name of the script The letter at the beginning of each filename tells init when to execute this script If the script begins with an S then init starts the script when it goes through the run level If the script begins with an K then init stops or kills the script when it changes to a different runlevel If the script begins with an D then that script is disabled for the time being and init ignores it Init runs the scripts in numerical order This is useful to ensure that dependent services start after the service they are dependent on When Linux boots and starts the init process it reads its configuration from etc inittab which configures each available runlevel the default runlevel to use as well as some other settings Next init loads any system scripts from a special system runlevel directory often at etc rcS d These scripts load dae mons and services that are vital to the boot process Lastly init runs any startup scripts for the default runlevel in alphabetical order You ll see that the startup filenames begin with numbers to make their sorting order clearer You can change the runlevel yourself o
365. its list of package repositories Then it checks its local cache of packages and if it does not have the package you need it downloads the package and any dependencies directly from the repository All of the configuration files for APT are located in the etc apt directory The etc apt sources list file contains a list of all the repositories the APT tool uses to look for packages The etc apt apt conf file contains APT settings such as which Debian branch to use by default The first step to convert Knoppix to Debian unstable is to edit etc apt apt conf as root changing APT Default Release testing to APT Default Release unstable This setting controls which branch Debian defaults to when installing and upgrading packages By changing testing to unstable you tell Debian to upgrade any packages from the testing or stable repositories it might have installed to unstable at the next upgrade and to default to installing from the unstable branch in the future The next step is to update the list of repositories APT uses by editing etc apt sources list as root The default Knoppix sources list file has sources for stable testing unstable experimental and a few other repositories Com ment out all of the stable and testing repositories which ensures that all our installs use the unstable packages It is up to you if you wish to leave some of the other unofficial repositories in your sources list For a pure Debian Sid syste
366. itten with whatever files are already in dev md1 so be sure you are ready before continuing RK Up until this point you can still revert back to the non RAID The final step is to hot add the final drive to the new RAID to make the array fully active mdadm add dev md1 dev hda1 See Also e The mdadm documentation usr share doc mdadm directory on your Knoppix disk e The mdadm manpage type man mdadm in a console i Add an Extra Drive to a Software RAID 5 Array 7 Add a fourth drive to a three drive software RAID 5 array without a backup and restore Migrate Software RAID 1 to RAID 5 Hack 78 explored a method of increasing the disk space in a RAID 1 array by adding a single drive and con verting the array to RAID 5 With the ever increasing storage needs in most businesses you may find yourself needing to expand a RAID 5 array as well You can replace all of the drives in the RAID with larger drives and copy all of the files over to the new larger RAID Of course for a three drive RAID 5 array this means buying three new drives to use A cheaper alternative is to back up the array create a new array using four drives and copy back the data This method requires the four drives for the array and a medium to back up to such as a hard drive large enough to hold the entire RAID or possibly tape But really backups and restores aren t as fun as watching a RAID 5 array grow in front of your very eyes C
367. itute for Security and Open Methodologies at http isecom org Open Source Security Testing Methodology Manual at http osstmm org Jascha Wanger Chapter 8 Knoppix Reloaded 289 HACK 100 HACK 101 Full Protection with S T D Full Protection with S T D i S T D is a Knoppix based distribution with a focus on security This disk includes many useful security tools from packet sniffers to password crackers to honeypots S T D short for Security Tools Distribution is the new name of the Knop pix STD project The name was changed when the new owner nickname fat name Mark Cumming took over in an effort to stop users that found us via Google from downloading S T D and confusing it with Knoppix proper The new project is in its infancy and while a lot of work is going on in the background the official launch has not yet happened at the time of this writing The next version will carry on the design fundamentals that the project founder nickname T1ck_TOck name Karl Sigler set in place focusing on real world usability for security professionals and enthusiasts rather than bells and whistles Why call it S T D you may ask We know there are other meanings of the acronym but information security tools tend to have questionable and weird names anyway When you get a bunch of geeks talking about probes penetration testing intrusion detection backdoors and so on it s no won der that these tools have suc
368. ix Remastered Change the Default Language on an ISO Image These disks have the latest and greatest Knoppix release and some special third party software that probably won t appear in the main release but there is one problem the disk defaults to German While you could certainly go through a full remastering process or follow the steps in Hack 118 in this case all you need is a hex editor to change the two characters that set the default language on the CD In this hack I will describe the quick steps you need to follow to do this The key to making this change is to use a hex editor to modify the ISO image The hexedit command line Linux utility is ideal for this and you probably already have it installed on your Linux system If you use Win dows or a Mac you will want to track down one of the numerous hex edit ing tools available for those platforms To use hexedit locate the ISO file on your filesystem and then pass it as an argument to hexedit hexedit home user Knoppix iso The interface to hexedit might seem a bit intimidating if you have never used it before but the changes we will make are pretty basic e First hit Tab to switch to ASCII mode e Hit Ctrl S and then type lang and press Enter This searches for the first instance of that phrase in the file In this case the first instance is from the documentation so hit Ctrl S again then Enter to find the sec ond instance e On the right hand side of
369. ix doesn t just mean changing which packages get installed and what programs run at boot You can also completely change what the default desktop environment looks and feels like So you have created your custom CDs with your custom applications and settings but when you boot and see the same desktop and themes that vanilla Knoppix comes with your distribution starts to seem a lot less cus 344 Chapter 9 Knoppix Remastered Personalize Knoppix tom It s like souping up the engine on your hot rod without giving it a new paint job With a tweak here and there you can give your distribution a spe cial look that makes it your own I have already covered how to customize the look and feel of your desktop in Hack 13 You might have noticed when you started remastering that the home directory in the chroot environment was empty This means that cus tomizing the look of your desktop isn t as simple as changing the files in the home knoppix directory and copying them to the chroot environment Quick Desktop Tweaks You can take advantage of a custom knoppix sh script like one created with persistent settings Hack 26 to shortcut many of these more disruptive tweaks and save yourself from the long process of creating a compressed KNOPPIX filesystem Start with the Make the Master CD Filesystem step from Hack 109 create the master directory and then copy all the files from the CD ROM includ ing the compressed K
370. k of an antenna it s harder to break its small form factor and its range advertised at 100 meters A cell phone I use the Nokia 3650 that has service with T Mobile in San Francisco The phone has the optional VPN Internet service for unlimited data It s an extra 20 a month and it allows for unmetered GPRS data This should work with other providers as long as they offer GPRS data Using GPRS data is useful for connecting to the Internet at low speed when there is no other reliable connection around In nearly all cases if you can make a cell phone call you can get online Be warned however GPRS data roaming is very expensive Configure the GPRS Connection First select K Menu gt Knoppix gt Network Internet gt GPRS connection Unless you have previously configured a modem you will be prompted to configure a device as a modem using the gprsconnect shell script You can also run the gprsconnect script from the command line to configure a modem Answer Yes at the prompt to move to the next window which dis plays the different types of modem connections you can choose from The connection type window see Figure 2 13 gives you the choice between Serial USB IRDA and Bluetooth connections Select Bluetooth After you select Bluetooth the script scans for any Bluetooth devices in range It is entirely normal for this step to take 10 to 40 seconds If the script quickly flashes by without a progress bar and it doesn t
371. k to another machine This requires the other machine to be running the partimaged server so you need either another machine running Linux with partimaged installed or you can use another Knoppix disk booted on that machine to run the server If you choose to run partimaged from Knoppix you must create a password for the root user because partimage prompts you for a username and password before connecting to partimaged On the remote server open a terminal and type sudo passwd to enter a new pass word for root Then you can run the partimaged server in interactive mode which lets you see connections as they are created along with their progress sudo partimaged Partimaged supports connections from multiple clients at the same time so you could potentially image multiple systems at the same time over the net work and save to a single file server After the server has been configured on the partimage client check Con nect to server and enter the IP address or hostname of the partimaged server in the next field Keep in mind that when you save to a remote server the path and filename you enter are the path and filename you have used on the server not on the local machine so make sure that path exists and you have enough room for the image When you hit F5 to continue partimage attempts to connect to the remote machine and prompts you for a user name and password If the partimaged server is running on Knoppix as well enter r
372. ks fine for most normal uses How ever if you want to boot from a machine without a CD ROM or if you want to have Knoppix running on 20 different machines all at the same time you might find it is easier to take advantage of the terminal server that is included with Knoppix With a terminal server started on a Knoppix CD any netboot capable machine can boot over the network from that original Knoppix machine get the same desktop environment and run the same applications as if it booted directly from the CD ROM As mentioned in detail in Hack 103 a netboot capable machine is a machine that supports either Pre boot eXecution Envi ronment PXE or etherboot and can download bootstrapping code over the network from a properly configured server Almost every new computer has support for PXE To see if your machine supports PXE look for Booting from NIC or PXE in the BIOS On many modern computers you can hit F12 at boot time to see a list of booting options and if PXE is supported you should see a reference to booting from the network card If you don t have a PXE capable network card read Etherboot in Hack 103 for instructions on downloading a floppy image to enable etherboot for your network card That s pretty much all you have to do for the clients Most of the work for this hack occurs on the server To start boot the machine that will be acting as the terminal server from the Knoppix CD If Knoppix has auto
373. kup and restore Software RAID can ensure failover protection even on a low budget If you want to migrate a system to software RAID you might be faced with the prospect of doing a complete backup and restore If you have a low budget you might not have a spare drive to temporarily back up your data With a Knoppix disk and the following instructions you can migrate a system to RAID 1 or 5 with just the disks you are planning to use for the RAID RAID 1 and 5 provide failover so you can run a system and access files even if a drive in the array has failed You can leverage failover in RAID 1 and 5 to migrate a partition that is not yet software RAID to RAID 1 or 5 if you cre ate the RAID as if it had a failed drive the current root partition copy all of the data over to the newly created RAID boot onto that RAID and then add the root partition to the RAID is important to note that you need your boot partition to still be either with no RAID or with RAID1 Otherwise your boot loader will be unable to boot your system If you don t already have a separate boot partition be sure to create a small 100 Mb should be fine partition at the beginning of each new disk copy all of boot there and re run the grub install pointing at that new partition F4 When migrating to a RAID5 array for your root partition it mdadm For your migration to work correctly you must already have mdadm installed on your system along with support i
374. l the uncommented services are started Comment out the services you don t want to run Even if you aren t sure by default Knoppix allows only local connections to any of these services so you are safe leaving them uncom mented This example shows you how to get FTP running with inetd Start inetd by typing the following command sudo etc init d inetd start Now inetd listens on all of the ports configured in inetd conf for connec tions Once a connection is made inetd starts the corresponding service At this point if you attempt to connect to FTP on this server from another machine on the network the connection is refused One reason your attempt fails is because Knoppix disables anonymous FTP by default A sec ond reason might be because you haven t yet created a password for your knoppix user Use passwd knoppix in a terminal window The third likely reason is that Knoppix uses etc hosts deny and etc hosts allow to control remote connection to inetd services The default Knoppix hosts deny file excludes everyone but the rules in hosts allow take precedence over the rules in hosts deny Therefore the simplest way to open up your system is to edit etc hosts allow to allow remote connections In your etc hosts allow file you see something like the following ALL 127 0 0 1 LOCAL ALLOW ALL ALL ALL DENY Each line of the file consists of three fields separated by colons The first field designates which service t
375. lancing efficiency overall load overall used memory all memory oll Cpu ai nodes f CA f GA z 11 mol 2 5o 392 160 1 250_ fy eee yl Tee m 3 i 357 1921681101 J 8009 o g ar Ready Basama RSS Figure 8 3 Quantian managing a cluster See Also e Distribute the Load with ClusterKnoppix Hack 103 Dirk Eddelbuettel 324 Chapter 8 Knoppix Reloaded HACK Find GIS Knoppix on the Map 105 T7 Find GIS Knoppix on the Map i 105 Cartographers of the world unite Use GIS Knoppix to view edit and create maps using free GIS software GIS Knoppix http www sourcepole com sources software gis knoppix from Sourcepole is a Knoppix derivative with a focus on Geographic Infor mation Systems GIS On the surface GIS Knoppix looks and acts like a regular Knoppix disk with many of the same utilities but GIS Knoppix includes loads of free GIS software such as the following GRASS A raster vector GIS image processing system and graphics production system GRASS was originally developed by the U S Army Construc tion Engineering Research Laboratories a branch of the U S Army Corps of Engineers for military use but has since branched out and is also used academically and commercially MapServer An open source development environment for creating web based GIS applications MapLab A suite of web based Java tools that let you view create and edit MapS erver files MapDesk Anot
376. lar to the saveconfig script When run it presents you with a list of detected drives on which to create the persistent image One main difference from the saveconfig script is that after you choose your drive if Knoppix detects a previous persistent image on the drive you have the potentially dangerous option to delete or format the old image Knoppix also prompts you with the option to encrypt this new loopback file image with AES256 encryption if you want extra security just don t forget the password you choose or you won t be able to recover this Chapter 3 Tweak Your Desktop 77 HACK 26 HACK 26 Create Persistent Knoppix Settings file A loopback file is an entire filesystem contained within a single file like a CD image Loopback files can be formatted and mounted just as though they were full filesystems You must also choose a size for the loopback file The size of your loopback file depends greatly on how many extra files you plan to store See how much space you are currently using for your home directory by typing the following command knoppix ttypo knoppix sudo du sh ramdisk 5 3M ramdisk Keep in mind that this loopback file does not grow even if there is more free space on the drive Therefore choose a file size based on how much space you think you will need in the future not just how much you need now Otherwise when you need more space you will have to create a brand new persistent home direct
377. le that was used previously as well as the original version of lilo Knoppix comes with a version of lilo itself however it s best to use the same version of lilo that is installed on your system The first step to restore lilo to your MBR is to find your root partition Open the different partitions you see on your desktop until you find one that contains an etc directory with your lilo conf as well as an sbin directory that contains lilo For these examples the root Linux partition is dev hda1 you need to add an old kernel or change the default root par tition then now is the time to mount the partition read write and edit the file KR If you need to make changes to your lilo conf for instance if To properly run your installation s version of lilo you must make lilo think that mnt hdal or whatever your root partition is is actually You can do this with a chroot environment By default Knoppix mounts these parti tions without the dev option which means that none of the character or block special devices on the filesystem are interpreted Lilo needs this option to work correctly so if the filesystem is not yet mounted mount it with knoppix tty1 knoppix sudo mount o dev mnt hda1 If the filesystem is already mounted then remount it with knoppix tty1 knoppix sudo mount o remount dev mnt hda1 Once the filesystem is mounted restore lilo with the following command knoppix tty1 hda1 sudo chroot mn
378. le this script rename it by changing the S to a D knoppix ttyo rc2 d sudo mv S99gdm D99gdm 242 Chapter 6 Repair Linux HACK Repair Debian Packages 83 Of course change the name of the script to xdm or kdm if you are disabling those services After renaming the file you should be able to reboot without the desktop manager starting which gives you an opportunity to debug your X configuration Another scenario that might prevent you from booting is a stalled service that does not time out Init runs each script in sequence so if a script does not exit any scripts after it do not run I ve had cases where an init script mounting networked filesystems stalled out and sat there for minutes with out exiting and I had to boot with a rescue disk to disable the service In this case the script was not part of my runlevel but was instead a system script so I had to go to etc rcS d to find and disable it Avoid making changes to scripts in rcS d unless you know what you are doing these scripts are considered by the system to be important if not essential for booting Once you have disabled a service and booted the system track down the cause of the problem Remember that you can run a startup script after booting by running it from the command line with the start option This allows you to test a broken script while still having it disabled should you need to reboot er Repair Debian Packages ffe 4 Knoppix is not only ba
379. leuthkit org The Sleuthkit is a powerful set of forensics tools and performs many of the same functions of TCT with respect to command line analysis of drives and drive images Sleuthkit and TCT are not generally an either or proposition and can be used together to automate forensics data gathering Sleuthkit also provides a 176 Chapter 5 Put Knoppix in Your Toolbox Collect Forensics Data powerful web front end called Autopsy that not only makes it easier to use the Sleuthkit it also makes it easy to organize multiple forensics cases and multiple systems for each case Sleuthkit and Autopsy work very well for organizing numerous forensics cases and performing analysis on sets of drives or images especially when you have plenty of time with a system or drive image However in some cases you just want to collect information about a system quickly and you may not have hours with the system or a copy of the drive image to do your analysis This circumstance is where the Coroner s Toolkit on a Knop pix disk can be very useful With it you can quickly scan a system and col lect valuable forensics data on removable storage that you can take with you and analyze later Since this hack will focus on how to collect forensics data for later analysis I will cover how to use the Coroner s Toolkit KR If you intend on collecting data stored on a swap drive boot Knoppix with the noswap cheat code otherwise Knoppix automatically mounts
380. level of support the Linux kernel has for the framebuffer mode of your particular video card hardware Help My Mouse Is Crazy You can also configure mouse settings with cheat codes If the mouse is moving wildly around the screen or moving down to the bottom left corner no matter where you try to point it Knoppix might be trying the wrong pro tocol for the mouse The nowheelmouse cheat code forces X to use the generic PS 2 protocol for the mouse Alternatively if it s your wheel mouse that isn t being detected the wheelmouse cheat code forces the IMPS 2 protocol which provides support for the scrollwheel to be used Console Cheats Just as you can tell Knoppix to run X directly through the framebuffer with the xmodule fbdev cheat code you can tell the Linux console to run through the framebuffer by passing fb along with the resolution you want to use The fb cheat code is a bit different from most of the cheat codes in that it actu ally is specifying a special set of predefined kernel parameters to run the con sole at a specific resolution To boot Knoppix into a 1280 by 1024 framebuffer console type fb1280x1024 not knoppix b1280x1024 The fb parameters change the vga setting for the kernel and set xmodule fbdev so if there is a different resolution you want to use you can look up the correct vga line to use in usr src linux Documentation fb vesafb txt Knoppix defaults to using a high resolution console framebuffer
381. lilo or grub config on your original root device but once you add this drive to the array it will be overwritten with whatever files are already in dev mdo so be sure you are ready before continuing RK Up until this point you can still revert back to the non RAID The final step is to hot add the original drive to the new RAID to make the array fully active The command is the same whether you are using RAID1 or RAIDS mdadm add dev mdo dev hda2 RAID1 conf printout 232 Chapter 6 Repair Linux Migrate Software RAID 1 to RAID 5 wd 1 rd 2 diskO wo 0 0 1 dev hdb2 disk1 wo 1 0 1 dev hda2 mdadm added dev hda2 Run the following command to monitor the RAID as it updates dev hdal with all of the mirroring information watch cat proc mdstat See Also e The mdadm documentation usr share doc mdadm directory on your Knoppix disk The mdadm manpage type man mdadm in a console Migrate Software RAID 1 to RAID 5 78 Move an existing software RAID 1 system to RAID 5 without a backup and restore After you use a RAID 1 array for some time you might find that you need to increase the space on the array Because of the way the RAID 1 array works a two disk array is expanded by buying two new larger hard drives At this point you might consider migrating over to RAID 5 because you can dou ble your storage space by adding a single drive A RAID 1 array with two 100 GB drives has only 100 GB of st
382. ll modern sniffers handle this for you and it happens magically in the background When you plug your NIC into a network there is invariably a hub or a switch at the other end of the cable If you are connected to a hub then sniffing is trivial as the hub s job is to pass all traffic to all ports This means that your NIC can see all the traffic that passes through that hub A switch by contrast is far more efficient and passes traffic only for the intended hosts It is easy to see if you are connected to a switch or hub just by doing a cur sory analysis of the traffic you can see If all the traffic is addressed to you or a group you are part of as a broadcast or multicast then you are con nected to a switch If you can see traffic obviously not intended for you then you are connected to a hub 304 Chapter 8 Knoppix Reloaded Full Protection with S T D Even on a switched network there are ways to sniff By manipulating ARP packets you can trick the switch into sending traffic intended for someone else to your NIC If you then copy these messages and send them to the intended end recipient you have managed to pull off a MITM Man In The Middle attack and the target will be none the wiser MITM test If you are trying to MITM a target GigE server and your laptop is a Pentium Pro 200 with a 10baseT HALF DUPLEX Ethernet link you re going to kill your network RK Make sure your testing box is up to the task of d
383. ll wheel on a scroll mouse or hold both the right and left mouse buttons this is known as chording and it simulates a middle mouse button click at the same time drag the image onto the desktop and choose Set as Wallpaper from the list of options that appears when you drop If there are a series of images you would like to cycle through select Slide show and click Setup In this window you can select a series of pictures to use in the slide show and determine how often to cycle through them If you want to use a simple color for your background select No picture and choose the desired color from the options below You can choose from a series of gradient pattern and color options which can create very unique backgrounds After you have set up your background click Apply to com mit your changes If you don t like the changes you ve made and want to go back to the previous setup click Reset You can change the color scheme to further customize the look of your desktop Pick a scheme that blends well with your wallpaper or one that is just more pleasing to your eyes To the left click the Colors option in the listing to open the color configuration widget There is a series of color schemes that have already been created for you and each scheme changes how buttons highlighted text and fonts are colored Above the selections is a preview window that lets you see how the color changes will look when you apply them If
384. ly add the final drive once all the files have been copied Sound scary Well it can be so make sure that you already have tape back ups of important data just in case Remember RAID safeguards against a drive failure it is not a substitute for backups When migrating to a RAIDS array for your root partition it is important to note that you need your boot partition to still be either with no RAID or with RAID1 If you don t already have a separate boot partition be sure to create a small 100 Mb should be fine partition at the beginning of each new disk copy all of boot there and re run the grub install pointing at that new partition before you proceed mdadm The first step in this process is to assemble your current RAID1 array with one of the drives in this example dev hdb1 removed so it can be used for the new RAIDS array sudo modprobe md sudo mdadm assemble auto yes dev mdO dev hda1 Now you are ready to create the degraded RAIDS array This command is very similar to the command used to create a normal RAIDS array as dis cussed in Hack 76 but since one of the disks in the array was previously in the other array you will have to force this array to proceed when prompted sudo mdadm create auto yes level 5 raid devices 3 dev md1 dev hdb1 dev hdc1 You can now format dev md1 the RAID 5 array and mount it without the risk of overwriting anything from dev md0O the RAID 1 array Then you c
385. ly compresses it It takes approximately 15 minutes on my 3Ghz sys tem for the CD and 60 minutes for the DVD You can ignore the warning it outputs about creating a filesystem that does not conform to ISO 9660 There are a lot of options used to create the filesystem and if you are inter ested in the ISO 9660 spec then you can reference each of those arguments and which filesystem options they enable by reading the mkisofs manpage type man mkisofs If you want to customize the filesystem the main two options that might interest you are V which specifies the volume ID to use for the filesystem and P which labels the publisher of the CD ROM If you are remastering the DVD and did not change the KNOPPIX2 filesys tem then just copy that file from the cdrom directory to the master directory root ttyp1 hda1 cp cdrom KNOPPIX KNOPPIX2 master KNOPPIX If you did change the KNOPPIX2 filesystem then you will need to also cre ate that compressed filesystem to incorporate your changes root ttyp1 hda1 mkisofs R U V Knoppix Hacks filesystem 2 publisher Knoppix Hacks hide rr moved cache inodes no bak pad source KNOPPIX nice 5 usr bin create_compressed_fs m B 131072 master KNOPPIX KNOPPIX2 Chapter 9 Knoppix Remastered 339 HACK 109 HACK 109 Create a Customized Knoppix KNOPPIX and KNOPPIX KNOPPIX2 files are less than 2 GB or the DVD filesystem won t be able to use them F4 For DVD remastering b
386. ly resized You might want to reboot your machine to make sure that the changes to the partition table have been applied universally r er 2 x wv A isi partition 3 x Minimum Size 2632 MB Free Space Before fo 00 MB New Size 3628 15 MB Free Space After fieait MB x It is recommended to backup your data before do this operation Figure 6 1 QTParted resize window Resize Without X QTParted is an easy and useful program but what if you don t have access to X Parted is the command line backend for QTParted Start parted from a terminal by running knoppix ttypo knoppix sudo parted dev hda GNU Parted 1 6 9 Using dev hda Information The operating system thinks the geometry on dev hda is 4865 255 63 Therefore cylinder 1024 ends at 8032 499M parted 210 Chapter 6 Repair Linux HACK Repair Damaged Filesystems 70 Replace dev hda with the drive containing partitions you wish to resize To see a full list of parted commands and their syntax type parted help If you want help on a specific command type parted help command To list your drive s partition table type parted print Disk geometry for dev hda 0 000 38166 679 megabytes Disk label type msdos Minor Start End Type Filesystem Flags 1 0 031 38162 219 primary fat32 boot lba parted The partition table that parted outputs shows you the minor number the start the end th
387. m and not Knoppix knoppix ttypo knoppix sudo chroot mnt hda1 passwd Enter new UNIX password Chapter 6 Repair Linux 239 HACK 82 i Fix Broken Init Services Retype new UNIX password passwd password updated successfully knoppix ttypo knoppix To change the password for a user instead of root invoke the same com mand but add the name of the user to the end knoppix ttypo knoppix sudo chroot mnt hda1 passwd username Enter new UNIX password Retype new UNIX password passwd password updated successfully knoppix ttypo knoppix With the password set to a new value reboot and get back into your system jer Fix Broken Init Services 82 Errors in init scripts may prevent a system from completely booting Use Knoppix to disable the troublesome scripts Before you log in to a Linux system a number of programs are automati cally run to start various daemons and load services that the system needs If your system uses a graphical login then that program is also started at boot If one of these programs stalls then you might not be able to completely boot to fix it Depending on the service it might be tricky to even bypass it using single user mode Knoppix can mount all major Linux filesystems so it is a great rescue disk to use to temporarily disable a broken startup service so you can boot the system This hack covers a few different scenarios that might stop a system from booting and how to use Kno
388. m mand formats that file with the swap filesystem Finally the swapon com mand starts using the file for swap If you have space to spare it may not hurt to bump up your available RAM to 3 GB instead of 2 5 GB This will help you in the case that your compressed filesystem ends up being larger than 2 GB when you remaster Prepare the Source Filesystem To remaster the Knoppix CD you must copy the complete filesystem to the disk so that you can edit it To keep things organized create a source direc tory and under that create a KNOPPIX directory Then copy all the files on the Knoppix filesystem to the KNOPPIX directory Make sure you are in the root of your mounted partition and then run the following commands root ttyp1 hda1 mkdir p source KNOPPIX root ttyp1 hda1 cp a KNOPPIX source KNOPPIX The cp command takes some time as it s copying either 2 GB CD or 6 GB DVD of files from a compressed filesystem on your disk to the hard drive on my system it took about 10 minutes for the CD and about 13 minutes for the DVD on my SCSI system Once the filesystem is copied over the source KNOPPIX directory looks like the root filesystem of a Debian Linux install root ttyp1 hda1 ls source KNOPPIX bin cdrom etc home lib none proc sbin tmp var boot dev floppy initrd mnt opt root sys usr vmlinuz KNOPPIX vs KNOPPIX2 files On the Knoppix DVD you may notice that there are actually two compressed filesystems called KNOPPIX
389. m delete all of the lines in your sources list file and edit it to look like this Unstable deb http ftp us debian org debian unstable main contrib non free Unstable Sources deb src http ftp us debian org debian unstable main contrib non free Once you have edited your sources list update your system to unstable by running the following command as root root ttypo knoppix apt get update amp amp apt get dist upgrade Chapter 4 Install Linux with Knoppix 123 HACK 43 HACK 44 Install Gentoo with Knoppix This command downloads the latest list of packages from each source in your sources list file and then it upgrades the distribution to the very latest versions of each package This ensures that old packages from stable or test ing are replaced with packages from unstable As the packages install you might be prompted that a configuration file for a package has been modified since installation Chances are that Knoppix modified these configuration files to better suit your system so it s safe to go with the default and keep the current version of the configuration file Once this update has completed your system should be up to date with the cur rent Debian unstable As a final note some packages on the Knoppix system come from other unofficial or experimental repositories so there still might be a few pack ages on the system that can t be updated in this manner Packages from the experimental rep
390. m administrators to back up important files and this hack covers using tar to back up and restore a system Generally you want to run tar directly from the machine you are backing up as opposed to using a rescue CD so that you don t have to take down the server each time you need to refresh the backup Although sometimes you might be in a situation where you want a complete backup of a system that has many files in a constant state of flux you don t want any of the files to change while you are backing them up You also usually run tar to restore lost files from the running machine itself but in the situation that the miss ing files are preventing the machine from booting at all you might need to make use of a rescue disk like Knoppix to restore the important files to the system so it can boot Back Up Tar has many options but the basics of creating a backup are pretty simple to remember First you should back up the etc directory On most Linux systems etc stores only text files which compress to a very small size If you have worked hard to configure a program and you delete or break that con figuration it can be upsetting and time consuming to replace To back up the etc directory from a root partition that you have mounted on mnt hda1 you should change to the mnt hda1 directory and issue the following com mand knoppix tty1 hda1 sudo tar cvzf home knoppix etc tar gz etc Tar will create a new backup file etc tar
391. m within the KDE Control Center To start this pro gram click K Menu gt Control Center The KDE Control Center presents a listing of different configuration categories that let you change many differ ent settings on the desktop For our purposes let s stick to the first cate gory Appearance and Themes Click on that category to expand the listing and display all of the different choices for changing the appearance There are a number of different settings you can change Background Change the wallpaper that appears on the desktop You can choose many different images look under usr share wallpapers pick a num ber of color gradients or even configure a slide show Colors Customize the color scheme for all of the buttons menus and text Fonts Pick your favorite fonts to be used in the toolbar the desktop menus and so on Icons Knoppix includes only a single icon theme but you can download new icon themes from sites such as http www kdelook org Launch Feedback Control what KDE does when you launch applications If that bouncy cursor is driving you nuts disable it here Screen Saver Enable and change the settings for the screen saver Unfortunately Knoppix does not include many screensavers by default Splash Screen Choose from a list of graphical splash screens that show you the progress when KDE starts Style Configure widget styles If you don t like the rounded three dimen sional buttons that K
392. matically configured the network card from a DHCP server on the network you do not need to configure the net work card for the server any further However a requirement of this termi nal server setup is that Knoppix run its own DHCP server Because of this you must turn off the existing DHCP Failure to do so will cause problems when the clients attempt to boot from the network as there will be no guar antee they will use the Knoppix DHCP server instead of the regular one 94 Chapter 3 Tweak Your Desktop Network Boot Knoppix most RAM and fastest CD drive and network connection The clients use their own processor and RAM but rely on the terminal server for all of the Knoppix files Because Linux is an efficient multiuser OS you can easily support a dozen or more terminals from a single well configured workstation or server KR Ideally your terminal server should be the machine with the If there is no DHCP server on the network click K Menu gt KNOPPIX gt Network Internet gt Network card configuration to configure your network card Just add your IP address and netmask and you re done Knoppix provides a Terminal Server Wizard that assists you in getting termi nal services running Several programs work together to provide the actual terminal services DHCP is used to configure the network connection and provide kernel images for clients using TFTP files are shared using NFS Click K Menu gt KNOPPIX gt Service
393. media and allows you to save changes you have made Combine these persistent settings with a small USB key drive and your settings and files can follow you to any computer with a CD ROM drive and a USB port 27 When you boot Knoppix on top of an existing Linux desktop it is relatively easy for Knoppix to use files and settings on the system underneath i Me Use Your Linux Desktop Settings If you ve been a Linux user for some time and have your desktop applica tion settings just right you might be annoyed that the changes that you ve Chapter 3 Tweak Your Desktop 79 HACK 27 Use Your Linux Desktop Settings already configured once that is your bookmarks and email settings must be redone under Knoppix Trying to remember and recreate all your origi nal tweaks and other settings can be a long boring and maybe impossible task as anyone who has lost their home directory can attest to However if you boot Knoppix on top of your existing Linux desktop you can easily import your application settings for use under Knoppix This hack covers how to copy settings from commonly used applications under Knoppix when you are booting on top of your normal Linux desktop There s No Place Like home The first step in exporting your desktop settings is to find your home direc tory Although the details vary depending on how your hard drive is parti tioned Linux installations generally have home as a directory under the root
394. mnt hdb1 knoppix ttypo knoppix sudo dd_rhelp dev hda1 mnt hdb1 hda1_rescue img launched via dd_rhelp at ok 0 gt gt gt dd rescue info ipos 1048444 0k opos 1048444 0k xferd 1048444 0k errs 0 errxfer 0 0k succxfer 1048444 0k curr rate 8339kB s avg rate 7564kB s avg load 7 9 dd_rescue warning dev hda1 1048444 0k Input output error dd rescue info ipos 1048444 5k opos 1048444 5k xferd 1048444 5k errs 1 errxfer 0 5k succxfer 1048444 0k curr rate 812kB s avg rate 7564kB s avg load 7 9 dd_rescue warning dev hda1 1048444 5k Input output error dd rescue info ipos 1048445 0k opos 1048445 0k xferd 1048445 0k errs 2 errxfer 1 0k succxfer 1048444 0k curr rate 1057kB s avg rate 7564kB s avg load 7 9 dd_rescue warning dev hda1 1048445 0k Input output error dd rescue info ipos 1048445 5k opos 1048445 5k xferd 1048445 5k errs 3 errxfer 1 5k succxfer 1048444 0k curr rate 994kB s avg rate 7564kB s avg load 7 9 dd_rescue warning dev hda1 1048445 5k Input output error dd rescue info dev hda1 1048446 0k EOF Summary for dev hda1 gt mnt hdb1 hda1_rescue img dd_rescue info ipos 1048446 0k opos 1048446 0k xferd 1048446 0k errs 4 errxfer 2 0k succxfer 1048444 0k curr rate 1042kB s avg rate 7564kB s avg load 7 9 knoppix ttypo knoppix Replace dev hda1 with the partition th
395. modifying 35 OCR 47 tdesktop 131 Run Command 105 Synaptic package manager 108 WINNT directory 255 wiping hard drives 184 185 wireless cards wardriving 159 wireless tools 311 wizards Desktop Sharing 133 NX Connection 132 133 Setup 138 Word Microsoft 39 see also OpenOffice org word processing Damn Small Linux 283 Freeduc 280 WORKGROUP workgroup 147 Writer OpenOffice org 39 X X partitions resizing without 210 settings cheat codes 16 18 copying 192 xawtv 55 Xbattle 50 XBoard 50 XChat 64 Xchat copying settings 82 XFCE 68 xfs_check tool 213 xfs_repair tool 213 xhrefresh cheat code 17 Xine settings copying 82 xine 54 XMMS copying settings 82 xmodule cheat code 17 21 xmodule fbdev cheat code 18 Xorg servers configuring video cards 17 Xscanimage 47 xvncviewer 130 xvrefresh cheat code 17 Index 391 Colophon The tool on the cover of Knoppix Hacks Second Edition is a pocket knife Since prehistoric times knives have been used for hunting eating and defense Frontiersmen explorers travelers and soldiers all found ways of making their knives portable Some knives were placed in sheaths and attached to belts or they were slipped into stockings Knives that were designed to fold into the handle were carried in pockets These folding or pocket knives were first made in the first century by the Romans for use in exploration and conquest By the sixteent
396. n Start installation Start the installation Partition Partition the hard disk Load config Load an existing configuration Save config Save the configuration Quit Quit the program ox x quit Figure 4 1 Knoppix installer main menu The main menu presents you with six options Configure Installation Opens a new window that asks you which style of Knoppix install to use and where to install it Start installation Starts the installation process based on whichever configuration is cur rently loaded If no configuration is loaded it walks you through the configuration just as though you had selected Configure Installation Partition Starts gtparted in X or cfdisk in a console so you can partition your hard drive and presents you with the option to partition the hard disk resize drives etc without having to exit the installer Load config Loads a configuration you have created beforehand from the home directory floppies USB drives or any mountable storage device this can be useful if you want to clone installations across multiple machines Chapter 4 Install Linux with Knoppix 115 HACK 40 HACK 40 Explore the Knoppix Installer Save config Saves the installation settings currently loaded either from selecting Configure Installation or Load config to a file on the home directory or any mountable storage device so you can load it later Quit Exits the program without saving an
397. n safely power off your Knoppix host If you can t wait then type this sudo postqueue f This will make postfix flood the primary mail server with the queued mes sages as fast as it can deliver them instead of trying to throttle messages so as not to overload the system It is easy to set up Knoppix as a DHCP DNS or MySQL server This ability could prove useful in an emergency 53 Run Other Emergency Services There are a number of other services that Knoppix includes that require only a couple of steps to get running Most of the principles behind starting these services are the same copy over a configuration and start the service How ever some of these services require a few more steps to get fully functional Most of the services log to var log syslog which Knoppix disables by default To start the syslog service click K Menu gt KNOPPIX gt Services gt Start SYSLOG which launches a terminal that displays live output of var log syslog SSH If you want to use Knoppix as a server for anything you certainly want to be able to administer it remotely Every administrator s favorite remote shell is openssh and Knoppix includes it It is incredibly simple to start the SSH ser vice on Knoppix Just click K Menu gt KNOPPIX gt Services gt Start SSH Server If you have not yet created a password for the knoppix user the script prompts you to enter a new password so you can log in remotely Alternatively r
398. n a normal dance pad If you only want to include pydance and not the following game skip ahead to the Make It Persistent section Keyboards on Fire Now that pydance is installed the next step is to install Frets on Fire Frets on Fire http fretsonfire sf net is an open source Guitar Hero clone written Chapter 3 Tweak Your Desktop 91 HACK 30 HACK 30 Make a Party Arcade in Python Unlike with Guitar Hero however you don t need any special peripherals to play your keyboard will do just fine Frets on Fire maps the F1 F5 keys as frets one through five respectively and uses the Enter key to pick so just pull the keyboard off the desk and flip it upside down and you have your guitar Unfortunately Frets on Fire is not yet packaged for Debian or Knoppix but it is still easy enough to install Go to http fretsonfire sf net in your web browser and click the download link for the latest release for Linux The downloaded tarball will be a bit above 30 Mb so it might take some time to download Once it has finished downloading extract the tarball in your home directory cd home knoppix tar xzvf FretsOnFire 1 2 451 linux tar gz It will dump all the files in home knoppix FretsOnFire To play the game change to that directory and then run the FretsOnFire executable cd FretsOnFire FretsOnFire If you get an OpenGL error when you start the program chances are you forgot to boot the Knoppix
399. n and mount it and then perform any backups or repairs that are necessary sudo mkdir mnt mdo sudo mount dev mdo mnt mdo YI Create Linux Software RAID Fas Use Knoppix to create and reconfigure software RAID 0 1 and 5 A rescue disk is very handy to configure and change a software RAID partic ularly if the RAID is for a complete root partition Knoppix comes with the major tools you need to create and modify Linux software RAID and makes it very simple to create new software RAID drives Linux software RAID supports many different styles of RAID and this hack covers the three most popular configurations RAID 0 RAID 1 and RAID 5 This hack assumes a basic familiarity with RAID principles and a working knowledge of the dif ferences between RAID 0 1 and 5 Mdadm For quite a long time the way you created a Linux software RAID was to create an etc raidtab configuration file and then run a few commands against it to start a RAID Nowadays this method has been deprecated in favor of the mdadm tool This tool allows you to create modify start and perform all of the rest of your RAID operations from a single program The exact commands you run differ slightly depending on the type of RAID you are creating so I will split up the commands according to type Before you create any RAID first you need to make sure the md module the Linux kernel uses is loaded so open a terminal and type sudo modprobe md RAID 0 RAID 0
400. n automatically rw r r 1 root root 166 Jan 3 19 31 KNOPPIX etc network interfaces IW r Y 1 root root 232 Apr 15 12 08 etc network interfaces IW r rY 1 root root 232 Apr 15 12 08 ramdisk etc network interfaces How You Can Use Aufs Once you realize that you can write basically anywhere on the live Knoppix disk you can treat it almost as though it were a hard drive I say almost because there are a few caveats e You are limited by the size of your ramdisk If you don t have much RAM you will need to budget how many changes you make to the file system e If you use a persistent disk image see Hack 26 and tell it to make the system persistent you will be limited by its storage e The directory itself is very limited in size and if you look at the files init they are mostly symlinks to directories within the UNIONFS filesystem e Unlike with a hard drive any changes you make to the system will still be erased after you shut off the system unless you set up a persistent disk image That having been said Aufs opens up a range of possibilities Knoppix never previously had For instance if Knoppix does not come with software you need you can use standard Debian package management tools like apt get and synaptic to install whatever you want and if you have a persistent disk image this extra software will stay installed No need to remaster Knoppix just to add a few packages This also means that you don
401. n no programs depend on a library any more it has no further use Many regular programs that you might use don t have any other packages depending on them yet you generally don t want to remove them On a default Knoppix install deborphan returns no pack ages because Klaus already beat you to removing the orphans If you have maintained a remastered CD for some time however you might find that libraries are orphaned from time to time as packages upgrade and leave behind old libraries they no longer need If you want to just quickly remove all orphans from your system run the fol lowing command root ttypo deborphan xargs apt get y purge remove Remove the y option from apt get if you want to be prompted before fol lowing through with the command Shrink the apt get Database Another method to reduce the space on the disk is to shrink the apt get data base to list only the installed packages for i in var lib apt lists _ Release Packages Sources do gt i touch t 198103190000 00 i done apt get check dpkg clear avail rm f var cache apt bin Chapter 9 Knoppix Remastered 343 HACK 110 HACK 111 Personalize Knoppix apt cache gencaches sync available Use the Best Possible Compression When you create the compressed Knoppix filesystem with root ttyp1 hda1 mkisofs R U V Knoppix Hacks filesystem publisher Knoppix Hacks hide rr moved cache inodes no bak pad
402. n quickly select your server from the drop down menu Krdc also saves session infor mation and you only have to enter settings such as the resolution for the remote connection and the connection rate once 130 Chapter 5 Put Knoppix in Your Toolbox Run Remote Desktops RDP Knoppix also comes with tools to connect to servers accepting RDP connec tions RDP is a protocol used by Microsoft for its Terminal Services soft ware to allow mouse keyboard and even sound channels to be accessed remotely The functionality to make at least a single RDP connection to a machine exists out of the box in Windows XP Professional Windows Server 2000 and 2003 and NT Server 4 0 Terminal Server Edition For instance to enable RDP connections on a Windows XP Professional machine click on System under the Control Panel and check Allow users to connect remotely to this computer under the Remote tab The primary client for RDP connections under Linux is the command line program rdesktop Like xvncviewer rdesktop has a number of command line arguments to tweak settings such as color depth and desktop geometry and even forward sound to your local machine To reference all of these set tings run man rdesktop or visit the official site at http www rdesktop org but for most usage simply type this command in a terminal knoppix ttypo knoppix rdesktop servername If the remote computer accepts RDP connections you are presented with a sta
403. n the CD The main reason behind this is the fact that the Knoppix DVD includes the full Linux kernel source tree under usr src The Nvidia installer will need to compile its driver against this kernel source but because of space constraints the CD does not include this source tree This means you will have to add it to the ramdisk after boot So if you are using the DVD skip ahead to the section titled Get the Nvidia Installer There are a few different ways to add the kernel source tree to the Knoppix CD but first it s important to note that you will need a substantial amount of ramdisk to pull this off I would recommend at least 512 Mb for your ramdisk partition which means you ll need 768 Mb of RAM or greater If you also have the DVD The simplest way to get the kernel source tree for the CD is to copy it from the DVD To do this just boot the DVD and then cre ate a tarball of the kernel source tree sudo tar exclude drivers cvzf linux 2 6 19 1 tar gz usy src linux 2 6 19 1 I have excluded the drivers directory from this tarball because it takes up a lot of extra space that the Nvidia installer won t need Now copy the tarball you have created to a USB key or transfer it over the network to another machine Then boot into the CD copy the tarball to your home directory and then type knoppix Knoppix cd knoppix Knoppix tar xvzf home knoppix linux 2 6 19 1 tar gz Replace the above path with the
404. n the command line with the init command To switch to single user mode from the command line type knoppix ttypo knoppix sudo init 1 This command runs all of the shutdown scripts for your current runlevel and then any startup scripts for single user mode You can also start and Chapter 6 Repair Linux 241 HACK 82 HACK 82 Fix Broken Init Services stop scripts manually by running the script with the start or stop argu ment For example to start samba from the command line run knoppix ttypo knoppix sudo etc init d samba start Disable Broken Init Scripts Now that you understand the basics of how services are started in Linux it s time to learn how to disable a problem script To disable a script you must know your default runlevel On Knoppix and Debian systems the default runlevel is 2 but this varies across distributions for example Red Hat defaults to runlevel 5 All runlevels are defined in etc inittab To read this file mount your root partition for this example mnt hda1 and run knoppix ttyo knoppix grep initdefault mnt hda1 etc inittab id 2 initdefault Once you know your runlevel you can disable the correct scripts In gen eral to disable a script change to the directory for that runlevel identify the script name starting with an S and then rename the file by changing the S to aD One common scenario that might prevent you from booting is a broken X configuration Most Linux distrib
405. n the system itself if you can and use Knoppix to repair those packages that are preventing you from booting or any other packages you can t fix within the system itself Chapter 6 Repair Linux 245 HACK 85 Copy a Working Kernel 7 Copy a Working Kernel 85 Use Knoppix to restore a working kernel to a system that has had its kernel either deleted or overwritten By default most Linux distributions include only a single kernel These ker nels are generally very modular which is fine because it makes boot loader configuration simple you have to configure only a single kernel Unfortu nately if that kernel somehow gets deleted or corrupted you have no way of booting because it is the only kernel on the system However you can use a rescue disk like Knoppix to restore a working kernel to the system This hack covers a number of methods that restore a working kernel to a system including how to use Knoppix s own kernel on a system Before you can restore a kernel you must determine which kernel needs to be restored and find another copy of it If you have been using the default kernel for your distribution this step is simple just grab the installation CD and find the kernel package or download the package from the distribu tion s package repository To restore the kernel simply use the appropriate package manager under Knoppix If you have a Deb based system refer to Hack 83 for instructions on how to use dpk
406. n use the tz cheat code to specify a particular time zone to use You can get the proper name for a particular time zone within Knoppix just open a terminal and run the tzselect program If you have forgotten to set the lang cheat code before booting up and find that your German is a bit rusty you can change the language settings from the desktop without rebooting The first step is to change KDE s language settings 1 Click on the German flag at the bottom right of the desktop to the left of the clock Each click will cycle through a list of flags corresponding to languages 2 Click K Menu gt Kontrollzentrum to launch the KDE Control Center 3 From the KDE Control Center click on Regionaleinstellungen amp Zugangshilfen gt Land Region amp Sprache 4 Pick out the appropriate country from the drop down menu at the top choose your language from the Languages list and click Anwenden at the bottom to apply the changes 12 Chapter 1 Boot Knoppix HACK Free Your CD to Make Knoppix Run Faster 6 While the Control Center is open follow these steps to change your key board layout 1 Click on Tastaturlayout in the Control Center sidebar 2 Pick the appropriate language from the drop down menu labeled Verfugbare Belegungen 3 Click Hinzufugen to move that language to the list of active languages 4 Select your language under the menu labeled Aktive Belegungen 5 Click Anwenden to apply the changes Changes to
407. n your kernel check the multi device support section of your kernel s configuration and make sure all the RAID types you wish to use are enabled Note that many distribu tions these days automatically include the tools and kernel support as they offer software RAID support in the installer This hack covers migrating a 230 Chapter 6 Repair Linux HACK Migrate to Software RAID 77 complete root filesystem on dev hda1 to a RAID 1 spanning dev hda1 and dev hdb1 or a RAID 5 spanning dev hda1 dev hdb1 and dev hdc1 First create an array following the method listed in Hack 76 but missing your current root partition dev hdal in this example You will use this artificially degraded array to set things up and then you ll replace the missing drive Before you create any RAID you need to make sure the md module the Linux kernel uses is loaded so open a terminal and type sudo modprobe md For RAID 1 type sudo mdadm create dev mdO auto yes level 1 raid devices 2 dev hdb1 missing mdadm array dev mdo started For RAIDS type sudo mdadm create dev mdO auto yes level 5 raid devices 3 dev hdb1 dev hdc1 missing mdadm array dev mdo started If you check proc mdstat it lists the RAID in this example a RAID 1 knoppix ttyo knoppix cat proc mdstat Personalities raid1 mdo active raid1 hdb1 0 2621312 blocks super 1 0 2 1 U_ Now the RAID is created and
408. nd then run the fls command to list all deleted files in the dev sda2 partition mkdir Desktop recover sudo fls f ext d r p dev sda2 gt Desktop recover deleted_files txt There are a few arguments that I have passed to fls that are useful for listing deleted files The f option allows you to specify which type of filesystem fls is reading I set it to ext since I was scanning an ext3 filesystem Type fls f list to see a complete list of filesystems that fls supports The d option tells fls to list only deleted files The r option tells fls to go through directories recursively and list their contents and the p option lists the full path of each file which is very useful when trying to piece a filesystem back together Change dev sda2 to the partition or disk image that you are recov ering the deleted file from The command will take some time but once it completes when you examine deleted_files txt you will see output that looks something like this d d 814402 realloc home knoppix r r 814413 realloc home krankin Desktop sda r r 814416 realloc home krankin kde Autostart showindex desktop d d 814641 realloc home krankin mozilla knoppix Chapter 6 Repair Linux 215 HACK 71 HACK 71 Recover Deleted Files r r 814650 home krankin mozilla firefox 3d4ef4xp default bookmarks html r r 814675 home krankin bashrc The first field lets you know whether the line refers to a file r r or a
409. nd out whether Linux sees your sound card is probably intimidating Besides just because Ispci lists a device it doesn t necessarily mean that modules are loaded and the device is up and running If your desktop environment is running Knoppix provides a tool called Info Center that collects all of the hardware information for your system and displays it in a simple interface When you run Info Center by clicking K Menu gt System gt Kinfocenter Info Center you are presented with a window as shown in Figure 5 8 3 KinfoCenter ile Settings Help CD ROM Information DMA Channels gt Devices EEE 1394 Devices w 10 Ports Interrupts gt Memory Network Interfaces OpenGL wa PCI amp PCMCIA Partitions m Processor Protocols scsi i Samba Status Sound Storage Devices F USB Devices X X Server S2 CD ROM Information DMa Channels amp pcmcia Partitions FA Processor Protocols scsi Samba Status CD DVD Drive Capabilites DMA information Attached devices information View the IEEE 1394 devices attached to this computer 10 port information Interrupt information Memory information Network interface information OpenGL information PCI information PCMCIA status Partition information Processor information Information about the available protocols SCSI information Samba status monitor Figure 5 8 The KDE Info Center On the le
410. nd restoring 222 CD images copying to 14 creating 115 root 118 swap 118 formatting 117 remastering 334 images compressing 183 Index 383 partitions continued NTFS enlarging 259 shrinking 261 resizing 209 211 root kits scanning for 175 searching 114 207 209 tables 205 Windows resizing 258 261 Windows mounting 255 parts list GPRS Bluetooth 58 party arcade creating 90 94 passwords FTP 157 partimage tool 183 resetting 239 root 71 creating 34 S T D 290 314 tools 303 VNC 130 Windows resetting 261 264 patches downloading Windows security 272 patterns addresses testing 24 BadRAM 24 PCMCIA CD ROM drives cheat codes for booting 22 PCMCIA modems 56 PDAs 46 49 PDF documents creating 40 penetration testing 309 performance optimizing 13 15 peripheral devices configuring saving settings 76 using 46 49 permissions preserving 223 persistent disk images creating 77 79 Personal Area Networking PAN protocol 57 personal configurations saving 75 Personal Information Manager PIM 43 personalizing desktops 344 349 PGP Pretty Good Privacy 294 Phelps Tom 286 physical memory CDs remastering 335 see also memory physics Quantian 323 PIM Personal Information Manager 43 pixels configuring 17 PKI Public Key Infrastructure 294 platforms creating wiki 198 200 plug ins nessus tool 169 postfix mail servers configuring 151 power managemen
411. nd settings on Windows 2000 or newer systems you must back up the entire Documents and Settings directory This direc tory contains settings for your applications the My Documents directory where you keep your important data and the files on your desktop You can back up your programs by backing up the Program Files directory but unfortunately this does not back up registry settings your programs might have created when they were installed For most programs simply copying the directories to a clean system does not restore them you must reinstall to create the correct registry settings use Konqueror s find utility by clicking Tools gt Find File in the menu bar RK If you are having difficulty finding all of your files you can Find the files you need to back up and then decide where to back them up depending on the availability of hardware and the number of files you need to back up If only a few documents need to be backed up simply use a single floppy drive If you are backing up your entire family album you need more space USB key drives can be handy for large backups because you can quickly copy your important files to the drive carry it over to another Chapter 7 Rescue Windows 257 HACK 88 HACK 89 Resize Windows Partitions system empty the drive and repeat If you have two CD ROM drives in the system one of which can write to CDs boot Knoppix on the regular drive and click K Menu gt Multimedia
412. nd vertical and horizontal refresh rates for your computer Video Card Cheats Knoppix may not always detect the exact video card that is installed in your system If you have two different video cards installed it might detect one while you want to use the other or you may have a cutting edge video card that isn t yet supported fully in X Whatever the problem is you can tell Knoppix which video card module to try by using the xmodule cheat code The xmodule cheat code specifies video card settings for the Xorg server To tell Knoppix to use a specific video card module instead of what it auto detects pass the name of the module as an argument to the xmodule cheat code For example to have Knoppix use the radeon module you would type xmodule radeon Three of the Xorg modules svga vesa and fbdev are particularly useful when X doesn t support your chipset yet or X s support for it is buggy These modules access the lower level generic video support many cards pro vide This lower level support means you do not get hardware acceleration for your video card but you should be able to get basic functionality The svga and vesa modules should work with any SVGA or VESA compliant Chapter 1 Boot Knoppix 17 HACK 7 HACK 7 Straighten Out Your X Settings video card The fbdev module works a bit differently as it accesses the low level framebuffer support in the Linux kernel its operation level depends on the
413. nd yourself wishing you had paid more attention to that diagram This chapter is that diagram for your Knoppix CD The start of this chapter is particularly geared toward people who are new to the Linux desktop This chapter explains some basics such as what a KDE panel is and how to find applications to run If you are already experienced with using a Linux desk top and programs such as OpenOffice org and Firefox you might want to skip ahead to the end of the chapter where talk about connecting to the Internet in Hack 19 and Hack 21 The first few hacks introduce you to the default Knoppix desktop environ ment and get you comfortable with the purpose of the different desktop items and the location of available programs Later in the chapter hacks are devoted to different application categories from office programs to Internet programs to games These hacks cover the desktop tools Knoppix includes for these different categories and get you started using them Once you finish this chapter you should be able to comfortably navigate through the Knoppix desktop use all of the desktop applications Knoppix has and connect to the Internet At that point you will be ready for the next few chapters which cover specialized tools included with Knoppix and their more advanced uses But for now on to the desktop 27 HACK 12 Explore the Desktop Explore the Desktop i After you have booted Knoppix figure out what these win
414. ndard Windows login page Once connected you can toggle full screen mode by pressing Ctrl Alt Enter in the rdesktop window or by passing the f argument to rdesktop when you start it Similar to VNC connections RDP connections are also managed within the krdc program in much the same way The primary difference is the syntax used for the hostname For VNC connections the syntax is hostname display or vne hostname display with RDP connections the syntax is rdp hostname To connect to a machine running at 192 168 0 1 at the prompt type this command and click Connect rdp 192 168 0 1 You are prompted for the resolution to use for the desktop and are then pre sented with the login screen This presents a similar result as rdesktop only with the krdc taskbar appearing along the top of the screen allowing you to toggle full screen mode and a few other settings These sessions are saved with any VNC sessions making krdc an excellent choice for system adminis trators who are on a mixed network of VNC and RDP servers NX Server Knoppix also has a suite of tools to connect to NoMachine s NX server NX server provides a fast remote desktop even over a slow network connection You can use the NX server to create encrypted and compressed remote Chapter 5 Put Knoppix in Your Toolbox 131 HACK 46 HACK 46 Run Remote Desktops connections to X VNC and RDP servers which are responsive even over a dial up connection NoMach
415. ndows 267 HACK 92 Restore Corrupted System Files Call a Cab Before you can restore a system file you have to locate the cab file that stores it Don t worry It s much easier and faster to find a cab with Knop pix than to find one in New York City In this example the goal is to replace a corrupted ntdll dll file a very impor tant Windows system file First find which cab files on your system it is in Mount the Windows partition under Knoppix in this example the parti tion is mounted under mnt hdal and then use the Linux find command combined with cabextract a Linux utility that can extract files from cab files knoppix ttypo knoppix find mnt hda1 name cab exec sh c if cabextract 1 2 gt dev null grep ntdll dll then echo fi 481040 27 10 1999 12 06 10 ntdll dl1l mnt hda1 winnt Driver Cache i386 driver cab 491792 19 06 2003 12 05 04 ntdll dll mnt hda1 winnt ServicePackFiles 1386 sp4 cab Basically the script finds all cab files on your Windows partition and then searches through the files they mention for the filename you are looking for In this example I found two cab files that contain ntdll dll mnt hda1 winnt Driver Cache fi386 driver cab and mnt hdal winnt ServicePackFiles i386 sp4 cab Notice that the files have different sizes and different dates A good rule of thumb is to use the most current version of the file in this case it is in sp4 cab n
416. ndows system and return to your system Chapter 7 Rescue Windows 261 HACK 90 Reset Lost NT Passwords Get chntpw The chntpw tool is part of the ntpasswd package which can be downloaded in boot floppy form from its web site at http home eunet no pnordahl ntpasswd However this gives you a floppy image and requires that you mount multiple loopback entries to extract the utility from the floppy image to use under Knoppix While you can simply create an ntpasswd boot floppy this means yet another rescue disk to carry with you and the beauty of Knoppix is that you have access to all of your recovery tools in a single disc Luckily the chntpw tool is now part of Debian unstable which means that you can grab it directly from Debian s repository You can use apt get to download chnipw However to be certain you retrieve the latest version of chntpw you must run the apt get update which downloads about 10 times as much data per repository as the 85 KB chntpw package It saves bandwidth and time to download the package directly You can get the latest chntpw package from http packages debian org unstable admin chntpw Download the deb to your home knoppix direc tory Now use the dpkg tool directly to install the package sudo dpkg i chntpw_0 99 3 1_1386 deb Reset the Password To reset the password you must have write permissions on the Windows partition No matter whether the filesystem is a FAT FAT32
417. neral rule of thumb is to use apt get upgrade to upgrade packages that aren t held back and then use apt get install to install individual packages that have been held back Running apt get install alerts you to the reasons the package is held back whether it wants to remove an old dependency or possibly install a new one so that you can decide whether you want to install the package When you run this program you are presented with a full list of packages apt get intends to download and install told how large the files are and told how much disk space is used after they install Pay extra attention to the additional disk space this upgrade uses before you continue If your CD is already tight on space you must figure out ways to trim it down after the upgrade Hack 110 Once you tell apt get that you want to continue it down loads each new package from its respective repository along with any depen dencies it needs and then after all of the packages have finished downloading apt get unpacks and installs each one While apt get is downloading it is safe to stop the program by hitting Ctrl C Any partial downloads that result from the program exiting prematurely resume the next time you run apt get Also if for some reason a package does not download or the server doesn t respond you can simply stop the process and resume a bit later However after apt get has moved past the downloading phase and is going through the proce
418. nes Oxley legislation In his free time Jascha enjoys collecting records the vinyl kind and rock art posters Most of his free time is dedicated to his LocalAreaSecurity com project Credits xvii Acknowledgments First of all I want to thank my wife Joy the real writer in the family for supporting me through this process It s not easy to take so much time away from someone you love for a project like this Thanks for understanding and helping me manage my priorities particularly now that this book is at a sec ond edition Thanks also to Fabian who has helped answer questions from the very beginning and who has been a major contributor to the book both in con tent and in critique And thanks to all the other contributing writers who have helped tell their particular part of the Knoppix story In true commu nity spirit thanks to Eaden McKee and the rest of the Knoppix net forum for their excellent documentation in particular the remastering instructions Extra thanks to Greg for making the original version of this book possible and to Brian and Tom for all of their work in editing the book Also thanks to Wayne and Juan for assisting with the technical review Thanks to all my friends for your continued encouragement especially Jorge whom I thought of whenever I wrote a system recovery hack And of course who can forget Klaus Knopper the guy who started it all Thanks for Knoppix it has certainly saved me more than on
419. net projects ofset AHilaire Fernandes Georges Khaznadar zaJ Damn Small Linux f 98 Damn Small Linux is a business card sized 50 MB bootable live CD Linux distribution Despite its size it strives to have a functional and easy to use desktop The History Simply put I m an efficiency freak which is why I founded Damn Small Linux DSL hitp www damnsmalllinux org am also a big Knoppix fan Chapter 8 Knoppix Reloaded 281 HACK 98 Damn Small Linux but running KDE OpenOffice org Mozilla and so on from a live CD on my older computers is a real chore I usually grab the lightest applications to use on my home desktop For email I use Sylpheed for browsing I use Dillo or Links Hacked I wanted a desktop oriented live CD that was fast and small so I checked out LNX BBC http www Inxbbc org and ByzantineOS http byzegl sourceforge net the two leading sub 50 MB distributions at the time They were both very innovative but not really what I was looking for LNX BBC is similar to a rescue disk and ByzantineOS is based on Mozilla which it uses in very interesting ways I was on a quest for a Linux distribution that was small enough to fit on a business card CD yet had a fully functional desktop I read about the reduction efforts to get Knoppix small enough to fit into 80 mm 210 MB CDs Some of them were quite nice like Kurumin http guiadohardware net kurumin from Brazil but I wanted some
420. nfiguration tools for the network video and sound cards the konsole terminal and the firestarter firewall configuration tool Midi This desktop contains all of the applications for editing and listening to MIDI files Some notable applications on this desktop include Timidity MIDI editor and player and Rosegarden very powerful MIDI sequencer score editor and music composition environment 330 Chapter 8 Knoppix Reloaded HACK Contribute to Knoppix 108 Internet The Internet desktop has links for a number of Internet tools on the disk from Konqueror web browser to Kmail email application to Firestarter firewall editing tool to xchat IRC client to bittorrent Graphics A number of graphics tools are available from the disk and are listed on this desktop Here you will find Gimp powerful image editing tool Blender 3d image editor xine video player cinelerra professional video editing tool as well as font printer and scanner configuration tools Audio The audio desktop has probably one of the largest sets of tools and con tains programs such as Ardour a multichannel digital audio worksta tion Rosegarden k3b audio and data CD DVD burning tool grip flexible CD player and ripper encoder terminatorX a virtual turnta ble tool that lets you scratch MP3s like they were records audacity WAV and MP3 editor and many more tools With all of these tools plus many not mentioned here Musix is de
421. nit string for GPRS The init string for T mobile in the USA is AT CGDCONT 1 IP internet3 voicestream com I suggest you call your service provider and ask for the correct custom init string You may also find your answer by searching on the Internet The next window that appears warns you that GPRS use can cause high costs due to high traffic volume This phone has the unlimited T Mobile data service so I won t worry about this Now that the Bluetooth connection between the phone and the computer is created the Nokia brings up a prompt that asks for the passcode for knop pix 0 the default name for the Bluetooth device in Knoppix Enter the passcode in my case 1234 and press OK on the phone You are then prompted on the computer for the outgoing Bluetooth PIN in my case 1234 The phone now asks you to Accept connection request from Knoppix 0 On the phone select Yes and Knoppix attempts to cre ate a GPRS connection and launches a terminal that displays the connection attempt In this log you are able to watch each step of the connection and tell whether the connection succeeded or failed Here is an example ppp0 configuration after a successful connection knoppix ttypo knoppix sudo ifconfig pppo pppo Link encap Point to Point Protocol inet addr 208 54 115 125 P t P 10 6 6 6 Mask 255 255 255 255 60 Chapter 2 Use Your Knoppix Desktop HACK Connect to the Internet with GPRS Bluetooth 20 UP
422. node makes the final connection to the remote server With this layered router design the compromise of the network along any one of these points would never reveal both the client and the server This tunnel is also reassigned through different nodes periodically to increase security For more informa tion about the technology behind Tor visit the official page at http tor eff org To install Tor on Knoppix you can follow the directions on the official site just like with any other Linux client The main two programs you will need are both Tor and the Privoxy proxy server Knoppix has both available as packages so click K gt Knoppix gt Utilities Manage software in KNOPPIX to start the Synaptic package manager click Reload to get the latest list of packages and then search for and select the privoxy and tor packages and click Apply Alternatively you can open a terminal and type sudo apt get update amp amp sudo apt get install tor privoxy After Tor and Privoxy have installed you will need to configure Privoxy to use Tor Use your preferred text editor to edit the etc privoxy config file First add the following line to the very top of the file forward socksda 127 0 0 1 9050 including the dot at the end Next locate and comment out add a to the beginning of the line any lines that match the following logfile logfile jarfile jarfile Now open a terminal and type sudo etc init d privoxy restart to restart the Priv
423. noppix Install from the CD install Each stage starts you at a different point in the compilation of the base system The later the stage you choose the less input you have into how the base system is configured Which stage you choose is mostly a mat ter of personal preference and depends on the amount of time you have for this particular install Chapter 3 describes some additional steps that you may need if you are using the Gentoo CD but since you are not these steps can be safely ignored Once you have chosen a stage for the install you are ready to start the Gen too install process First partition and format your disk as described in Chapter 4 Then simply follow the rest of the Gentoo Installation Handbook to complete the installation Remember to retrieve your stage tarball from the Internet as described in Chapter 5 b Now you have all the benefits of having a Gentoo system such as the excel lent portage package manager but with a much less painful installation If you enjoy puzzle games I recommend playing Frozen Bubble while you wait for the system to compile Alex Garbutt Update a Knoppix Install from the CD Use the latest Knoppix release to update your current installed Knoppix system Knoppix has always been designed to be run directly from the CD As this chapter has shown this can present some challenges when you want to install Knoppix to a system and particularly when you want to upgrade it Recently
424. noppix as a Single Boot System File Operations Disks Device Options Help ee Ok A E The following drives have been detected dewcloopo idevicloopt 01 dev hda 1 free Hidden N A 0 00MB 4 00GB idevicloop2 cevicloopa Create partition Br tin Create as Primary Partition Position Beginning of unallocated space Partition Type linux swap End of unallocated space Label Size 512 HJ mB Percent of unallocated space 100 TParted mor Figure 4 2 Create a swap partition with qtparted Q siparics oss D 2 x File Operations Disks Device Options Help GOK Oor B HQ fdevindb Number Partition Type Status Size Used space L001 devehdbt linux swap 256 06MB N A 0 03MB 256 09MB D02 dewhdb2 ext3 6 74GB N A 256 09MB 6 99GB dey hdb Model QUANTUM FIREBALLIct15 07 Capacity Mb 7162 25 Length sectors 14668290 Status available oTPartea by Zanac c 2002 2003 H Figure 4 3 A partitioned hard drive ready to install To start the configuration process select Configure Installation and click OK Select the Debian system type and press Enter or click Next The installer then asks you to choose the partition on which to install Knoppix In our example there is only one partition so simply click Next At this stage of the install set up user accounts At the first window enter your f
425. noppix defaults to change them here Theme Manager Pick particular themes packages that have pre set options for the rest of these settings Window Decorations Configure the look and placement of the title bar and buttons on all of your windows Chapter 2 Use Your Knoppix Desktop 35 HACK 13 HACK 13 Customize the Desktop Look After you have changed the settings for any of those options click Apply to commit them If you apply new changes and don t like how things look click Reset to take you back to how they were set before the change One of the fastest ways to customize the look of your desktop is to change the background image or wallpaper To do this click on Background under Appearance and Themes To the right you should see all of your back ground options as shown in Figure 2 4 You also have the option to set a different background for each of your virtual desktops By default each desktop shares the same background Click on the drop down menu to give you a list of other backgrounds If you have an image somewhere else on your computer you would like to use click the folder icon to the right to browse through the filesystem and find it Both usr share pixmaps and usr share wallpaper have a number of images you can use To use a background from one of your hard drives click the drive icon on the desktop to open it find the file you want to use hold down the middle mouse button push down the scro
426. noppix for the first time After they use it for awhile they invariably want to tweak things They usually either want to change some of the desktop settings or add their favorite program Most of the time they decide to create their own version of Knoppix with a complete remastering Now there s nothing wrong with remastering but it is rather time and resource intensive and there are some opportunities for error especially the first time you try it If you have minor tweaks it is better to take advantage of Knoppix s saveconfig script and knoppix sh file it creates to change and tweak settings without a full remaster The saveconfig script The saveconfig script within Knoppix is probably the best way to remaster Knoppix without remastering You can type saveconfig from a terminal or otherwise you can click Kmenu gt KNOPPIX gt Configure gt Save Knoppix configuration A simple GUI will pop up and allow you to choose what cate gories of settings to save from desktop and program settings the entire Desktop directory network settings graphics settings and other system set tings Choose the settings to save and the device to save them to from a list of detected devices Knoppix provides and the script does the rest creating a configs tbz and knoppix sh file on the device you chose The next time you boot add the cheat code myconfig scan and Knoppix will scan all available devices for the knoppix sh script and then exe
427. noppix in Your Toolbox Add Knoppix to Your PXE Boot Environment Once the PXE server has started you can find all of Knoppix s PXE configu ration files under tftpboot Here are the files and their uses boot msg This file contains the message that Knoppix shows by default when you netboot It also contains a reference to the graphic that Knoppix dis plays on terminals that support it german kbd The German keyboard mapping If you plan on typing in German this will be useful to you Otherwise it won t logo 16 A special graphic displayed at the PXE boot menu miniroot gz The initial root partition the Knoppix kernel loads that contains mod ules and other important files pxelinux 0 The pxelinux program which you should already have set up on your PXE server pxelinux cfg default This file contains the full set of pxelinux configuration commands for Knoppix The bulk of your configuration will occur here and I will cover it below vmlinuz The Knoppix kernel image The file that will require the most of your attention is pxelinux cfg default This file contains all of the settings necessary to boot Knoppix Since the file is named default the PXE server will refer to it only if it doesn t find any other more specific configuration files to use Check out the first few lines of the file to see the default configuration it uses DEFAULT vmlinuz APPEND secure nfsdir 10 1 1 215 cdrom nodhcp lang us ramdisk_size 1000
428. note of the new partition size Once you have resized the partition itself it is necessary to reboot the machine into Win dows and allow it to run chkdsk before you attempt to mount or otherwise change the partition under Knoppix waa Reset Lost NT Passwords 90 If you forget a password for your user on your Windows system especially if the user is Administrator your computer immediately becomes a paperweight It s like being locked out of your car without a spare set of keys and without a way to contact a locksmith Use Knoppix as your locksmith to reset the password to a new value or even completely erase it User accounts have an interesting history in Windows The Windows 9x series did offer usernames and passwords but every user could overwrite every other user s files and the system did not offer any real security If you forget your password in Windows 9x resetting it is as simple as delet ing a pwd file with a DOS disk With Windows NT 2000 and XP Microsoft has increased its user security by creating different user accounts on the same system and passwords that protect them However unlike in Windows 9x if you forget your Administrator password your only recourse is to purchase a tool to reset your Windows password or to reinstall Win dows to create a new administrator account If you have a Knoppix disk you can download and use the chntpw tool which is a small program that lets you reset the local passwords on a Wi
429. nstration disks and for system recovery I have never been a Boy Scout but I have always liked the idea of being prepared for anything and at any moment I might have been carrying a DemoLinux CD or a LinuxCare Bootable Busi ness Card with me along with a number of other tools including a Swiss Army knife I ve found that it s handy to have both a screwdriver and a knife in my pocket while crawling under a desk to fix a machine or running cabling through the ceiling and the Swiss Army knife gives me those tools in a compact form My use of the Swiss Army knife probably has a lot to do with all the MacGyver watching I did as a kid I marveled at how he seemed to get out of just about any jam with a few simple tools that fit in his pocket xix Knoppix has quickly become my preferred software Swiss Army knife I no longer have to carry around a lot of different CDs and floppies because a single Knoppix CD provides everything I need What s better I can easily and legally make copies of it for my friends or customize it to have the special tools only I need because it is an open source CD Since the first release of this book Knoppix has continued to evolve and add all sorts of powerful features such as UnionFS now Aufs which makes the possibilities of what you can do with Knoppix almost endless In addition to the standard CD Knoppix now has a DVD version with an almost over whelming amount of software Because of advances
430. nt dev root on type ext2 rw ramdisk on ramdisk type tmpfs rw size 427884k mode 755 UNIONFS on UNIONFS type aufs rw br ramdisk KNOPPIX dev hdc on cdrom type iso9660 ro dev cloop on KNOPPIX type iso9660 ro proc bus usb on proc bus usb type usbfs xw devmode 0666 dev pts on dev pts type devpts rw The key mount points to pay attention to here are ramdisk UNIONFS and KNOPPIX The ramdisk partition is the read write partition created in RAM The KNOPPIX partition is the compressed loopback filesystem from the disk that contains all of the Knoppix software Finally the UNIONFS partition is the Aufs combination of both of these partitions If you look at the usr directory for instance you will notice it s a symlink to a directory created within this virtual UNIONFS mount point Is ld usr lrwxrwxrwx 1 root root 12 Apr 15 08 07 usr gt UNIONFS usr Chapter 3 Tweak Your Desktop 73 HACK 25 HACK 25 Use Aufs Most of the files on the system ultimately refer to their copy under the mount point KNOPPIX However any files that either you or Knoppix itself edits have a copy made under ramdisk For instance as Knoppix boots it detects networking devices you might have and configures them in the etc network interfaces file Even though a copy of the file exists on the disk once Knoppix writes to it it gets copied to the ramdisk when you refer to the file it points to that versio
431. nteresting expand by exploring with kismet_ drone Using Knoppix encryption and a stealth computer you can collect volumes of data on your own network of course Join Networks What s the purpose of wardriving if not to make use of the connections you find Don t answer that I prefer to assume you have harmless intent To join a network you ve discovered you must either quit the kismet server or use a second wireless card for the connection I use a few short scripts to assist with joining networks The first script cng_ mac generates a random MAC address which is useful for testing MAC fil tering on a wireless network usr bin perl GPL v2 jake appelbaum net A quick script that generates a random variable It looks surprisingly like a MAC address Something like 23 00 CO FF EE 00 However it will take the first set of octets and set a proper vendor code for cat etc kismet client_manuf cut d f1 4 push vendorcode 1 if S s srand time 345 printf vendorcode rand 1 vendorcode printf X X X X n rand 16 rand 16 rand 16 rand 16 rand 16 The run_wardrive script resets a PCMCIA wireless card and brings its inter face back up with a random MAC address If you are using an integrated wireless card you may comment out the first four lines of the script leaving only the ifconfig commands bin sh GPLv2 jake appelbaum net cardctl eject
432. o atheros Change it to match your card type card interface and card name respec tively This information can be found in usr share doc kismet README gz on the DVD or on the kismet home page if you use the CD which doesn t contain that document The kismet conf file contains example source lines for other cards to make changes easier If you plan to use GPS when you are wardriving also change gps false to gps true Chapter 5 Put Knoppix in Your Toolbox 161 HACK 54 HACK 54 Wardrive with Knoppix All of the other defaults are a matter of personal taste After you get a feel for running Kismet you will learn how to configure these defaults Make your edits to the configuration files in your home directory and save your changes To launch Kismet with your alternate configuration files requires a f option to specify the path to the kismet conf file and a u option to spec ify the path to the kismet_ui conf file knoppix Knoppix sudo kismet f kismet kismet conf u kismet kismet_ui conf When you start Kismet you find that the wonderful world of wireless has a lot fewer secrets If at any point you need help hit H for a list of commands In Figure 5 4 you can see that I have 275 networks with a total packet cap ture of 13823 Ninety two of those packets are encrypted 81 are noise and at the moment I am capturing at a rate of 9 packets a second DDD DE Ph P P N P N P h P N P P N
433. o etc init d sysklogd start sudo postfix reload 152 Chapter 5 Put Knoppix in Your Toolbox Make an Emergency Mail Relay Test the Backup Mail Server Now you are ready to test this mail server Pick a machine elsewhere on the network that can connect to this machine and use the following series of telnet commands to send raw SMTP commands to the mail server and con firm that it will accept mail addressed to its configured relay domains In this example I will connect to my Knoppix mail server that has an IP address of 192 168 1 5 and send an email from johndoe example com to janedoe example com telnet 192 168 1 5 25 Trying 192 168 1 5 Connected to 192 168 1 5 Escape character is 220 Knoppix localdomain ESMTP Postfix Debian GNU HELO example com 250 Knoppix localdomain MAIL FROM johndoe example com 250 2 1 0 Ok RCPT TO janedoe example com 250 2 1 5 Ok DATA 354 End data with lt CR gt lt LF gt lt CR gt lt LF gt Subject Test Just testing 250 2 0 0 Ok queued as 59D651C002 QUIT 221 2 0 0 Bye Connection closed by foreign host Now check the var log mail info file You should see your message get added to the queue here This message will sit in the queue until either it is able to be delivered to the primary mail server or the queue lifetime expires and it is bounced Configure DNS Once you have confirmed that your mail server is accepting mail for your relay domains you are ready
434. o accessible from the penguin icon on the KDE panel Multimedia Contains all of the multimedia applications from players for CDs MP3s and videos to mixers and sound manipulation programs Office Provides all of the applications useful in an office setting including the complete OpenOffice org suite Settings Not to be confused with the System or Utilities menus this menu con tains applications specifically for changing KDE settings Chapter 2 Use Your Knoppix Desktop 31 HACK 12 HACK 12 Explore the Desktop System Contains many useful applications for different aspects of system administration from security scanners to backup utilities Many of the programs in this menu require or give root privileges so use these appli cations with caution Toys Has a few fun applications that don t really qualify as games including the famous tuxeyes program DVD only which creates two eyes on the desktop that follow the movement of your mouse Utilities Displays utilities that aren t necessarily geared toward system adminis tration such as calculators and clocks Lost and Found Location for menu items that don t fit other categories After Lost and Found instead of more application submenus you find icons that run specific KDE applications Control Center A quick shortcut to the KDE Control Center used to change KDE settings Find Files Runs the KDE find utility a useful program for searching through
435. o cre ate an SBM boot floppy go to their download page at http btmgr sf net download html and download either the Binary Linux sbminst file to create the floppy from a Linux system or the Binary DOS sbminst exe file to create it from Windows To create an SBM floppy under Linux insert a blank floppy into the drive and then run the following commands chmod a x path to sbminst path to sbminst d dev fdo Change path to smbinst and dev fb0 to reflect where you downloaded sbminst and your floppy device respectively Note that you may have to run sbminst as the root user if your regular user does not have permission to write to the floppy device To create an SBM floppy under Windows insert a blank floppy into the drive click Start gt Run and run cmd exe under Vista you can type cmd exe Chapter 1 Boot Knoppix 3 HACK 1 HACK 1 Boot Knoppix on a Desktop into the search field and press Return and then in the Command Prompt window that opens type sbminst d 0 With the floppy disk created and still inserted into the floppy drive reboot the machine and boot off of the floppy In the GUI that appears you will see a number of options and devices listed Use the arrow keys to move down to the CDROM device and hit Enter to boot the Knoppix CD The Knoppix Boot Prompt Once you have booted from either a CD DVD or a floppy you are pre sented with the Knoppix boot screen as shown in Figure 1 1
436. o do many common system recovery tasks both on Linux and Windows The Preface xxi final chapters focus on Knoppix as a platform to create other live CDs with an introduction to many popular Knoppix based distributions and steps to create your own Chapter 1 Boot Knoppix Before you can use Knoppix you must get it booted on your system This chapter guides you through the process of getting the latest ver sion of Knoppix and booting it on your hardware The main focus of the chapter is the use of special boot time parameters called cheat codes to tweak the settings Knoppix uses as it boots Chapter 2 Use Your Knoppix Desktop Knoppix boots directly into a full KDE desktop environment This chap ter covers all of the features of the Knoppix desktop and introduces the major desktop and Internet applications Knoppix includes as well as how to connect to the Internet Use this chapter to get up to speed on the Knoppix desktop Chapter 3 Tweak Your Desktop This chapter covers how to tweak settings on the Knoppix desktop including installing software directly to ramdisk This chapter also cov ers the use of persistent storage which saves all of your settings and data between reboots so your data and configuration can be as porta ble as Knoppix itself Chapter 4 Install Linux with Knoppix Knoppix makes it easy to install Linux on your own machine This chapter walks you through the Knoppix installation process with a few common
437. o save all of the different wiki pages everyone has created Kwiki makes this easy since the entire site is self contained within home knoppix kwiki Just copy that entire directory over to a more permanent server point Apache to it and it will be back up and running 200 Chapter 5 Put Knoppix in Your Toolbox CHAPTER SIX Repair Linux Hacks 65 86 Using Linux effectively is a learning process One of the best ways to learn is to just dive in and try it If you are new to Linux you quickly discover another good way to learn is to fix something you accidentally broke I con sider myself an experienced Linux administrator by experienced I mean that I have broken my system many times and have had to recover it The most frustrating mistake you can make under Linux is one that leaves your computer unbootable Like with most things in Linux there are a num ber of ways that you can do this and once you do you will need a rescue disk Many distributions include special purpose rescue disks or the install CD itself doubles as a rescue disk This works well enough when you need to recover some common mistakes on that particular distribution but none of the distribution rescue disks come close to the flexibility and number of tools Knoppix includes to fix Linux Besides many distribution recovery CDs provide only a command prompt Knoppix provides a full GUI and a number of very useful GUI tools for repairing mistakes With Kn
438. o schools The Freeduc CD boots into an XFCE environment configured with many tools suitable for classroom use A Knoppix CD is a fantastic way to demonstrate an entirely free operating system to a free software newbie At OFSET The Organization for Free Software in Education and Teaching http www ofset org we ve found that a customized version of Knoppix is the perfect way to demonstrate to educa tors and parents what is available for them within the free software commu nity To make our demonstrations even more targeted we decided to produce a customized version of Knoppix called Freeduc short for FREe EDUCation Eventually UNESCO United Nations Educational Scientific Chapter 8 Knoppix Reloaded 279 HACK 97 Educate Yourself with Freeduc and Cultural Organization http www unesco org decided to support us in the release of Freeduc 1 4 According to UNESCO FREEDUC is at the disposal of UNESCO to facilitate the use of free soft ware in education and teaching The gratis distribution of this international version of FREEDUC to teachers will help to promote access to information and communication technologies for education and teaching We want Freeduc s users to focus on the free applications and not on the desktop so we decided to include only one light desktop environment and save CD ROM space for more applications When designing Freeduc CD version 1 4 we chose XFCE3 because it s light consistent an
439. od should work identically for you If you want to copy a kernel other than the one you are currently using simply replace uname r with the kernel version you are using Whichever method you use to copy a working kernel to your system once it is copied make sure that your boot loader s configuration file is the correct one for the new kernel If you simply installed the default kernel package for your distribution you should not need to perform any additional configura tion If you use lilo as a boot loader you also must update lilo in your boot sector covered in Hack 65 before you can reboot your system to the restored kernel Keep in mind that you aren t required to use any particular kernel like the one that was included with your Linux distribution If there is another ker nel image you wish to boot from that you know will work with your hard ware simply perform the same steps used to copy Knoppix s kernel to the system If you do this be sure to update your boot loader and keep a backup of the distribution kernel just in case Otherwise if the new kernel doesn t boot just try this hack again 7 Turn a Physical Machine into a VMware Virtual 416 Machine Convert a running physical server into a VMware virtual machine with minimal downtime Virtual machines particularly as supplied by vendors like VMware and projects like Xen are being used more frequently these days even by your average user When yo
440. om the network or you don t know which NICs Network Inter face Cards are in your computers simply put a Clusterknoppix CD in each computer The Network Boot Method The first step to set up a cluster that boots from the network is to prepare the master node With a master node running you only need a single Clusterknoppix CD 316 Chapter 8 Knoppix Reloaded Distribute the Load with ClusterKnoppix client every node is equal by default but I use the terms master and client nodes to differentiate between the computer with the CD and the computers without it respectively RK openMosix itself doesn t differentiate between master and If you have a DHCP server on your network you should receive an IP address once the master node boots from the CD Otherwise you must con figure the IP manually as in knoppix ttypo knoppix su root ttypo root ifconfig etho 10 33 1 14 netmask 255 255 255 0 root ttypo root route add default gw 10 33 1 254 root ttypo root etc init d openmosix restart Replace etho with your Ethernet card and the IP addresses with the values you want to use for your network If you have your own DHCP server on this network segment you must shut it down for now because the terminal server you are running starts its own as mentioned in Network Boot Knoppix Hack 31 Having two DHCP servers on the same network segment creates problems on the network because you don t know which ser
441. omatically might be a bit demoralizing But you should be rejoic ing because X s configuration file is pretty standard across Linux distribu tions This means you can copy Knoppix s configuration to your distribution almost directly Like pretty much every other Linux distribution Knoppix stores X s config uration in etc X11 xorg conf Provided you have a similar version of X on 192 Chapter 5 Put Knoppix in Your Toolbox Copy Settings to Other Distributions your system you can copy this file directly to your system and get the same exact configuration that you have in Knoppix Knoppix does include quite a few fonts in the file so X might give some warnings about missing font paths if your fonts aren t installed in the same location or aren t installed at all If you are experienced with X configuration you don t necessarily need to copy the complete file but can instead reference particular sections such as the monitor section or input device sections For instance to copy the complete monitor section that Knoppix uses copy all of the text starting with Section Monitor and ending with EndSection to your xorg conf file Then make sure that in your screen section this section starts with Section Screen the Monitor line has the same monitor name as the name following Identifier in the monitor section you pasted in Copy Module Information For much of the hardware on a system there aren t many configuration
442. ommand you wish to run with root privileges For instance use this com mand to run fdisk as root sudo fdisk You can also click K gt Knoppix gt Root Shell to launch an xterm that already has root privileges For the most part Knoppix has set up the desk top so that you don t need to set a root password nor login as root to per form many system level things When you are on the command line however you will still need to use sudo to run things as root This root shell is a quick way to work around that All commands typed in the root shell are automatically run with root privileges so you don t have to preface them with sudo By default Knoppix sets up root so that it does not have a password and generally a root password isn t needed but if you do find you are asked for a root password or need to set one for another reason either click K Menu gt KNOPPIX gt Set password for root or open a terminal and type sudo passwd Chapter 2 Use Your Knoppix Desktop 71 HACK 24 CHAPTER THREE Tweak Your Desktop Hacks 25 39 After you have become comfortable with the desktop and the different desk top applications that Knoppix includes you might want to save documents or settings that you have worked on This chapter contains hacks that cover methods to save your settings and documents so you can access them the next time you boot along with how to use settings you might already have on the Linux or Wind
443. on the desktop and click Change Read Write Mode Once you choose the cab file to use change to the directory that contains your corrupted file If you aren t sure where it is type the following knoppix ttypo knoppix find mnt hda1 name ntdll dll print mnt hda1 winnt system32 ntd11l d11 After you change to that directory use cabextract to extract the file and overwrite the corrupted version as follows knoppix ttypo knoppix cd mnt hda1 winnt system32 knoppix ttypo system32 sudo cabextract F ntdll d1l mnt hda1 winnt ServicePackFiles i386 sp4 cab Extracting cabinet mnt hda1 winnt ServicePackFiles i386 sp4 cab Extracting ntdll dll All done no errors knoppix ttypo system32 Now change to a directory outside of your windows partition unmount it and then reboot knoppix ttypo system32 cd knoppix ttypo system32 sudo umount mnt hda1 Scan for Viruses Ridding a network of Windows computers of a virus or worm can seem impossible Viruses may cause computers to reboot and infect new machines while you are in the process of removing them Through the use of the live software installer Knoppix provides a solution to this catch 22 Viruses and worms are a common problem in the computing world today It seems every other day a new virus or worm comes out and anti virus ven dors must quickly update their signatures to block the new outbreak Unfor tunately not everyone has a virus scanner installed on his syst
444. ools check out Knoppix BackTrack It s also worth noting that the nessus that comes with Knoppix has features that are disabled because most of the other tools that nessusd uses are not on the CD One example of this is nessus s ability to force logins for various protocols If your needs include some of these types of scans you have out grown the default Knoppix distribution and should give a security focused Chapter 5 Put Knoppix in Your Toolbox 173 HACK 99 HACK 56 Check for Root Kits distribution A list of these distributions such as BackTrack can be found on the knoppix web site http www knoppix net wiki Security_Live_CD Jake Appelbaum i Check for Root Kits Use your Knoppix CD as a safe known good system for scanning your Linux install for root kits The root user on a Unix system has always held a bit of mystique The power to create and destroy user accounts on a whim has gone to many sys tem administrator s heads System administrators aren t the only ones who seek the power of root however Attackers have long sought to exploit the security holes in a system to illegally gain root access A root kit is a system of scripts that uses a security exploit to help an attacker obtain and maintain root access on a system These scripts often clear logs and replace important system binaries such as ps find and su among others with modified versions to further hide his tracks A single ro
445. oopback configuring 78 minirt gz 366 Program Files directory backing up 257 PXE configuration 195 QuickTime mov 54 Samba servers sharing 147 saving 75 sessions 80 system copying 192 194 restoring 267 269 tar command 221 223 Windows backing up 256 258 finance Quantian 323 Find Files application 32 find method 224 Firefox 63 kiosks creating 88 settings copying 82 84 firestarter 297 firewalls 296 creating 139 146 floppy disks booting from 3 fls tool 214 215 FluxBox 67 291 300 hotkeys 313 folders systemroot Windows 256 fonts modifying 35 36 foremost 296 forensics 295 data collecting 176 180 INSERT 284 287 formatting CDs with Morphix 277 279 documents PDF 40 hard drives 120 partitions 115 117 configuring for remastering 334 root 118 swap 118 passwords resetting 239 root 34 fragroute 307 framebuffers cheat codes 18 Franz Fabian 114 Freecell 50 Freecraft 278 Freeduc 279 281 FreeNX connecting with 133 138 freezes system 212 freshclam 286 Frets on Fire installing 91 Frozen Bubble 50 278 fsck tool 212 fsck ext2 tool 212 376 Index FTP File Transfer Protocol running with inetd 156 functionality of video cards 17 G Gaim 64 Galaga 50 games 49 adding 90 94 Freeduc 280 Morphix 278 Nvidia 3D drivers installing 100 103 Quake3 104 saving 93 Games submenu 31 general hardware probing 186 General Packet Radio S
446. oot for the username and the password you have set up and then choose OK Once you ve authenticated you are presented with some compression and file splitting options Partimage can compress partition images using gzip and bzip2 algorithms which are progressively slower but provide Chapter 5 Put Knoppix in Your Toolbox 183 HACK 58 HACK 59 Wipe a Hard Drive progresssively smaller images By default partimage also splits images into files that are less than 2 GB This is a safeguard in case you are saving to a filesystem that doesn t allow files to be larger than 2 GB If you want to burn the images to a CD ROM later you can also modify this option to save the image to 650 MB or 700 MB files Once you have changed these settings to suit your needs hit F5 to move to the next screen which allows you to type a description of the saved partition By default partimage presents you with information about the partition Hit Enter to start the image copying process One nice thing about using partimage over dd is that the progress bars tell you how far in the process you are how much time has elapsed how much time is remaining and information about how large the image is and how much free space you have available If you saved to a remote server you can also monitor the progress from there Once the process finishes partimage displays how long the process has taken and then exits To restore an image using partimage th
447. oppix it s even easy to open a web browser or a chat client and search for help The first part of this chapter includes many different tips for repairing the Master Boot Record MBR including how to restore both lilo and grub and how to back up and restore your entire MBR The next part of the chapter is focused on overall disk repair and covers how to undelete files you have accidentally removed methods to back up and restore files and even a com plete set of hacks for software RAID The final set of hacks focus on how to repair some important system files that can stop your system from booting including the etc passwd file and the kernel By the end of this chapter you should be a master of Linux system recovery and be the go to guy your friends call when they break their machines 201 HACK 65 Repair Lilo Repair Lilo i Use Knoppix to restore lilo to the Master Boot Record MBR A common tech support problem you see on Linux forums is something along the lines of Help I upgraded my kernel and didn t keep the old ker nel in my lilo conf and the new kernel won t boot or Help I installed Windows after Linux and now I can t get back to lilo Whatever the rea son all of us have run into situations where we have needed to restore lilo on a system that won t boot This is a situation where Knoppix can come to the rescue To restore lilo to the MBR you must reference the etc lilo conf fi
448. oppix tty1 knoppix sudo mount o remount dev xrw mnt hda1 Once the filesystem is mounted restore grub with the following command knoppix tty1 hda1 sudo chroot mnt hda1 grub install dev hda Of course replace mnt hdal and dev hda with your mounted root parti tion and the device to which you wish to install grub respectively If you use devfs or for some reason the chroot environment 3 doesn t work mount the filesystem with write permissions then run sudo grub install root directory mnt hda1 dev hda Install grub on a System Without grub Once grub is installed on an MBR all it needs is the contents of the boot grub directory to boot your system That means you can use Knoppix to install grub to a system that doesn t have grub binaries on it Obviously once you have the grub configuration files set up you want to find and Chapter 6 Repair Linux 203 HACK 66 Repair Grub install the grub packages on your system but with this next series of com mands you can use the grub tools from Knoppix to set up grub on your MBR To install grub directly from Knoppix mount your root partition read write and create a boot grub menu Ist file If you are comfortable with grub you can do this by hand with a text editor You can also copy over usr share doc grub examples menu lst from another Linux machine that has grub installed and comment out the different operating systems it has already configured
449. option lets you change which fonts to use for different widgets and their sizes This configuration window is especially useful for high resolution laptop displays because some fonts are too tiny to read The font configuration window lets you turn on anti aliasing for your fonts Anti aliasing makes the fonts look better by smoothing out the jagged edges on diagonal lines It is particularly effective on LCDs Linux lets you control the shape size and representation of many common elements on your screen The elements collectively known as widgets include the buttons scrollbars checkboxes and drop down menus com mon in all applications KDE groups these widgets into configurations called styles to make it easy to change all elements at one time Click on the Style option in the index to open the style configuration window The Widget Style drop down menu presents you with a series of widget styles to choose from and below it is a preview window so you can see what the changes would look like The Effects and Miscellaneous tabs along the top of this window let you further configure special settings for the widgets including animation and translucency effects Not all styles support these extra effects Chapter 2 Use Your Knoppix Desktop 37 HACK 13 HACK 13 Customize the Desktop Look If that big thick titlebar bothers you or you want to move around the close minimize and maximize buttons click Window Decorations in th
450. option seemed the most flexible and optimized solution so I started writing scripts that would automatically install a Linux distribution on hard ware components identify hardware components load the matching driv ers and create configuration files that are optimized for the hardware yet tolerant enough to work around small glitches in the hardware specification This is still an ongoing process because hardware manufacturers nowadays seem to be in a semipermanent fight against common standardization of hardware specification But to my own amazement my solution still seems to work quite well on a great number of machines despite the sheer unlim ited number of hardware configurations and intricacies In 2000 my friends from the LinuxTag association talked me into publishing Knoppix as a publicly available and joinable project They also provided host ing space The idea was to get more feedback and possibly workarounds or code contributions applicable to different computers and exotic hardware components that I had no access to As new versions with added features were released the number of downloads and naturally feedback as well as ques tions to answer grew tremendously Had I known that so many people would find this very experimental project useful and that there is now even an O Reilly book being published about it I would have probably given it a more elaborate name than Knoppix But now it s too late of course
451. or a weekend hack fest or conference Wiki sites can be incredibly useful for creating collaborative documenta tion One of the prime examples of the sheer usefulness of a wiki can be found in its poster child http wikipedia com where people from around the world have collaborated to create a web encyclopedia Wikis don t have 198 Chapter 5 Put Knoppix in Your Toolbox Create a Weekend Wiki to be as large in scope or as permanent though In fact they can be very use ful even for short term events like a small conference that only lasts a few days Instead of building a big web server and web site to document the event you can use Knoppix to create a wiki site that can be built almost as fast as it can be torn down What s more you can easily migrate the data to a more permanent place once the event is done In this hack I will describe how to use Knoppix to build a wiki quickly and easily Install Kwiki The first step is to install the wiki software There are a large number of dif ferent wiki platforms available for Linux and for Knoppix but for this hack I have chosen kwiki http kwiki org for its small footprint ease of use and the fact that it doesn t require a database back end so it s easier to migrate to a different machine Open a terminal and use apt get to install the kwiki software sudo apt get update sudo apt get install kwiki Now create a directory in your home directory to hold all of your
452. or grub from your MBR run knoppix ttypo knoppix sudo install mbr dev hda Replace dev hda with your drive See Also e The install mbr manpage by typing man install mbr in a console Mer Find Lost Partitions 68 If you have ever made a typo when deleting or restoring the MBR you have probably also trashed your partition table Use gpart included on the Knoppix disk to restore lost partition tables OK so you had a little too much fun with the previous hack ignored the warnings accidentally typed 512 when you should have typed 446 and now your partition table is gone Or maybe you accidentally ran fdisk on the wrong drive No problem Just restore from the backup you made before you started You did back up your MBR right Don t worry it happens to the best of us The last time I trashed my partition table I was trying to update grub on my laptop using dd Like an idiot I followed the instruc tions to create a grub boot floppy and applied them to install grub on my laptop s hard drive Overwriting the first 512 bytes of a floppy with the grub boot sector is fine overwriting the first 512 bytes of my hard drive is not I was unable to boot and had no partition table For many people this might have been the time to reinstall but I knew the files and partitions were there I just couldn t get to them If only I had a tool to figure out where the partitions began and ended I could then recreate my partition table and e
453. or instance to copy Gaim settings run knoppix ttypo knoppix cp a mnt hda3 username gaim home knoppix Or drag and drop the directory to home knoppix from a file manager The following table lists some other common applications and the commands to copy their settings OpenOffice org cp a mnt hda3 username openoffice org2 1 home knoppix office The GIMPG cp a mnt hda3 username gimp home knoppix Xine cp a mnt hda3 username xine home knoppix XMMS cp a mnt hda3 username xmms home knoppix Xchat cp a mnt hda3 username xchat2 home knoppix By now you ve probably noticed a pattern in the commands used to copy program settings Most programs use the convention of naming their set tings directory after the name of the program itself If you are unsure of the name of the hidden directory that an application uses before and after run ning an application for the first time check the hidden files in your home directory by typing the following command knoppix ttypo knoppix 1s a home knoppix Any new hidden directories that were created likely belong to that program One program that requires a bit of extra work to import settings from is Firefox While Firefox does create a mozilla directory when it is run the directory containing the actual settings for a profile is inside the mozilla directory and is given a random name that is unique to each user on each machine This is a security measure that prevent
454. orage while a RAID 5 array with three 100 GB drives has 200 GB of space Switching RAID levels normally means a complete backup and restore for the server which requires the temporary use of a fourth drive to store the system while you create the RAID 5 array This of course defeats one of the reasons to consider RAID 5 doubling the storage of a RAID 1 array by pur chasing a single drive With a Knoppix disk you can migrate from a soft ware RAID 1 array to a software RAID 5 array without backing up the system to a fourth disk This hack goes through this migration step by step Here is the hypothetical situation for this migration The complete root par tition exists on dev md0 which is a 20 GB RAID 1 array that spans two 20 GB drives which are dev hdal and dev hdb1 To convert this array to a three disk 40 GB RAID 5 array add a third 20 GB partition at dev hdcl I have already used cfdisk you could use fdisk or other programs as well to create this partition and set it with the fd partition type just like dev hdal and dev hdb1 and Linux automatically detects it as a RAID partition The RAID 1 array can temporarily survive on a single drive and a RAID 5 array can temporarily survive on two drives so you can do something similar to what was done in Hack 77 and disable drives from one array to add them to Chapter 6 Repair Linux 233 HACK 78 HACK 78 Migrate Software RAID 1 to RAID 5 the other then final
455. orce or dictionary attack a large number of passwords Remember if you can do it easily then so can an attacker It is also unfortunately far too common for disgruntled employees to reset passwords before they leave or for friends to become forgetful so becoming adept at several types of password recovery is a key skill to practice There is another branch of password tools that attempt to reset passwords rather than determine the existing password by cracking Whenever feasible you should exhaust the tra ditional cracking options before you attempt the reset tech nique since when the reset method fails you likely have broken your box Probably the most famous password cracking utility is john short for John the Ripper S T D includes it as etc john To see john in action we will set a local password and attempt to crack it First we set a password for the Knoppix user account For practice pur poses choose something simple Cracking is a function of time and choos ing a complex password for practice will just get in your way The commands are as follows knoppix ttypo knoppix su root ttypo knoppix passwd knoppix Merge the passwd and shadow files together with unshadow root ttypo knoppix etc john unshadow etc passwd etc shadow gt crackme txt Let s look at an excerpt of this file root ttypo knoppix cat crackme txt root 0 0 root root bin bash Chapter 8 Knoppix Reloaded 303 HAC
456. org If you have just deleted a file you want to recover turn off the machine now The icat utility works by recovering files from the free space on your drive When you delete a file the system unlinks it and adds that space to the free space on the system but it doesn t actually overwrite that segment of the hard drive with zeros While you can t actually access the file any longer the file still remains until a new file is written over it The longer that system is running the greater the chance that a new file that is written to the drive will be written over that space Use Knoppix for file recovery to unmount the partition you intend to scan and eliminate the risk that new files will be written over the files you are recovering Before you start make sure you have enough storage either on the ramdisk or on another drive for icat to dump the recovered files Use the df com mand to figure out the free space on a drive knoppix ttypo knoppix df h Filesystem Size Used Avail Use Mounted on dev root 3 4M 22K 3 4M 1 ramdisk 418M 5 4M 413M 2 ramdisk UNIONFS 418M 5 4M 413M 2 UNIONFS dev hdc 697M 697M O 100 cdrom dev cloop 2 0G 2 0G O 100 KNOPPIX The h option passed to df displays the file sizes in megabytes and gigabytes where applicable instead of just kilobytes In this example I have 413 MB of free space available on my ramdisk so I can recover deleted files to my ramdisk as long as they don t exceed tha
457. ory Reference the startkde function inside the script that Knoppix uses to copy over KDE settings to see how you can do the same for _fluxbox startkde Play sound playsound if z DONTCHANGE then No persistent homedir copy everything rsync Ha ignore existing etc skel kde Desktop HOME 2 gt dev null Find the startfluxbox function in the script that looks something like this start fluxbox Create automatic Desktop icons mkdesktophdicons playsound GDK_USE_XFT 1 exec fluxbox Then modify it to look like this start fluxbox Create automatic Desktop icons mkdesktophdicons playsound if z DONTCHANGE then No persistent homedir copy everything rsync Ha ignore existing etc skel fluxbox Desktop HOME 2 gt dev null GDK_USE_XFT 1 exec fluxbox Now you can synchronize all of your desktop settings just like with KDE knoppix ttypo knoppix sudo rsync a home knoppix mnt hda1 source KNOPPIX etc skel Chapter 9 Knoppix Remastered 347 HACK 111 HACK 111 Personalize Knoppix Of course if you are using a different window manager you must find its section in the script and modify the rsync command to use its configuration directory instead of fluxbox Disable the Startup and Shutdown Sounds The startup and shutdown sounds that Knoppix makes are useful indicators that the sound card is working However if you want your remastered CD to be quiet
458. ory and copy your files over or otherwise resize the image To resize the image to size megabytes type knoppix ttypO knoppix resize2fs knoppix img sizeM After configuring the loopback file Knoppix creates and formats the loop back file and then copies the full contents of the ramdisk to it When the script finishes you should see a knoppix img file on your storage device To view the contents of the file mount it with the following com mand knoppix ttypo knoppix mkdir temp knoppix ttypo knoppix sudo mount o loop mnt sda1 knoppix img temp Replace mnt sda1 with the path to your Knoppix image then see the con tents of the file at home knoppix temp The next time you boot Knoppix will detect the presence of any of these persistent images on the devices it detects Knoppix will then prompt you for whether you want to use a particular persistent image or not and if so you have the choice of four different options you can enable Home This option points your home directory to the home directory on this persistent image Any changes you make in your home directory will be persistent in this image across reboots It treats the persistent image much like the old mkpersistenthome script on old versions of Knoppix 78 Chapter 3 Tweak Your Desktop HACK Use Your Linux Desktop Settings 27 System With this option Knoppix will use your disk image instead of the ram disk to store any changes made on the system
459. ository given time and testing typically find their way into unstable After using and updating your system these packages should even tually sync up with unstable In the case of packages from other sources you must decide whether to keep these repositories in your sources list file so the packages can be updated or you must decide whether to leave these pack ages at their installed version by leaving out the repository Mer Install Gentoo with Knoppix 44 Installing Gentoo can be an overwhelming and uninviting task because you are limited to a shell interface and the computer is unavailable for tasks during the installation That is of course unless you use the Knoppix CD Gentoo is a Linux distribution that aims to create a system that is optimized for your computer One of the ways it attempts this is by compiling each program from its source code before it installs and providing an automated means to update and install new software by downloading and compiling from the source code Gentoo provides detailed documentation on how to install the distribution but even then the installer can be challenging to newcomers Knoppix makes installing Gentoo a much less painful experi ence The Knoppix hardware detection seems to be more robust and is much more successful than the Gentoo system A Gentoo install involves downloading packages from the Internet so Knoppix provides you with much better support for your particular NIC Furthermor
460. ost Partitions 207 69 Resize Linux Partitions 209 70 Repair Damaged Filesystems 211 71 Recover Deleted Files 214 72 Rescue Files from Damaged Hard Drives 217 73 Back Up and Restore 221 74 Migrate to a New Hard Drive 223 75 Mount Linux Software RAID 225 76 Create Linux Software RAID 227 77 Migrate to Software RAID 230 Contents vii 78 79 80 81 82 83 84 85 86 Chapter 7 Rescue Windows 87 88 89 90 91 92 93 94 95 Chapter 8 Knoppix Reloaded 96 97 98 99 100 101 102 103 104 105 106 107 108 Migrate Software RAID 1 to RAID 5 Add an Extra Drive to a Software RAID 5 Array Mount LVM Partitions Reset Linux Passwords Fix Broken Init Services Repair Debian Packages Repair RPM Packages Copy a Working Kernel Turn a Physical Machine into a VMware Virtual Machine Fix the Windows Boot Selector Back Up Files and Settings Resize Windows Partitions Reset Lost NT Passwords Edit the Windows Registry Restore Corrupted System Files Scan for Viruses Download Windows Patches Securely Knoppix on Intel Macs Master Morphix Educate Yourself with Freeduc Damn Small Linux INSERT Security Here Download Local Area Security Full Protection with S T D Distribute Compiles with distccKNOPPIX Distribute the Load with ClusterKnoppix Analyze Quantian Find GIS Knoppix on the Map TiVo Your Computer Compose Musix Contribute to Knoppix 233 235 237 239 240 243
461. ot envi ronment Or you can open a second root terminal to gain the same results RK If for some reason you forget to copy a file that you need and Package management When you are remastering you will notice that Knop pix is already very cramped for space If you want to add new packages you need to remove some packages to free up space More specific methods for keeping the size down are discussed in Hack 110 but in general simply choose a package that you don t need and run root ttyp1 apt get purge remove packagename This command removes the package along with any configuration files it might have created Once you have freed up some space for new packages update the list of packages on the system with the following root ttyp1 apt get update After you update the list of packages you can add new packages to the dis tribution like you do with any other Debian installation To install a new package try this root ttyp1 apt get install packagename If you are unsure of the name for the package you want to install use the apt cache program to search for the package name by keywords as follows root ttyp1 apt cache search keyword Once you are ready to create a CD based on your changes clear out the cache of packages you have downloaded to conserve more space root ttyp1 apt get clean Before you exit the chroot environment remember to unmount the proc file system with the following
462. ot kit is as damaging as a single lie Just as Baltasar Gracian said A single lie destroys a whole reputation of integrity a single root kit destroys a whole system s integrity If an attacker has root access he has free access to your entire system The result is that you can t trust the informa tion in your system Processes might be hidden files might be hidden and even kernel modules might be hidden Programs like the chkrootkit can scan system binaries for root kits but when chkrootkit is run from inside a rooted system even it might be fooled Advantages to Scanning with Knoppix If you are unsure whether your system is compromised the solution is to scan for root kits from a system that is known to be clean There are advan tages to scanning a system for root kits with Knoppix e Knoppix runs from read only media As long as Klaus Knopper s sys tem doesn t get rooted once a CD image is known to be clean there is no way it can be compromised later This means that even if the version of ps and find are compromised on your system Knoppix s versions are fine e Your OS is powered down This means that any hidden kernel modules or hidden processes are no longer running so you are able to scan the system when it is frozen in time Also this means that no processes are running that can potentially detect that you are scanning the system 174 Chapter 5 Put Knoppix in Your Toolbox Check for Root Kits The
463. other OSes view the manpage for the current list The d option specifies where to save the data grave robber collects and the v option gives verbose output so you can see each step grave robber takes Once the command completes type the following command to exit the screen and get back to a normal prompt root 0 knoppix exit Script done file is mnt hdb1 grave robber output knoppix ttypo knoppix Most of files that grave robber creates are readable only by root so they are simpler to browse if you click K Menu gt KNOPPIX gt Root Shell to open a root terminal Now change to the data directory that you have created to browse through the grave robber output root ttypo knoppix cd mnt hdb1 data root ttypo data 1s body body S command out conf vault icat proc trust If you understand how grave robber organizes the output you have a good point at which to start the analysis Here are a few of the important files and directories 178 Chapter 5 Put Knoppix in Your Toolbox Collect Forensics Data body Contains a database of information of all the files and directories on the drive including md5sums of all of the files permissions user and group ownership and size Here is a sample from the file class host start_time body Knoppix 1089770144 md5 file st_dev st_ino st_mode st_1s st_nlink st_uid st_gid st_rdev st_size st_atime st_mtime st_ctime st_blksize st_blocks 000 mnt hda1 var 61440 352722 16877
464. otocol that s layered on top of the circuit switched GSM or IS 136 TDMA network This permits the use of a packet based data service like TCP IP This hack pairs your cell phone with your computer s Bluetooth adapter and uses your cell phone as a pseudo modem device It s not your father s modem that s for sure No wires needed GPRS connections require either a terminal or cellular connection to your given provider GPRS dynamically allocates bandwidth by the number of available timeslots time period allocated to one call In turn it allocates timeslots based on need and therefore you will get extra timeslots only when it s necessary This provides a very efficient use of the spectrum and has a major benefit over Circuit Switched Data because it doesn t need to allocate a circuit for constant use The theoretical bandwidth limit for GPRS is 172 2 Kbps however this is assuming that you are able to use all eight timeslots for a given cell In reality most providers only let you have two to four timeslots For instance T Mobile gives four RX timeslots and two TX timeslots Chapter 2 Use Your Knoppix Desktop 57 HACK 20 HACK 20 Connect to the Internet with GPRS Bluetooth Parts List You need more than just a Knoppix disc and a computer to get this connec tion to work You must use the following parts A Bluetooth adapter I have the Belkin USB Class 1 Bluetooth adapter I chose this because of its lac
465. ou pass at the boot prompt in Knoppix to change its behavior When talking about cheat codes I m really talking about ways in which Knoppix s hardware detection and support might fail and how to work around such failures By the end of this chapter you should be comfortable with booting Knoppix on a variety of computers and be ready to use the desktop environment HACK 1 Boot Knoppix on a Desktop I remember introducing a friend of mine to Knoppix on a laptop We were at the university library and he couldn t get his wireless card to connect to the library s wireless network with his current Linux distribution We decided to give Knoppix a chance Without using any cheat codes we found that Knoppix booted with full video and sound support and his wireless card was not only detected but Knoppix automatically connected it to the wireless network I certainly hope your experience with Knoppix is as straightforward as my friend s experience If not it will be good to know that these cheat codes are at your disposal They are quite like the can opener on a Swiss Army knife something you don t usually reach for day to day but when you do need it you really need it Boot Knoppix on a Desktop f The common PC desktop is a great place to begin experimenting with Knoppix For a long time Knoppix was released only on CD ROM Over time how ever the space restrictions on a CD ROM made it more difficult for new relea
466. ou should see the default kwiki page This page has links to the main kwiki site where you can read more documentation To create a new page on the wiki just type add the name of the page to the end of the index cgi URL in the browser and hit Enter You will be taken to a new page with an edit win dow open where you can type whatever information you would like to go in that page When you are finished save your changes and you will be taken to the page you have just created Kwiki uses basic wiki shorthand for for matting so for instance to make something bold surround it with To italicize a word surround it with To create a bulleted list type three spaces a and then your bullet point Now that your wiki is ready run ifconfig in a terminal to find out your current IP address and then either publish that IP address directory or if you have a DNS server configured for the event assign an easy to remember hostname to that IP like wiki example com That way everyone will have a simpler time finding the wiki One risk to running the wiki within ramdisk is that if some one accidentally reboots the Knoppix machine the entire wiki will be deleted To safeguard against this set up a per sistent disk image Hack 26 on a USB key and then boot while using that persistent disk image Then if the machine gets rebooted all of the data will still be saved on the key Take the wiki with you Once the event is over you might want t
467. ounts partitions from zero instead of one Rerun update grub to update menu lst with the correct values knoppix tty1 knoppix cd mnt hdas knoppix tty1 hda5 sudo chroot mnt hda5 update grub This example uses mnt hda5 You should of course change this as well as the grub commands to match your root partition Once the program has finished you are ready to install grub to the boot sec tor This doesn t require a chroot environment but you must tell the grub 204 Chapter 6 Repair Linux HACK Kill and Resurrect the Master Boot Record 67 install program to use mnt hdal as your root directory by typing the follow ing command knoppix tty1 knoppix sudo grub install root directory mnt hda1 dev hda Once again change mnt hda1 and dev hda to match your root partition and MBR Now you should be able to restart the computer and see your new grub prompt How to carefully back up and restore the Master Boot Record MBR if g and Resurrect the Master Boot Record The MBR is a 512 byte segment at the very beginning the first sector of a hard drive This segment contains two major parts the boot code in the first 446 bytes and the partition table plus a 2 byte signature in the remaining 66 bytes When you run lilo grub install or fdisk mbr in DOS it writes to these first 446 bytes When you run cfdisk or some other disk partition pro gram it writes to the remaining 66 bytes Writing directly to your
468. our kernel and won t find any matches Next it will try to download drivers and also won t find any matches there Finally it will compile custom drivers off of your included kernel source tree When the drivers have been compiled you will then be asked whether you want the program to change your X configuration Tell it yes and it will make all the necessary changes to use the custom drivers in X When the program exits type init 5 and hit Enter to start up the desktop environment again After X restarts open a console and test whether you have direct rendering enabled knoppix ttypo knoppix glxinfo grep rendering direct rendering Yes You should see dramatic improvements in the performance of programs such as from the terminal output of glxgears and 3D games such as Planet Penguin racer If you have a fast Internet connection you can even down load a 3D game demo such as the Quake 3 demo 45 MB from ftp ftp idsoftware com idstuff quake3 linux and install it locally see Figure 3 6 provided you have enough ramdisk space If you have even more disk space and an even faster internet connection and faster computer you could also try the Doom 3 demo over 400 Mb from ftp ftp idsoftware com idstuff doom3 inux Just run the installer as normal The installer even adds an entry to your K Menu that you can use to launch the game If you use a persistent disk image that includes system files see Hack 26 you can save
469. our Internet connection is up and working Most of the commands you use to remaster the disk require root privileges so instead of typing sudo in front of everything click K Menu gt Knoppix gt Root Shell to launch a terminal with root privileges Choose a Partition Remastering Knoppix requires the use of your hard drive You do not have to use a completely blank unformatted partition but the partition does need to meet a few requirements e The partition must be formatted with a Linux filesystem e If you plan on using the bootfrom cheat code to boot the iso make sure that your filesystem is compatible with bootfrom Currently ext2 FAT FAT32 and NTFS are compatible XFS and JFS are not e If remastering a CD the partition must have at least 3 GB of free space If you have less than 1 GB of RAM and need to create a swap file on the partition more on that later in the chapter you need an extra gigabyte of free space On average I need at least 4 5 GB of free space for my remastering e If remastering a DVD the partition must have at least 14 GB of free space If you have less than 2 5 GB of RAM and need to create a swap file on the partition more on that later you need an extra 2 5 gigabytes of free space If you plan to remaster the files on the KNOPPIX2 filesys tem you will need an additional 5 GB On average I need at least 20 GB of free space for my remastering 25 GB if I change KNOPPIX2 If you need to mo
470. our Knoppix processes proc Similar to the pcat icat directories this directory contains images from running processes but based on the proc filesystem Again this is not too useful when scanning from a corpse trust Contains forward and rhosts files and crontab and at output along with other files related to trusted relationships user_vault Stores copies of sensitive user files such as shell histories ssh keys etc Chapter 5 Put Knoppix in Your Toolbox 179 HACK 57 HACK 58 Clone Hard Drives Computer forensics is a complicated subject that requires a lot of time and experience and is outside the scope of this hack For more information on forensics analysis visit http www cert org For more information on how to use the Sleuthkit tools and the Autopsy front end check out the official page at http www sleuthkit org wars Clone Hard Drives 58 Use dd and partimage on Knoppix to clone hard drives even across the network Cloning entire partitions has long been a time saver for system administra tors Instead of running through the same install process for tens or hun dreds of machines a system administrator can set up a single machine just how he or she wants it and then copy the hard drive image to the next machine saving hours of work Plus a broken machine can be reimaged and back to the factory state in minutes reducing downtime There are many different hard drive imaging programs you
471. ows system installed on your hard drive The next few hacks cover some specialized desktop uses for Knoppix including using it as a kiosk or terminal server With these hacks you can turn a regular computer into a specialized kiosk for your business and then use the terminal server to boot multiple computers all from the same Knop pix disk over the network The final hacks cover different methods Knoppix includes so that you can install software live on the booted disk You can use this to get that extra bit of software that Knoppix didn t happen to include without resorting to remastering the disk The ability to make your Knoppix settings persistent opens a whole world of possibilities for Knoppix as a portable desktop solution With a USB key drive and a Knoppix disk you can boot Knoppix on any machine available to you load your settings from the USB drive and your desktop and your work can follow you wherever you go Use Aufs i Understand how Knoppix merges the ramdisk with the read only filesystem to allow you to treat the filesystem like it was a hard drive Traditionally one of the trickiest parts of running all of your software directly from a CD was the issue of how to deal with the read only nature of the CD itself For a large part of Knoppix s history this issue was handled by creating a ramdisk a section of RAM that is set aside and mounted like a Use Aufs filesystem and then using symbolic links symlink
472. oxy server Next start the Iceweasel web browser and browse to https addons mozilla org firefox 2275 This is the location of the Torbutton plugin which adds a button to the very bottom right of the browser and lets you know whether Tor is enabled Install the plugin and then restart Iceweasel to finish the installation Once Iceweasel restarts click the button on the bottom right of the browser so that it says Tor Enabled and then browse to http efkada eecs harvard edu cgi bin ipaddr pl tor 1 This site will do tests and let you 110 Chapter 3 Tweak Your Desktop HACK Install Multimedia Codecs 39 know whether it thinks you are using Tor or not Often you can tell by going to a site like Google Since some of the Tor servers reside in countries like Germany and Japan when you visit Google through Tor you might get the German or Japanese version of Google Because of the number of servers that your requests have to be routed through and the amount of traffic the Tor servers see your web browsing will possibly be slower than when Tor isn t enabled Think of it as the price to pay for anonymity Install Multimedia Codecs i Grab extra codecs and libraries so you can play just about any kind of multimedia content Knoppix comes with a number of multimedia tools to play video and audio but Knoppix might not be able to play your particular video out of the box This isn t a deficiency in Knoppix itself it s th
473. partition or on its own partition If you re uncertain how your hard drive is partitioned you should still be able to find your home directory without much trouble To start click each hard drive icon on the desktop in turn and see which directories exist within You re looking for a directory with the pattern home yourusername Once you find the partition that has your home directory make a note of how the icon was labeled this is the parti tion name and should be something like hda3 Now that you have identified your home directory the simplest method of importing your user s settings to Knoppix is to copy each application s hid den directory or configuration file Most applications store their user spe cific settings in hidden files in the home directory and importing these settings is as simple as recursively copying the hidden directory to home knoppix Details are provided below for some applications that require a bit of extra work to copy correctly In all of these examples I use mnt hda3 username as the home directory but you will need to change the path to cor respond with the location of your user directory home knoppix or individual configuration directories to your home directory your Knoppix user would not easily have write access to the drive due to the differing user IDs KR While it might seem that it would be even easier to symlink KDE To copy all of your KDE settings correctly including all KDE a
474. pecs for this virtual machine are up to you but realize that you don t necessarily have to match the speci fications of your physical server 100 If you notice that your server is only using a fraction of its current disk space or RAM you can take this as an opportunity to reduce those resources on the virtual machine With the virtual machine created edit its settings so that its CDROM device is pointed to either a Knoppix ISO or an actual Knoppix disk you have in your VMware machine Power on the virtual machine and hit Esc at the VMware BIOS screen so you can tell VMware to boot from the CDROM drive When you see the Knoppix boot prompt you can boot into the full desktop environment if you want but since all of the following steps involve the command line you could also type knoppix 2 to boot into text only mode Once Knoppix boots use a partitioning tool like fdisk or cfdisk to partition your virtual machine s disk to match the partitions you have on the physical machine In this example I will have three partitions dev sdal as my root partition dev sda2 as swap and dev sda3 as my home partition Once the partitions have been created format them either with their appropriate file system or as swap space Then create directories for each mountable parti tion and then mount them sudo mkfs t ext3 dev sda1 sudo mkfs t ext3 dev sda3 sudo mkswap dev sda2 sudo mkdir p mnt sda1 mnt sda3 sudo mount dev sda1 mn
475. pen mail relay which could get your IP block black listed from spam blackhole lists Accept the defaults for all of the remaining options and allow the package to finish installing Once the install is finished open up etc postfix main cf as root and add the following line to the bottom of the configuration file relay domains example com Replace example com with your mail domain you want this server to accept mail for In this example email addressed to for instance johndoe exam ple com would be accepted and spooled by this system If you have more than one domain you want to relay mail for just separate each domain with commas For instance to relay email for both example com and foo com add the following line relay domains example com foo com out being able to deliver them to the primary mail server At that point it will bounce the messages If you want to extend that time in case your primary mail server is still down add the following lines to your etc postfix main cf wR By default postfix will queue messages for three days with bounce queue lifetime 14d maximal queue lifetime 14d Here I have set the maximum queue lifetime to be 14 days but change this to match the maximum amount of time you would like to attempt delivery before bouncing Now save and close the file and start the syslog daemon so you can monitor the mail server Then reload the postfix configuration to accept these changes sud
476. pix Hack 109 as you can have multiple ISOs in a single directory and choose between any of them at boot time This cheat loads from an ISO and not directly from a CD so you aren t restricted by the 700 MB capacity limit of a CD ROM If you are modifying your own Knoppix based distribution and are having a difficult time squeezing it all within 700 MB test your images directly from the ISO without having to worry about the CD size require ments After you boot off of the stored image the Knoppix disk no longer needs to be mounted so you can eject it and use the drive for other tasks You can also use these cheat codes as an intermediate step before fully installing Knoppix to your hard drive Chapter 1 Boot Knoppix 15 HACK 6 HACK 7 i Straighten Out Your X Settings WHE Straighten Out Your X Settings 7 Finely tune X Windows to get the most out of your video hardware and work around hardware detection mistakes Knoppix detects video card and monitor settings pretty well If it can t detect any better settings it tries to at least set up a generic environment for X Even with its excellent hardware detection sometimes Knoppix is unable to detect everything it needs to set up X the way you would like If X won t start up correctly or at all you might be able to get things working with the variety of cheat codes Knoppix provides for X as shown in Table 1 3 Table 1 3 Cheat codes for X settings Che
477. ple the CD was released on January 04 2007 These date stamps indicate the incremental version men tioned earlier After the date stamp there is a language code in this case EN for English Knoppix is a German project and while the default language can be changed with cheat codes Hack 5 at boot time the Knoppix project releases both German and English CDs to save English speaking users from having to enter a language cheat code at every boot English speaking users should download images with the EN language code and German speaking users should download images with the DE language code Everyone else can choose either image and use a language cheat code at boot time Select the latest version of Knoppix by clicking on the filename The 700 MB file can take anywhere from a few hours to a day to download depending on the speed of your broadband Internet connection and the current load of your mirror The 4 GB DVD image will obviously take substantially longer and is recommended only for high speed Internet connections Chapter 1 Boot Knoppix 7 HACK 3 HACK 3 Get Knoppix Once the image is downloaded you might want to confirm that the full file has been downloaded correctly and is an exact copy of the original file An MD5sum is a checksum created from a large stream of data using the MD5 algorithm and is often used to verify that large files downloaded correctly Practically speaking an MD5sum generating program takes yo
478. ports raw monitoring rfmon mode and can sniff 802 11b 802 1la and 802 11lg traffic 158 Chapter 5 Put Knoppix in Your Toolbox Wardrive with Knoppix Kismet identifies networks by passively collecting packets and detecting stan dard named networks detecting and given time decloaking hidden net works and inferring the presence of nonbeaconing networks via data traffic Essentially Kismet is your best friend for conducting a basic site survey to assisting with packet captures This can be very useful for a wide range of things including cracking WEP WPA WPA2 or whatever you re up against Some people find it daunting to use the best wireless networking utility because of the setup People are daunted not by Kismet per se but by the correct drivers the other needed patches to the kernel and the needed user land tools So imagine the ability to boot off of a CD ROM and have all of your hardware not only supported for use but also already configured That s the beauty of using Knoppix and Kismet together Required Wardriving Hardware Wardriving normally requires just a wireless network card However with the addition of a GPS unit you can map your excursions Wireless card Knoppix works with most wireless hardware lve had good experiences with and personally recommend Orinoco Cisco and Senao EnGenius cards This example uses a D Link AirPlus Xtreme G Model DWL G650 USB to serial adapter My lap
479. ppix or whatever you set the password to The new window that appears asks you to choose an SSL setup It is OK to accept the default click Yes to accept the certificate you are presented It s worth noting that you should read the dialog and understand what you re agreeing to For this exercise the default is safe This is not always the case and often it can subvert the very small amount of security SSL cer tificates offer Your connection may be encrypted but who are you connect ing to anyway Always watch SSL certificates carefully Plug in Selection on the nessus Client Some plug ins included with nessus have the ability to crash remote services or hosts These plug ins are disabled by default and you should enable them only if you know what you are doing After you have logged in the Plugins tab will be selected see Figure 5 6 It contains a list of all the categories of plug ins on the nessusd that are avail able to you as a client You can select and deselect entire categories for a given target or network of targets By clicking on each of the categories a list of individual tests is shown in the space below ey The tests with an explanation point in a triangle next to them are tests that may result in damage or destruction of the system in question By default these tests are disabled as noted previously For your first scan it s best to click the Enable all but dangerous plugins bu
480. ppix saveconfig 88 Chapter 3 Tweak Your Desktop Make a Kiosk Make sure that the Personal configuration and the Graphics subsystem settings are checked and then select a floppy disk or a USB drive probably listed as mnt sda1 for the script to save the settings to Once the settings are saved you can take the floppy disk or USB drive to any computer and add the cheat code below to the boot prompt myconfig scan Knoppix loads your kiosk settings and boots directly into the kiosk and then you can take the floppy disk or USB drive to any other computer you want to use as a kiosk Remaster a Kiosk Disk Now that you know how to set up a kiosk you might want to create a remastered Knoppix CD so that your changes are permanent Follow the steps from Hack 109 and stop before you get to Prepare the Source Filesys tem Now create the master directory and then copy all of the files from the CD ROM including the compressed KNOPPIX filesystem root ttyp1 hda1 mkdir master root ttyp1 hda1 rsync a cdrom master Now run the following command root tty1 su knoppix saveconfig Save the settings to the drive that contains your master directory in this case hda1 Then copy the knoppix sh and configs tbz files that the script cre ates to the master KNOPPIX directory If you prefer you can skip this step and go straight to creating the new CD image root ttyp1 hda1 mkisofs pad 1 r J v V KNOP
481. ppix to disable bad services Some Init ial Background Before learning how to disable services it s important to understand Linux s startup process and how Linux determines which programs to run when it starts For most Linux distributions System V init scripts govern which pro grams start at boot and which programs don t All System V init scripts that could potentially be run at boot are typically located in the etc init d direc tory although some distributions place them elsewhere within etc Not every script in etc init d is executed at boot however Linux organizes which scripts to run for different circumstances into runlevels most Linux systems have seven runlevels ranging from zero to six Think of a runlevel as a checklist of programs to start before it presents a login 240 Chapter 6 Repair Linux Fix Broken Init Services A few of these runlevels are set aside for special states in a Linux system Runlevel 0 Halts the system Runlevel 1 Sets up single user mode Runlevels 2 5 Sets up different multiuser modes Although typically only one or two are used by a distribution Runlevel 6 Reboots the system Each runlevel has a directory that stores symlinks to the init scripts in etc init d which are started executed with argument start when that runlevel is selected and stopped executed with argument stop when it is exited While the location of these directories differs a bit across Linux d
482. pplication settings you must make sure that KDE is shut down so that session files aren t added to until after you restart KDE Session files are records of win dow settings and open applications that KDE keeps stored in memory until 80 Chapter 3 Tweak Your Desktop Use Your Linux Desktop Settings it shuts down To do this close all running applications then open up a ter minal window To switch to console only mode type knoppix ttypo knoppix sudo init 2 The KDE windowing environment will disappear and you ll be put back into the command line only console mode Once that s done you ll see a com mand prompt you may have to hit Enter move your current Knoppix KDE settings out of the way temporarily and copy your Linux user s KDE set tings root tty1 mv home knoppix kde home knoppix kde bak root tty1 su knoppix cp a mnt hda3 username kde home knoppix If you make use of a kderc file copy that as well Now restart KDE to be presented with your Linux user s normal KDE desktop root tty1 init 5 If you are content with the current settings free up space by deleting the backup kde bak directory that you have created If you want to switch back to how the KDE desktop was before switch again to console only mode knoppix ttypo knoppix sudo init 2 Then remove your new KDE settings restore your old KDE settings and start the KDE desktop back up root tty1 xm rf home knoppix kde
483. q gt abiword lt packagereq gt lt packagereq gt xfce4 lt packagereq gt lt packagereq gt mozilla firefox lt packagereq gt lt other goodies here gt lt packagelist gt lt group gt lt comps gt Seems simple doesn t it The actual template for LightGUI is quite a bit longer it contains more packages in the lt packagelist gt section and contains a package to start xfce4 at boot time but it s very simple to specify which repositories you want to use which Debian suite you want which type of Morphix module you want to auto build and naturally the packages you want Currently MMaker can build only base and main modules Chapter 9 Knoppix Remastered 357 HACK 115 HACK 116 Change the Default Language on an ISO Image A few tags might need some extra explaining lt repository gt With this tag you define the Debian repository to build your module from Use the type plain attribute when you have a repository with out separate suites You can verify this by checking the repository If it has a Packages file in the root directory of the repository we call it plain Normal Debian style repositories are the default lt type gt Mainmod or basemod Minimod templates are in development a sepa rate minimodule generator was constructed before MMaker It would actually be fairly easy to even have a Knoppix type lt suite gt Sid sarge woody or unstable testing or stabl
484. r consistency errors and if any are found it prompts you before it attempts to repair them For all of the following examples be sure that the filesystem you are scan ning is not mounted You must always run fsck under sudo in Knoppix because the filesystems require root permissions to modify anything Ext2 Ext3 For ext2 and ext3 filesystems the filesystem repair tool is fsck ext2 or e2fsck To scan and repair a filesystem simply run knoppix ttypo knoppix sudo fsck dev hda1 Replace dev hda1 with the partition you want to scan If you want a nifty progress bar add a C option If there are multiple filesystems you want to check you can list them one after another on the command line ReiserFS ReiserFS filesystems are repaired using the fsck reiserfs or reiserfsck tools Reiserfsck performs many levels of filesystem checking and repairing and reports different error codes based on the problem at hand First check the filesystem for errors with the following command knoppix ttypo knoppix sudo reiserfsck check dev hda1 212 Chapter 6 Repair Linux Repair Damaged Filesystems Replace dev hda1 with the partition you want to scan By default reiserfsck outputs all progress to STDERR you should see the output on the console but if you want it to output to a file instead use the logfile option If reiserfsck exits with a status of 0 then it hasn t discovered any errors If it exits with a status of 1 an
485. r your tuner United States residents should choose NTSC and whether you receive TV through broadcast or cable so that xawtv can correctly scan for all of your channels Once the configuration process is completed xawtv will load and you will be able to watch television If you want to turn a computer with a TV tuner card into your own personal TiVo check out TiVo Your Computer Whether you want to listen to or edit music watch movies or TV or create CDs Knoppix comes with the multimedia tools you need along with the hardware detection to get you started Remember that if you only want to listen to music files on your computer you don t need to change to write mode on your hard drive simply browse to the file you want to play and click it Keeping your drives in read only mode under Knoppix unless you must write to them adds an extra layer of protection in case you turn off your computer or lose power without properly shutting down Connect to the Internet Knoppix comes with many different options to connect it to a network with dial up Ethernet wireless PPPoE and other types of connections Before you can take advantage of the many Internet applications Knoppix has you need to actually connect to the Internet Knoppix comes with sup port for many different types of Internet and network connections includ ing dial up standard network connections you might find with DSL or cable Internet services ADSL PPPOE connections
486. randomly generated password expires after an hour so any new con nections after that point require creating a new invitation To remove an invitation before it expires click Manage invitations on the main Desktop Sharing Wizard screen to see all current invitations along with options to delete them and create new invitations The Desktop Sharing Wizard makes sharing your current KDE desktop pretty easy even for people new to VNC or Linux and it is simple to explain to users over the phone or through email With all of the different remote desktop protocols Knoppix supports along with the fact that it includes a simple method to share its own desktop you might find it worthwhile to hand out an emergency Knoppix disk to friends or clients for those times when you need to do some quick technical sup port but are unable to physically be there If a client has a network of machines that needs support you can use the desktop sharing feature of Knoppix to connect remotely to a machine on the network booted off of Knoppix and then use that machine as a remote command center to con nect to the rest of the machines within the network This allows you to sup port all of the machines from a single remote connection i My Run X Remotely with FreeNX 47 Use FreeNX to connect to a remote desktop that s responsive even over a slow dial up connection FreeNX is an implementation of Nomachine s NX server NX server gives you a fast responsi
487. ration and Preferences The Administration submenu contains programs to change system settings such as networking print ing and package management The Preferences submenu gives you access to change desktop settings such as backgrounds themes and screen resolution Apart from these menus the rest of the desktop behaves in much the way you might expect Double click icons on the desktop to open them and drag and drop files to and from the desktop just like you might with any other desktop environment One downside to all of these alternative desktop environ ments is that there is no easy access to the KNOPPIX menu that contains all of the Knoppix specific programs includ ing the tool to switch desktops To access the tool to switch desktops once you are in one of these desktop environ ments open a terminal and type usr sbin restartx Become Root The fact that Knoppix disables root by default can be confusing if you are new to Knoppix Learn some of the different ways you can become root under Knoppix A common question among new Knoppix users is How do I run a program as root By default Knoppix disables the root account completely To run programs as root you use the sudo program You might notice that many 70 Chapter 2 Use Your Knoppix Desktop Become Root commands in this book are prefaced by the sudo command That means they require root permissions When in a terminal type sudo in front of any c
488. rdware working Unfortunately many of the other configuration files in etc such as network settings are specific to either Debian or Knoppix so you won t be able to reference those files with out making some changes to suit your system but at least you now have a good start in getting the hardware to work i 62 Add Knoppix to Your PXE Boot Environment With a few tweaks you can add Knoppix to your existing PXE boot environment and boot Knoppix on PXE capable machines without a CD Knoppix comes by default with the capability to create a pxelinux PXE server so multiple machines on the same network can boot Knoppix over that network with only one CD In Hack 31 ve covered the steps required to enable that feature but what if you already have a pxelinux boot environ ment Many companies use PXE booting to allow servers on the network to boot into kickstart or other installation or imaging programs If you use Knoppix to rescue systems wouldn t it be handy if you could just leverage that same PXE infrastructure to boot Knoppix without carrying a CD around all the time Since Knoppix already comes with PXE server capability the majority of the work in this hack will be adapting the configuration files it has created to your environment For starters boot Knoppix on a network isolated from any DHCP or PXE server so it won t conflict and then follow the steps in Hack 31 to start the PXE server 194 Chapter 5 Put K
489. re are however a few limitations when using chkrootkit with Knoppix Knoppix is running chkrootkit from a system that has been rebooted so chkrootkit can scan only files on the system not anything in memory Also chkrootkit is a signature based scanner That means that it looks for certain fingerprints popular root kits are known to have If an attacker wants to evade detection she could simply change the root kit so that its signature differs from the one on chkrootkit Got Root Using Knoppix to scan a system for root kits is pretty straightforward Iden tify and mount the partitions you want to scan by clicking the hard drive icons on your desktop You don t need to mount the partitions as read write for scanning Once you have identified the partition to scan open a termi nal and type knoppix ttypo knoppix sudo chkrootkit r mnt hda1 ROOTDIR is mnt hda1 Checking amd not found Checking basename not infected Checking biff not infected Checking chfn not infected Checking chsh not infected Checking cron not infected Checking date not infected Checking du not infected Checking dirname not infected Checking echo not infected Checking egrep not infected Checking env not infected Checking find not infected Searching for suspicious files and dirs it may take a while mnt hda2 usr lib j2re1 4 2 systemPrefs mnt hda2 usr lib j2re1 4 2 system
490. released under the same licenses as Knoppix and is avail able from http opendoorsoftware com At this writing v0 1 3 is Disctc cKNOPPIX s available version Future features include a boot manager to manage some options such as default compiler versions server notifica tion upon boot and better network detection See Also e The distcc home page at http distcc samba org James Michael Greenhalgh Mer Distribute the Load with ClusterKnoppix M103 ClusterKnoppix is a live CD distribution that takes advantage of the openMosix cluster technology to turn any room full of computers into a makeshift openMosix cluster Clusterknoppix http bofh be clusterknoppix combines the functionality of openMosix with the ease of use of Knoppix It contains an openMosix ker nel and the openMosix userspace utilities along with various other tools for monitoring and manipulating the cluster like openMosixview http www Chapter 8 Knoppix Reloaded 315 HACK 103 Distribute the Load with ClusterKnoppix openmosixview com It is meant to be a bootable CD that demonstrates the possibilities of openMosix hard disk installation isn t really supported The CD runs like the normal Knoppix CD The only difference is that it starts openMosix the openMosixcollector from openMosixview and sshd What openMosix Is The openMosix project http openmosix sf net describes openMosix as A Linux kernel extension for single system image cl
491. rent home directories for your live CDs take a look at CD Persistant a minimodule that even allows you to burn your home directory directly to a running live CD using multisession CD ROMs or Xbroadcast which attempts to locate remote XDMCP hosts on your local network Needless to say minimodules offer an extreme amount of flexibility maybe even too much For this reason the following three directories for applying changes to your live CD during boot time have become a part of Morphix over the last year No more do you have to rebuild your compressed images for small changes exec If you simply want to start a few bash scripts at boot time this directory is the place to put them Knoppix gives you a single file to be executed at boot time Morphix gives you a directory copy Using translucency the overlay technique in Morphix you can place files anywhere on the filesystem This is of course handy for minimod ules but also for more simple purposes Place a file in copy etc and it is placed in etc of your live CD Place a file in copy usr local and it is placed in usr local Morphers being a lazy bunch enjoy using copy for quick hacks deb If your mainmodule supports dpkg which means it is Debian based put a Debian package in this directory and the package is installed at boot time Because this uses dpkg directly you must make sure you han dle your own dependencies for any packages you add here As installing D
492. rent versions of Microsoft Word and can even export a file to PDF Writer like all of the programs in the suite saves files in an open XML based format that takes up very little space Chapter 2 Use Your Knoppix Desktop 39 HACK 14 HACK 14 Get Office Work Done To launch Writer click K Menu gt Office OpenOffice org OpenOffice org Writer You can also browse through your filesystem and click on any documents with file formats that Writer supports such as doc OpenOffice org s legacy sxw format and the new OpenDocument odt format and Writer will launch and open them Though OpenOffice org s launch time is shorter than it used to be it still takes some time to load especially from a CD Once loaded you are presented with a blank document as shown in Figure 2 5 untitled1 OpenOffice org Writer File Edit View Insert Format Table Tools Window Help Bano b Ha CM teed gt GeV t e519 BD Defaut Nimbus Roman Noo L 100 INSAT STD HYP Figure 2 5 OpenOffice org Writer Surrounding the document you can see multiple toolbars much like those in other word processors These toolbars let you bold italicize colorize and configure other aspects of the text control alignment insert figures and insert bulleted lists After you have created or edited a document click File gt Save As to select from a number of document formats including multiple versions
493. repeat them here because by the time you have read this book the procedure will likely be dif ferent Once you have installed the klik client a new window opens to the klik software repository and you can start installing software from there For example to install xvier a simple little game click on the xvier link Notice that the URL of the link is klik xvier You can easily remember a 104 Chapter 3 Tweak Your Desktop Point and Klik to Install Applications klik link and also email it to friends or post it to discussion boards Click on the link with Firefox or Konqueror and the klik client begins to download and install the xvier software along with any dependencies You can also enter klik links into the Run Command window Click K Menu gt Run Command or press Alt F2 Once the download is complete klik automati cally runs the software and places a new entry into the KDE start menu Depending on the speed of your Internet connection you should have xvier up and running in a few seconds When you install software with klik the application and all additional soft ware that it needs to run libraries help pages icons and so on are placed within a single file per application on your desktop Xvier for example is installed to Desktop xvier cmg The cmg suffix stands for compressed application image which can be roughly compared to an ISO image for a single application This concept makes it extremely e
494. rmation is displayed in the pane below Near the top of the screen are a few buttons that correspond to the main actions you ll want to perform when using Synaptic described next Reload the Package List In Knoppix and most modern distributions packages reside in what are known as package repositories These repositories allow different types of packages to be kept together in a central place As a user this means that you don t need to search around on the Internet to find a program you just find the program in the package manager and it retrieves that program s package as well as any other packages that program needs from the appro priate package repositories Knoppix uses Debian s package repositories Chapter 3 Tweak Your Desktop 107 HACK 37 Install Programs to the Live Disk Mr Synaptic Package Manager 2 Y DI 8 Reload MarkAll Upgrades Apply Properties Search pi Own Base System 0 1 1 Communication aalib bin 1 4p5 22 Cross Platform ace of penguins 1 2 8 A o Communication non free aalibl 1 4p5 28 Bo Development neni nna Development non free Documentation No package is selected Editors Email GNOME Desktop Environment Games and Amusement Graphics Graphics non free gt Sections Status Search Results Custom Filters 348 packages listed 1343 installed 0 broken 0 to instal upgrade 0 to remove
495. rminal and shred the drive sudo shred n 2 z v dev hda1 Replace dev hdal with the partition you intend to shred or with dev hda if you also want to erase the partition table and boot sector The n option tells shred how many times to write over the drive with random data The default is to write over the drive 25 times If time is not an issue or you are paranoid feel free to stick with the default The z option tells shred to fin ish the wipe by overwriting the drive with zeros This makes the partition look completely empty to a casual observer instead of filled with random ones and zeros Finally the v option shows you shred s progress which is one of the main advantages to use shred to wipe drives instead of dd The time it takes shred to complete varies greatly depending on the number of times you choose to overwrite the drive and the size and the speed of the drive The nice thing about using Knoppix for drive wiping is that you have a lot of applications you can use to pass the time check out Hack 17 for a good selection Chapter 5 Put Knoppix in Your Toolbox 185 HACK 59 HACK 60 i Test Hardware Compatibility Mer Test Hardware Compatibility f 6 0 Knoppix s hardware detection has a reputation for being just about as good as it gets under Linux Use your Knoppix disk to test the Linux hardware compatibility of desktops laptops and peripherals Knoppix openly tells you what it knows a
496. rowse for and connect to Windows files set to be shared over a network If you are used to browsing network file shares under Windows learning how to browse them under KDE might seem like a black art Under Knoppix the issue is aggravated by the fact that Knoppix does not automatically configure LISa KDE s LAN information server to work beyond the local machine Luckily it takes only a few steps to get net work browsing up and running First reconfigure LISa so it scans for all fileshares on your network Click K menu gt Control Center to start the KDE Control Center When the KDE Control Center opens click Internet Network gt Local Network Brows ing select the LISa Daemon tab and click Setup Wizard If your network is already correctly configured either by Knoppix automatically or by you manually the guided setup should provide you with all of the correct defaults however if you are presented with the choice of which network interface is connected to your LAN choose the interface that isn t labeled lo as that is your local loopback interface Just click Next through all of the options and then click Apply at the bottom of the screen to save the changes 138 Chapter 5 Put Knoppix in Your Toolbox HACK Create an Emergency Router 49 With the new settings in place start the LISa daemon knoppix ttypo knoppix sudo etc init d lisa start Starting LAN Information Server lisa Now click K Menu gt Home
497. ry contains many different card games including Solitaire and Freecell Many of these games also support playing against opponents over the Internet adding a new dimension to old favorites For those who find brainteasers fun the puzzles and strategy categories have plenty of programs to exercise your brain The puzzle games range from Gtans which has you rearranging and rotating shapes to match the given pattern to Minesweeper a requirement in any complete set of puzzle games In the tactics and strategy category you find logic games such as KAtomic and KSokoban as well as battle strategy games as simple as KBattleship a clone of the classic Battleship game You will also find Xbattle which lets you and an opponent set up many different battle scenarios with varying ter rain army size and many other options and then lets you control troop movements to see which team comes out as the victor A special category has been created for Tetris style puzzle games and on the DVD you will find Frozen Bubble a Bust A Move clone with a penguin motif see Figure 2 10 With so many game choices it is easy to find an escape from work that is suited to your tastes With a few exceptions most of these games run fine without having an advanced 3D graphics card so you can have fun even on older systems If you aren t familiar with some of the games most of them come with a complete help section which describes objectives and key bind ings
498. ry mail server When the primary mail server comes back online it will then deliver all of the mes sages it has saved If you have a somewhat small organization you might not have had a chance to create a backup mail server or perhaps your backup mail server is straining under the additional load In either of these circum stances properly armed with a Knoppix disk you can create an emergency backup mail server in only a few steps Assign Storage The first step is to answer the following questions e How long is the primary mail server expected to be down e How much mail do I expect to be saved on this system e How much storage space will all of this mail consume When you host a mail relay on a bootable disk that uses ramdisk for stor age your storage for mail is only as large as your RAM If you go through 300 MB of email a day and the main mail server could be down for two days you should have at least 600 MB of storage on your backup mail server and actually substantially more just to play it safe If you only have a small amount of mail running through your system then you might be able to get by with ramdisk storage Otherwise you need to supplement the ram disk with additional storage The catch is that you need a Linux filesystem like ext3 on this extra storage If you have a hard drive on the system with a Linux filesystem on it mount the drive read write create a directory to store 150 Chapter 5 Put Knoppix in
499. s e Put older hand me down machines unable to run the newest and great est commercial OS to use for Linux The first two Quantian releases were based directly on Knoppix Since then ClusterKnoppix has provided the basic building block which similar to Knoppix itself provides various utilities games multimedia applications a 322 Chapter 8 Knoppix Reloaded Analyze Quantian complete KDE environment with its window manager a browser an office suite a development environment and editors as well as a large number of other general purpose tools utilities and diagnostic applications Quantian then adds various sets of applications from different areas Mathematics Computer algebra systems Maxima Pari GP GAP GiNaC YaCaS and Axion matrix oriented languages Octave with octave forge matwrap and octave epstk packages Yorick and Scilab and the TeXmacs frontend Statistics GNU R with hundreds of packages from CRAN and BioConductor as well as Rmetrics JGR Ggobi and ESS tools Xlispstat Gretl PSPP and X12A Bioinformatics BioConductor packages for R BioPython and BioPerl and tools like clustalw ncbi and blast2 Physics CERN tools like Cernlib Geant PAW PAW 4 Scientific and Numeric Python and the GNU GSL libraries Visualization and graphics OpenDX Mayavi Gnuplot Grace Gri plotutils and xfig Finance Software from the Rmetrics and QuantLib projects Programming languages C C Fortran
500. s Containing PPP PPPoE ADSL DHCP FTP SSH SCP VNCviwer and Rdesktop Networking services Containing SSH SCP web FTP and NFS servers Hardware support Containing USB PCMCIA generic and GhostScript printer support and wireless networking The DSL also includes games and a host of command line utilities Getting all of these applications in an ISO that is under 50 MB requires quite a bit of planning because all the programs need to be light but also useful and functional After putting so much effort and time into DSL I am uncomfortable calling it a Knoppix hack I view DSL as a fine tuned micro distribution that is built on the base of Knoppix and utilizes Knoppix s superb hardware Chapter 8 Knoppix Reloaded 283 HACK 98 HACK 99 INSERT Security Here detection and compatibility and base operation processes However in other aspects DSL works quite differently from Knoppix I along with other contributors keep a keen eye on size and speed in every application choice and we have an extensible module system so users can easily add only the applications they want DSL is highly efficient It has run successfully on a 486DX2 processor and on only 16 MB of RAM Because it is a solid frame work several projects have been based on Damn Small at the time of this writing there are at least 17 custom made distributions based on DSL that are listed at http www damnsmalllinux org relatives html See
501. s Units cylinders of 16065 512 8225280 bytes Device Boot Start End Blocks Id System dev sda1 1 16 128488 fd Linux raid autodetect dev sda2 17 4393 35158252 fd Linux raid autodetect dev sda3 4394 4462 554242 82 Linux swap Solaris Command m for help q In this example you can see that I have two different software RAID parti tions dev sdal and dev sda2 which I use for two different RAID devices but it s more likely that you will have just one Linux RAID autodetect parti tion per disk Once you have identified which drives compose your RAID array make sure the md kernel module is loaded and then assemble your RAID array For instance if you were to assemble a RAID1 array that spans dev hdal and dev hdb1 you would type sudo modprobe md sudo mdadm assemble auto yes dev mdo dev hda1 dev hdb1 If you had a RAIDS array that spanned dev hda1 dev hdb1 and dev hdc1 you would type sudo modprobe md sudo mdadm assemble auto yes dev mdO dev hda1 dev hdb1 dev hdc1 I specified dev md0 here as the name of the array but if you have more than one array to create just increment that to dev md1 dev md2 etc for each new array you assemble Once any arrays have been assembled you can look at the proc mdstat file to check on their current status At this point you can treat dev md0 like 226 Chapter 6 Repair Linux HACK Create Linux Software RAID 76 any other partitio
502. s gt Start KNOPPIX Terminal Server to start the Terminal Server Wizard The configuration window gives you the options to set up start and stop the server Choose setup and then choose your network card from the list of network devices that Knoppix detects For machines with more than one network card you must be aware of which network card is connected to the same network as the clients The next window asks you to enter the range of IP addresses for the termi nal server to use In general the default is fine In the next window as shown in Figure 3 3 check all of the network card modules your clients are using The most commonly used modules are preselected so if you are unsure go with the default If you don t know the network modules used by a client boot the Knoppix CD from the client and then run lsmod from a ter minal to find the network card module in the list that Knoppix has loaded Choose specific terminal services options from the next window The default selections are secure which disables root access on all of the clients masq IP masquerading and forwarding and dns nameserver cache and proxy If you want to enable a transparent proxy for all web traffic also check the squid option although note that it uses an extra 40 MB of RAM on the server The NX ThinClient option is covered in Hack 32 and is dis abled by default Next choose any special cheat codes you want to use on the
503. s kernel supports software RAID and that it has the mdadm package installed In addition you will need to create an etc mdadm mdadm conf file One of 228 Chapter 6 Repair Linux Create Linux Software RAID the easiest ways to do this is to run a special mdadm command to dump all of the information about the arrays you have created into Knoppix s sample mdadm conf file then copy that file to your system in this example my root partition is on dev hda1 sudo mount o rw dev hda1 mnt hdai sudo sh c mdadm detail scan gt gt etc mdadm mdadm conf sudo mkdir p mnt hda1 etc mdadm sudo cp etc mdadm mdadm conf mnt hda1 etc mdadm building your own kernel make sure that Multiple devices driver support is enabled as are the different RAID modes you want to use in the Multi device support section RK Most vendor kernels support RAID by default If you are Once you boot the Linux system without Knoppix check proc mdstat to see if an init script installed by your distribution has automatically started the RAID for you If the RAID hasn t been started run root ttyO root mdadm assemble auto yes scan If your kernel supports software RAID autodetection check the Multi device support section in your kernel configuration you can configure these partitions to be automatically detected by Linux as it boots To do this unmount the RAID and stop the array with root ttyO root umount d
504. s to point to areas where you might like to write like home knoppix and certain configuration files in etc inside this ramdisk This setup worked but there were still a number of problems For instance the usr directory was completely read only This meant that you could not install extra software to the live CD like you could with an installed CD There were solutions to be sure but they all involved hacks with complicated series of symlinks and in some cases rewriting libraries to point to new locations with the result being that only a subset of Linux programs were able to be installed this way Starting with Knoppix 3 9 a new system was added called UnionFS that eventually was replaced with the stabler Aufs hitp aufs sf net Aufs which stands for Another UnionFS is an improvement on the UnionFS idea which is namely to mount multiple filesystems on top of each other For Knop pix this means mounting the read write ramdisk on top of the read only root filesystem Whenever you write to the filesystem Aufs copies the file that is on the read only part of the media to the read write portion When you access the file again you get presented with the version you edited It does all this behind the scenes so you don t have to worry about where your files are actually being stored Aufs takes care of it all for you How Knoppix Uses Aufs A quick look at the mount points on a Knoppix CD will reveal how it uses Auts mou
505. s with icons along the top to compose new mail check for new messages and delete messages Icedove also comes with its own Bayesian spam filter The Baye sian algorithm Icedove uses learns from the spam you alert it to and gets better at identifying new spam as you continue to use it To teach the filter Chapter 2 Use Your Knoppix Desktop 63 HACK 21 HACK 21 Explore the Internet select any spam you receive and click the Junk icon along the top of the win dow Icedove also supports news servers from the same client and is configured much the same way as a mail service To add a news service click Edit gt Account Settings and click Add Account to start the same account wizard you saw the first time you ran Icedove Enter the new settings that your ISP has provided you and a news account will show up on the left sidebar allowing you to subscribe to and read newsgroups Instant Messaging and IRC For all your instant messaging needs Knoppix has included Gaim Gaim started as a Linux client for the AOL Instant Messaging service extra plug ins have now given it support for other instant messaging networks includ ing ICQ Jabber MSN Yahoo and even IRC Through Gaim s simple interface you can connect to different messaging networks and manage multiple instant messaging accounts and buddy lists While Gaim s IRC support is excellent Knoppix also includes a complete standalone IRC client called XChat To vi
506. s a malicious script from easily target a known settings directory If you simply copy the mozilla directory to home knoppix you will discover Firefox ignores your settings To copy the settings properly identify the random directory name Firefox used for your settings by running Firefox at least once under Knoppix After you run Firefox the settings directory appears under home knoppix mozilla firefox xxxxxxxx default with xxxxxxxx being replaced with ran dom characters Here is an example 82 Chapter 3 Tweak Your Desktop HACK Use Your Windows Desktop Settings 28 knoppix ttypo knoppix ls home knoppix mozilla firefox default 3d4ef4xp default Find the same directory for your Linux user under mnt hda3 username mozilla firefox yyyyyyyy default As an example here is the output for my Linux user knoppix ttypo knoppix ls mnt hda3 greenfly mozilla firefox default 71bog7h1l default Once you have identified both directories copy your Firefox settings with the command knoppix ttypo knoppix cp a mnt hda3 username mozilla firefox yyyyyyyy default 1 home knoppix mozilla firefox xxxxxx default Replace yyyyyyyy and xxxxxxxx with the directory names you have found Now you can start Firefox or Iceweasel and your bookmarks mail and news settings and all other settings should appear If the version of Firefox installed on your machine differs from the version installed on Knoppix you may find
507. s change after they are copied Boot the server into Knoppix and since these steps are all performed from the command line you can boot with knoppix 2 to go directly into text mode This step requires that Knoppix be connected to the network so if your network does not automatically hand out an IP address to the virtual Chapter 6 Repair Linux 249 HACK 86 HACK 86 Turn a Physical Machine into a VMware Virtual Machine machine via DHCP you will need to configure the network manually before you proceed As Knoppix boots on your physical server it should automatically detect any partitions on your server and create mount points for them If it doesn t create directories under mnt for each of your partitions as in the above example and then mount each of the partitions In my example my physical server is similar to the virtual machine I created and has a root partition under dev sdal and a home partition under dev sda3 sudo mount dev sda1 mnt sda1 sudo mount dev sda3 mnt sda3 Now set a password for the root user and start the SSH service on the physi cal machine so that the virtual machine can rsync to it sudo passwd sudo etc init d ssh start Now your physical server is set up and ready for the final sync Move back to your virtual machine to perform the final sync This uses a similar com mand to the one above only it adds a delete parameter so that any files that were deleted on the physical mach
508. s computers but also on Intel based Macs Let s face it A lot of people like Apple Macintosh computers but fixing them when something has gone wrong can prove to be problematic There are methods to boot from an OSX installation CD to repair a broken sys tem as well as various third party methods and mini OSes that can be use ful Unfortunately all of those methods can be painful and are far from what you may know as a Linux or Knoppix user that is until recently With the advent of the newer Intel based Apple gear it s now possible to run Knop pix on a Mac computer Why run Knoppix on a Mac For all the other rea sons you d run Knoppix on a PC of course The following has been tested on an Intel based Mac Mini using Knoppix 5 1 1 It should work similarly on any other Intel based Mac Do not try this on a PowerPC based Mac it will not work Here is what you ll need e An Intel based Mac e The Apple BootCamp software e Knoppix 5 1 1 e This book naturally e A desire to experiment or a need to fix something Chapter 7 Rescue Windows 273 HACK 95 Knoppix on Intel Macs Now that you ve got all your materials let s get started First you ll need to download and install the Apple BootCamp software This software allows the Mac to boot and install Microsoft Windows but we ll use that function ality to boot Knoppix instead As of this writing you can download BootCamp from Apples site at
509. s in this text Histori cally a hacker is a complimentary term for someone who hacks about with code as an intellectual challenge or the bet terment of the whole A cracker on the other hand is a more precise term for the illegal side of hacking In simple terms every time you hear the press referring to a hacker what they actually mean is a cracker The vast majority of people on the planet have no clue of the distinction and will simply not understand you if you use the term cracker We advocate that you use the popular term hacker to save confusion as we have done here All through time words change mean ing based on popular usage and we predict this will be one of them Further Reading http en wikipedia org wiki Fluxbox e http en wikipedia org wiki Hacker_definition_controversy Authentication Authentication has rightly been called the foundation of all security User names and passwords are by far the most common authentication method and even the most technically illiterate user is accustomed to them Being so commonplace we tend to forget the importance of proper authen tication After all lacking artificial intelligence authentication is the only method a computer has of telling different users apart Aside from the standard Linux PAM etc passwd and etc shadow S T D also includes FreeRADIUS an open source RADIUS server RADIUS Remote Authentication Dial In User Service is used as a reference data
510. s to match this machine if necessary Once you have your files and configuration copied over running Apache is as simple as sudo etc init d apache start You shouldn t notice much of a performance hit for running off of the CD because most of the site is running from ramdisk and Apache itself runs completely from memory once it is loaded However there is less RAM to use overall because of the ramdisk Knoppix creates Chapter 5 Put Knoppix in Your Toolbox 149 HACK 51 HACK 52 Make an Emergency Mail Relay With this functionality you can easily turn some desktop machines into mirrors of your web site or possibly even emergency replacements for the site while you change out hardware or perform software upgrades The nice thing about using Knoppix for your emergency web server is that you can run it on top of any PC regardless of OS installation When you are done you can just log out and reboot the machine and no one will know the difference When your main mailserver is down use Knoppix to queue up mail until it is back up 52 Make an Emergency Mail Relay Email is one of the oldest and most widely used services on the Internet If you manage your own email servers you certainly can relate to the stress involved when a crucial mail server is down A backup mail server comes into play specifically when the primary mail server goes down Its job is to receive and save mail and continually poll for the prima
511. s two new options bs and count The bs byte size option tells dd to input and output 512 bytes at a time and the count option tells dd to do this only once The result of the command is that the first 512 bytes of the drive the MBR are copied into the file If for some reason you only want to back up the boot sector although it s wise to always back up the partition table as well replace 512 with 446 Now that you have backed up the MBR copy it to a safe location such as another computer or a CD ROM table so it gets out of sync whenever you change partitions on your drive If you back up the full MBR be sure to update your backup whenever you make partition changes RK The full 512 byte copy of the MBR contains the partition Kill the MBR Now that you know how to back up you should know how to totally destroy the MBR To do this simply use the same command you use to back up an MBR but replace the input file with dev zero and the output file with the drive overwriting each byte of the MBR with zero If you only want to blank your boot code type knoppix ttypo knoppix sudo dd if dev zero of dev hda bs 446 count 1 To clear the complete MBR including the partition table type knoppix ttypo knoppix sudo dd if dev zero of dev hda bs 512 count 1 While blanking the partition table in effect prevents you from accessing files on the drive it isn t a replacement for proper wiping of the complete drive because the fil
512. same network You will need to create a copy of all of the files on the Knoppix CD what Knoppix mounts as cdrom to a directory on your NFS server then export that directory so that any machines that might boot over the network can mount it read only If you want some clues on how to do this you can reference the etc exports file that Knoppix creates when you configure it as a PXE server Just keep in mind that it will export its cdrom directory but you will likely store the files in a different directory on your NFS server For example let s assume that your NFS server has an IP of 192 168 1 5 and you want to allow Knoppix to be PXE booted from any machine with a 192 168 1 x IP address On the NFS server create a directory called mnt knoppix that will share the Knoppix files root 192 168 1 5 mkdir p mnt knoppix Then from the booted Knoppix system rsync all of the files from the cdrom directory to mnt knoppix knoppix Knoppix sudo rsync av cdrom 192 168 1 5 mnt knoppix The rsync method will require that you are able to ssh to your NFS server as root If you have disabled that option you could simply put a copy of the Knoppix disk in your NFS server s optical drive mount it and then rsync from the mounted disk into mnt knoppix Then edit the etc exports file on the NFS server and add an entry to share the mnt knoppix directory mnt knoppix 192 168 1 0 255 255 255 0 ro Finally have your NFS serv
513. sed on Debian it also comes with a full set of tools to manage and change Debian packages Knoppix is over 90 pure Debian packages and if you install Knoppix to your hard drive you will find that the programs and utilities are installed where they would be on a regular Debian system It might not then surprise you to know that Knoppix comes with many of Debian s packaging tools and is an excellent rescue disk for fixing Debian specific problems This hack describes how to downgrade a broken package that is stopping you from booting fix a broken dpkg package and perform a few other Debian specific fixes Knoppix includes the Debian dpkg tools dpkg dpkg buildpackage dpkg reconfigure and dpkg source With these tools you can rescue a Debian sys tem that might not boot because of a broken package or corrupted install For instance if the modutils package containing useful utilities such as modprobe and insmod is corrupted your system cannot load modules and probably won t boot To correct this boot Knoppix and mount the root Debian partition in this example dev hda1 as read write knoppix ttypo knoppix sudo mount o rw dev hda1 mnt hda1 Chapter 6 Repair Linux 243 HACK 83 Repair Debian Packages Check to see if you have a previous version of modutils under var cache apt archives If not open up a browser and use the search feature on http packages debian org to locate your package from one of Deb
514. server with support but has also put all core components under the GPL which allows anyone to write a free server which I did 3 the writing of this book so it is possible that the actual pro gram differs in some ways from what is described here F4 The following instructive details were not programmed at To set up the NX server click K Menu gt KNOPPIX gt Services gt Start NX Server This informs you that you are starting a service that allows other users to access this computer The server then creates a user called nxfree and starts the SSH service Then it starts an interface and you can manage your server Add user Before users can use your NX terminal server add them to your server Remove user If you no longer want a certain user to use your NX server remove her Stop server Stop the NX server Quit Quit the management program but leave the server running 136 Chapter 5 Put Knoppix in Your Toolbox HACK Run X Remotely with FreeNX 47 As it is not currently clear how the NX server interface will handle these functions the following shows you how to perform them from the com mand line User Management To add a new user joe to Knoppix open a console and type knoppix ttypo knoppix sudo adduser joe You are then asked a number of questions about this user including his full name Fill in the fields and then choose a password for the account Joe can now log in to this server with ssh Howe
515. ses to come out since Klaus Knopper had to figure out which software to keep and what to take out Starting with Knoppix 4 0 Klaus split up Knoppix into a CD and a DVD release The CD still had the same software that it always had for the most part but the DVD included all sorts of new software such as the complete Gnome desktop environment which had to be removed from the CD for space reasons For some computers booting Knoppix is as simple as putting the CD in the CD ROM drive or the DVD in the DVD ROM drive and restarting the com puter For some computers however booting Knoppix might require changing the boot order in the BIOS The BIOS is the screen that appears when you first boot a machine and it usually lists the amount of RAM and the hard drives it detects Older systems that don t support booting from a CD require that you boot from a floppy Change the BIOS Boot Order If your computer supports booting from a CD ROM or DVD ROM but won t boot Knoppix by default your problem is probably the system boot order setting in the BIOS To change the boot order and save it you must enter the BIOS setup which you can do at boot time by pressing a special key Some BIOSes tell you at boot time the key to press to change BIOS set tings the common ones are Esc F2 and Del 2 Chapter 1 Boot Knoppix Boot Knoppix on a Desktop On many BlOSes you can skip directly to a boot media selector by pressing the F12 key Once in
516. sic Linux sniffer and you will find it on almost every system you log into It is not complicated to use and at some point in your security travels you will have to use this tool Practice with it now when there are no deadlines to meet Chapter 8 Knoppix Reloaded 305 HACK 101 HACK 101 Full Protection with S T D Driftnet Looks for image files passing along the wire If it sees a JPEG GIF or PNG file it shows it on the screen and saves a copy to a local directory Apart from being a party trick it is an excellent tool for monitoring web browsing habits dsniff Hunts out usernames and passwords Protocols such as HTTP telnet rlogin FTP POP3 and so on pass your username and password unen crypted Consider this when next using a web cafe to check your mail RK The following example is completely fake and is included here for demonstration purposes only Let s try and sniff some passwords from a hubbed network First start the password sniffer knoppix ttypo knoppix sudo dsniff dsniff listening on etho Generate some traffic by fetching mail and files by ftp dsniff will return usernames and password as it finds them such as the following 04 25 07 15 04 18 tcp 10 1 1 1 1776 gt 192 168 1 10 110 pop USER notreal notreal org PASS AFakEpass 04 25 07 15 05 04 tcp 10 1 1 1 1828 gt ftp notreal org 21 ftp USER notreal PASS anotherfakePaSs It is worth noting that dsniff does not summarize
517. sit the official Knoppix IRC chan nel for instance click K Menu gt Internet gt XChat fill out your choices for nicknames to use chances are there will already be another knoppix user on this network then select the FreeNode network and click Connect After you connect to the Freenode server join knoppix by choosing it in the channel list you see when you click Window gt Channel List entering knoppix into the Regex Match field and hit Apply or simply typing in join knoppix in the text entry box next to your nickname in the main window Video Conferencing If you want to chat in a more face to face fashion the Knoppix DVD includes GnomeMeeting for your video conferencing needs GnomeMeet ing requires a sound card with a working microphone and a video camera if you want to do complete video conferencing GnomeMeeting has full H 323 compliance so it works with any other H 323 compliant hardware or soft ware including Microsoft NetMeeting As with a lot of the programs I ve covered when you first launch GnomeMeeting it runs a configuration wiz ard to set up and test your hardware After the wizard has finished simply type in the H 323 compliant number you wish to talk to and hit Enter to connect With Knoppix you have a complete set of tools to browse the Web check your email and chat with your friends that you can take with you to any computer with a working Internet connection although you might want to 64 Chap
518. size tool There are two slightly different methods for using ntfsresize depending on whether you want to enlarge or shrink a partition Enlarge NTFS Partitions Before using ntfsresize to enlarge a partition you must use a tool such as fdisk or cfdisk to delete the partition and then recreate it in the new larger size If you want a safeguard against mistakes you should back up the parti tion table with the steps outlined in Hack 67 before making any changes You can use fdisk or cfdisk cfdisk is considered to be more user friendly from the command line as follows knoppix ttypo knoppix sudo fdisk dev hda Change hda to the name of the drive you want to edit It is important that you recreate the partition with the same starting block and partition type as the old partition Again this is why it s important to create a backup or at least write down the original partition information that fdisk or cfdisk out puts That way you can refer to that and ensure you use the same starting block and partition type Chapter 7 Rescue Windows 259 HACK 89 HACK 89 Resize Windows Partitions or you risk losing your files when you resize gy Nifsresize requires that the starting block remains the same a If you have any free space before the existing partition you might find that fdisk makes it easier to specify the starting block than cfdisk Either way after you delete the old partition recreate it at the same star
519. source KNOPPIX nice 5 usr bin create_compressed_fs m B 131072 master KNOPPIX KNOPPIX you can add the best option after the usr bin create_compressed_fs com mand to increase the compression even further On a 700 MB image this option can save an extra 20 MB but takes much longer to complete and also longer to unpack later Final Tips If you have tried all of the other methods and you still need to free up space but aren t sure where there are still a few other tricks you can try Whenever you download new packages using apt get a copy of the package is cached under var cache apt archives Always make sure to run apt get clean before you create the disk image While documentation is handy it also takes up quite a bit of space Try removing unneeded documentation from usr share doc If you are still having trouble figuring out which programs are taking up the most space on the filesystem try the following command which will sort all of the directories on your system by how much space they are using root ttypo du cb sort n Remember that certain file types compress better than others which means they are smaller when in the compressed KNOPPIX filesystem So if you have a choice between removing a 5 MB text file and a 5 MB mp3 file remove the mp3 file because the mp3 file is already about as compressed as it will go and the text file will compress much smaller Personalize Knoppix i Customizing Knopp
520. ss These scripts not only create the compressed filesystem and CD image for you but they also clean up your distribution remove excess files update manpages and locate databases and perform other timesaving functions The disk space requirements are the same as in Hack 109 Once you have mounted the filesystem you will use to store your remastering files in our example under mnt hda1 then create a source directory and download and install the latest version of the remaster package from http linux ilmainen net suomiknoppix Finally execute the knoppix remaster script root ttypo hda1 mkdir source root ttypo hda1 wget http linux ilmainen net suomiknoppix remaster_0 1 6 1386 deb root ttypo hda1 dpkg i remaster_0 1 6 i386 deb The knoppix remaster script is a graphical automated tool to help you with the remastering process The first thing it will do is check whether you have enough RAM and swap to complete the remastering process If not it will prompt you for how large of a swapfile to create and where to put it Be sure to store the swapfile in the same mount point where you will store your remastered files mnt hda1 here Next the script will ask you whether you will create a new remaster If you have an existing source directory from a previous remastering session you want to use point the installer to that directory Otherwise point it to the fresh mnt hdal source directory that you have created If this is a
521. ss of upgrading your packages do not stop the program unless absolutely necessary as there is a chance that a program might be installed incorrectly if its install is stopped halfway through After you update all of the packages remember to run the following com mand to delete all the cached packages from the var cache apt archives directory root ttypo apt get clean As you can see keeping your system up to date is pretty simple The chal lenge comes when trying to fit all of the updates on a single CD After you are finished making your changes unmount the proc filesystem with the following root ttyp1 umount proc 350 Chapter 9 Knoppix Remastered Automate Knoppix Remastering Then press Ctrl D to exit chroot Now you are ready to pick up with the Make the Master CD Filesystem section of Hack 109 Automate Knoppix Remastering Automate the remastering process by using one of Klaus s scripts After you follow the steps in Hack 109 a few times you might think to your self I type some of the same commands every time I should put this in a script A number of people have had the same thought and you can find quite a few scripts floating around the Internet that help automate much of the process of remastering a Knoppix CD Klaus and the other Knoppix maintainers don t type the commands in by hand either and you can actu ally use the same scripts they use to automate the remastering proce
522. st compression from within this file Set that particular option to yes if you want to use higher compression on the compressed file system at the cost of taking longer Hit F2 to save any changes you have made and F10 to exit the editor and return to the menu Now you are ready to create the compressed filesystem Select option 2 in the menu and if you have not yet cleaned up your remaster select yes when prompted to do so by the script where it did not seem to contain a local version of genisoimage and would fail immediately and return back to the main menu If your version suffers from the same bug the fix is to edit source KNOPPIX build Knoppix 3 4 mkcompressed and change the line that reads MKISOFS KNOPPIX build genisoimage RK I noticed a bug in my particular version of knoppix remaster to MKISOFS usr bin genisoimage Now the script creates your compressed filesystem This process takes the same amount of time as manually entering the mkisofs command so sit back and browse the Web until the command completes 352 Chapter 9 Knoppix Remastered HACK Morph Morphix 114 Once the compressed file is created you are returned to the main menu Select 3 to create the ISO file The script will automatically generate new checksums for you and then create the new image It will return you to the main menu when it finishes where you can then exit the script Your new image is in source KNOPPIX build Knoppix Master KNOP
523. structure and to edit values Type a question mark and hit Enter The following list of commands and their syntax appears 1020 gt Simple registry editor hive lt n gt list loaded hives or switch to hive number n Chapter 7 Rescue Windows 265 HACK 91 HACK 91 Edit the Windows Registry cd lt key gt change key ls dir lt key gt show subkeys amp values cat type lt value gt show key value st lt hexaddr gt show struct info nk lt keyname gt add key dk lt keyname gt delete key must be empty recursion not supported yet ed lt value gt Edit value nv lt type gt lt valuename gt Add value dv lt valuename gt Delete value delallv Delete all values in current key debug enter buffer hexeditor q quit The main commands that you use are ls and cd much in the same way as on the command line However instead of directories you list the contents of registry keys Type 1s to see a list of keys in this hash and ed to go inside a specific key 1020 gt 1s ls of node at offset 0x1024 ode has 12 subkeys and O values offs key name 11b8 lt Aureal gt 1958 lt Co7ft5Y gt 1a30 lt Classes gt 637248 lt Clients gt 63bbc8 lt Gemplus gt 63bde0 lt Microsoft gt 7 9978 lt ODBC gt 7ccc80 lt Policies gt 748750 lt Program Groups gt 7d87d8 lt Schlumberger gt 7da6c8 lt Secure gt 7e5528 lt Windows 3 1 Migration S
524. structure of the menus is not unlike the previous version it has proved to be effective even with K 6 schoolchildren Freeduc CD version 1 6 is a collection of free games gathered the following categories Classic three games Reflexion two games Puzzle four games Strategy eight games Adventure two games Simulation four games Brickball four games Board two games Platform nine games and Arcade eight games The last numbered version of Freeduc CD may be Freeduc Science so it would be numbered release 1 7 Its concern is science for education career training and for hobby This distribution aims to make it possible to have a complete scientific laboratory with just an outdated computer and less than 100 of external hardware It features interesting tools for chemistry phys ics electronics math training and editing and most uniquely useful drivers for Data Acquisition Devices like USBDUX 150 LIBERLAB approxi mately 20 and PHOENIX M 35 Future versions of Freeduc CD will be named to reflect the audience to which each version has been targeted This will create a tree of distributions with nicknames Freeduc Base Freeduc Primary Freeduc Games Freeduc Science and so on with each series having an autonomous numbering sequence See Also e The official Freeduc page at http www ofset org freeduc cd e Our development web sites https gna org projects freeduc doc and http sourceforge
525. such as these a number of new hacks were added to the book quite a few were completely rewrit ten and all have been updated A lot of live CDs are available these days mostly for very specific purposes but I still believe that Knoppix is the best overall live disk out there This book shows you how to use Knoppix to its full potential with steps to use it as your desktop distribution your rescue CD and a launching point for your own live CD You will find ways to use Knoppix that you may have never considered and you may even think of ways to use Knoppix beyond what this book covers I started this book as a Knoppix fan but once I start ing writing down the sheer number of things it can do I quickly became a Knoppix zealot I hope you find this book and Knoppix itself as useful and indispensable as I have Why Knoppix Hacks The term hacking has a bad reputation in the press They use it to refer to someone who breaks into systems or wreaks havoc with computers as their weapon Among people who write code though the term hack refers to a quick and dirty solution to a problem or a clever way to get something done And the term hacker is taken very much as a compliment referring to someone as being creative having the technical chops to get things done The Hacks series is an attempt to reclaim the word document the good ways people are hacking and pass the hacker ethic of creative participation on to the uninitiated Seeing
526. sues surrounding distribution of the DeCSS program and the Windows media codecs which decode these for mats for playback Despite these setbacks you can still use gmplayer the default media player to view MPEG1 and MPEG files including VCDs and SVCDs as well as other video formats such as DivX 3 4 and 5 To start xine click K Menu gt Multimedia gt Video gt gmplayer gmplayer s interface resembles many common DVD playing applications under Win dows To play a video file in gmplayer right click and select Open gt Play File and browse to the file you wish to add to the play list To play a VCD insert the VCD into your CD ROM drive and click Open gt Play VCD The gmplayer program allows you to control playback either through the GUI or 54 Chapter 2 Use Your Knoppix Desktop HACK Connect to the Internet 19 through a complete set of key bindings For instance hit Enter to start play back Space to pause and the arrow keys to move forward and backward within the video If the default look does not appeal to you other skins you have downloaded can be used by right clicking on gmplayer and selecting Skin browser Watching TV If your computer has a working TV tuner card you can watch TV under Knoppix using xawtv To run xawtv select K Menu gt Multimedia gt Video gt xawtv The first time it is launched xawtv presents you with a configuration pro gram so you can set up NTSC versus PAL mode fo
527. suite to get any user interest at all these days it must tout compatibility with the file formats Microsoft Office uses and the office suites available under Linux are no exception Knoppix pro vides the OpenOffice org suite and if you have the DVD the Kontact per sonal information manager While these programs do take some getting used to if you are accustomed to Office after a bit of adjustment you should find you can easily get your office work done under Knoppix OpenOffice org When I introduce Linux to a Windows user one question that often comes up is Can I open all of my Word documents As a system administrator friend of mine who likely dealt with the famous Word 95 and Word 97 compatibility issues quipped OpenOffice org s compatibility with Word is at least as good as Word s compatibility with Word OpenOffice org is an open source office productivity suite that touts com patibility with many of the popular office file formats including Microsoft Word Excel and PowerPoint and runs on a variety of platforms including Linux Windows and Solaris The OpenOffice org tools I discuss are the word processor Writer the spreadsheet Calc and the presentation software Impress Word processor OpenOffice org Writer is a full featured word processor with support for spellchecking macros revision tracking and most of the other features you expect to find in a word processor It touts compatibility with many diffe
528. t disabling 20 Pre boot eXecution Environment PXE 94 preferences nessus tool 170 presentations Impress OpenOffice org 41 Pretty Good Privacy PGP 294 printers configuring 44 45 saving settings 76 private keys 294 privileges root 71 Privoxy 110 probing general hardware 186 Program Files directory backing up 257 programs see applications prompts boot 4 protocols DHCP running emergency 155 FTP running with inetd 156 PAN 57 RDP 129 131 Public Key Infrastructure PKI 294 public keys 294 Puzzle Bobble 50 PXE Pre boot eXecution Environment 94 adding 194 197 pxelinux server 195 pxelinux 0 file 195 pxelinux cfg default file 195 pydance installing 90 Q Qemu 5 qtparted 114 starting 118 QTParted tool 209 258 Quake3 104 Quantian 322 324 Quick Browser menu 32 QuickTime mov files 54 384 Index R RADIUS Remote Authentication Dial In User Service 293 RAID configuring 227 230 migrating 230 235 mounting 225 RAM random access memory CDs remastering 335 detecting 20 Memtest86 23 26 optimizing 14 ramdisk creating 13 random access memory see RAM random number sequences 25 tdesktop program 131 RDP Remote Desktop Protocol 129 131 Receive time 308 recording TV MythTV 326 329 records MBRs see MBRs recovering deleted files 214 217 Windows Recovery CD 256 Redelmeier Robert 25 registries backing up 264 267 editing 264 265 navig
529. t present If you can t find a printer resembling your own but your printer supports a more generic printing protocol such as PCL or Postscript then choose Generic from the list of manufacturers and then choose the proto col your printer supports from the panel on the right The next few windows contain several default settings that rarely need to be changed Modify these settings if you see fit otherwise just click through until you get to the General Information window Enter a name for the new printer here and then click finish Once you finish setting up a printer a new icon appears for it in the print manager To set it as your default printer right click its icon and choose Set as User Default If you prefer a paperless office you can print directly to a PDF a Postscript file or to a fax machine Chapter 2 Use Your Knoppix Desktop 45 HACK 15 HACK 16 Use Peripheral Devices Configure KDE Control Module Printer Model Selection Manufacturer ALPS ANITECH APOLLO APPLE AVERY BROTHER Model Bu 100 BJ 10e BJ 10v BJ 15v BJ 20 BJ 200 BJ 30 CASIO BJ 300 CITIZEN BJ 330 CITOH BJ 35v COMPAQ BJ 5 DEC g BJC 1000 S DELL BJC 2000 C PostScript printer E Other C Raw printer no driver needed lt Back Next gt 3 Cancel Figure 2 8 Select a printer model Use Peripheral Devices 16 Knoppix includes suppor
530. t for many popular scanners cameras PDAs and other peripherals often with little to no extra configuration There is a common misconception that Linux has poor hardware support especially when it comes to peripherals Actually you might be surprised at just how much hardware Linux supports out of the box without requiring that you download any extra drivers Knoppix goes a step further and auto matically configures a lot of the peripherals you might use just plug them in Scanners Knoppix supports many popular scanners with little to no tweaking I have both SCSI and USB scanners and Knoppix recognized and configured them with no extra effort on my part To start using your scanner click K Menu gt Graphics gt Kooka to start Kooka KDE s scanning application When Kooka starts it lists all of the scanners that Knoppix has detected and prompts you to choose one After you select your scanner Kooka s main window appears 46 Chapter 2 Use Your Knoppix Desktop Use Peripheral Devices Kooka works like most other scanning applications Click Preview Scan to perform a quick scan then crop out the section of your scan you wish to use and click Final Scan to scan at full resolution After completing a scan Kooka will prompt you for the file format to save the image as Kooka can also perform some basic image manipulation such as image rota tion and mirroring although for more advanced features you should proba bl
531. t grub menu lst If you are multibooting with another Linux system be aware that Knoppix overwrites your boot loader with its version of grub To fix your menu lst file so you can boot both your new Knoppix install and your old Linux install finish the Knoppix install then mount the root parti tion for your new Knoppix install Then edit the boot grub menu Ist file and update grub as in Repair Grub Hack 66 Restart the computer and remove the disk from the drive and you should see a new boot prompt with options for booting either Linux or Windows RK If you would like to change the OS from which your system boots by default boot into your new Knoppix install and edit the boot grub menu Ist file as root changing the line that reads default 0 to default 2 or whatever number your Windows partition is assigned at the bottom of the file Keep in mind that grub starts counting from zero not one You should now be able to boot either into Knoppix or Windows Just as when booting from the CD the Knoppix hard drive install has your Win dows partition icons on the desktop allowing you to access files in the same way you are accustomed to Convert Knoppix to Debian Unstable Even though Knoppix is based on Debian and the installation instructions help you install Knoppix on your hard drive what you have installed is a hybrid Debian system Here s how to convert a Knoppix install to as close to a standard Debian unstable branch
532. t hda1 lilo You should see output for the boot options that lilo has added and should be able to reboot with lilo fully restored 202 Chapter 6 Repair Linux HACK Repair Grub 66 er Repair Grub i 66 Use Knoppix to restore grub to the Master Boot Record MBR There are two popular bootloaders for Linux lilo and grub Lilo has been around longer and many distributions default to installing it but most also offer grub packages Grub has many interesting features that have made it popular including the ability to change kernels and any other grub options at boot time Grub also reads from its configuration file at boot so you can change options in that file and don t have to reinstall it just to make changes Like lilo grub sometimes gets overwritten by a Windows install or by an accidental installation of lilo to the MBR The procedure to restore grub to the MBR is almost identical to restoring lilo First identify your root partition as in the lilo hack Hack 65 In this exam ple the root partition is dev hda1 now is the time to mount the partition read write and edit KR If you want to make any changes to your grub configuration the boot grub menu Ist file Next mount the partition with the dev option enabled and with write per missions so if the filesystem is not yet mounted mount it with knoppix tty1 knoppix sudo mount o dev rw mnt hda1 If the filesystem is already mounted then remount it with kn
533. t methods to import and export a database and this sec tion highlights methods to import to and export from a database using mysqldump Of course if you are creating an emergency Knoppix server because your database server is down your importing methods are tied to whatever backup method you have decided to use If you want to move a single database to Knoppix first log in to your origi nal database server and export it with root ttypo root mysqldump database gt database txt Then copy over the resulting database file using scp FTP or whichever file transfer protocol you prefer Once the database is copied run mysql and cre ate a corresponding database on Knoppix mysql gt CREATE DATABASE database You can then import your data with sudo mysql lt database txt To copy all of the databases from one server to Knoppix the procedure is similar export all of your databases from the remote server mysqldump all databases gt all_databases txt Finally copy all_databases txt to Knoppix and import it sudo mysql lt all_databases txt Inetd Knoppix includes inetd the Unix daemon that manages several of the stan dard network services When a request comes in inetd starts the appropriate 156 Chapter 5 Put Knoppix in Your Toolbox Run Other Emergency Services server daemon The inetd daemon is disabled by default Before you start inetd check etc inetd conf and make sure that you don t mind if al
534. t sda1 sudo mount dev sda3 mnt sda3 tA tA tA HA HA HA Perform the First Sync Now that the partitions have been mounted you are ready for the first phase of synching with the physical server The first step is to synchronize the bulk of the data from the physical server to the virtual machine while the physi cal server is still running The advantage to this is that these files can sync in the background while the server is still functioning Later on when we take 248 Chapter 6 Repair Linux Turn a Physical Machine into a VMware Virtual Machine the server down to perform the final sync it should be much faster and min imize the downtime we have Also this step requires that Knoppix be con nected to the network so if your network does not automatically hand out an IP address to the virtual machine via DHCP you will need to configure the network manually before you proceed Use rsync to copy the files over to the virtual machine This step does require that you are able to SSH as root to your remote server so that rsync can function so if you do not have that server configured to allow root SSH login either configure the physical machine to allow that access or if you are willing to have a longer downtime for the server skip ahead to the Per form the Final Sync section You will need to perform an rsync command for each partition on the physical server so in my example I will need two rsync commands sudo rsync avx
535. t size 214 Chapter 6 Repair Linux Recover Deleted Files It is important that you put your output on a different partition than the partition you recover because otherwise you have the potential to erase the very files you are trying to recover If you do plan to recover the deleted files to a drive instead of the ramdisk click on the icon for the partition on which you decide to store your output then right click on the icon and choose Change read write so you can write to it You can also open a terminal and type knoppix ttypo knoppix sudo mount o rw dev hda2 mnt hda2 Replace dev hda2 with the partition you want to recover to There are two main steps to recover deleted files The first step is to use the fls tool to list all of the deleted files detected on the system The second step is to use the icat tool to restore a particular file or set of files to temporary storage For this example we will assume that we have accidentally deleted our Firefox bookmarks our home directory stored on dev sda2 and want to restore them fls The fls tool from the Sleuth Kit is a command line tool somewhat similar to ls only designed for forensics use It can list all of the files in a filesystem or image including deleted files or for our uses can list only the deleted files it detects Since the file I want to restore is relatively small it will fit in ram disk so I will create a directory on my Knoppix desktop to store output a
536. t the volume just by clicking on the speaker If the icon has a red slash through it then Knoppix was not able to detect your sound card Use the sndconfig program to configure your sound card Sndconfig is a fairly straightforward configuration tool that scans your system for any available sound cards and prompts you with any it detects To load the sndconfig application click K Menu gt KNOPPIX gt Configure gt Sound card configu ration Other than selecting OK the only interactive part of this tool is to lis ten for a sample sound once sndconfig configures your card and to answer Chapter 2 Use Your Knoppix Desktop 51 HACK 18 HACK 18 Rock Out with Knoppix Multimedia Yes or No depending on whether you hear the sound If your sound card still isn t working there is a chance that there is no ALSA sound mod ule for your hardware Once your sound card is working you are ready to try the multimedia applications is detected and it seems like it still doesn t work click K Menu gt System gt alsaconf and accept the recommenda tions it makes for your sound card Rad If you have gone through all of these steps your sound card Listening to Audio The primary application used to play sound under Knoppix is XMMS see Figure 2 11 Click K Menu gt Multimedia gt Audio gt XMMS to launch the program or click on any mp3 or other sound file in your file manager XMMS has an interface similar to W
537. t to run during the initial Knoppix boot process placing them here saves you from extracting and editing init scripts in the compressed loopback KNOPPIX filesystem After you have made your changes unmount the temporary directory and compress the file Then you can copy it to a new Knoppix disk image root ttyp1 hda1 umount temp root ttyp1 hda1 gzip 9 minirt 366 Chapter 9 Knoppix Remastered HACK Put Knoppix on a USB Drive 120 er Put Knoppix on a USB Drive i 120 It just takes a few commands to copy and boot Knoppix from your USB key drive If you are like many geeks you carry a small USB thumb or key drive around in your pocket wherever you go In fact even if you aren t a geek many people now keep a lot of their files on a USB drive so they can easily transfer them from computer to computer If you need to rescue a system these days you are probably more likely to have a USB key on you than a Knoppix disk and since most modern systems can boot from a USB drive it makes sense to put Knoppix on your USB key so it can be there whenever you need it In this hack I will go over the basic steps necessary to prepare your USB drive to boot Knoppix The first step in this hack is to choose an appropriate USB drive If you want to copy over the full Knoppix CD you will need at least 700 MB of free space which means you will probably want at least a 1Gb drive so you will have spare room for your other files
538. table and unstable branches and it consists of packages from the unstable branch that have been shown to be stable for some time Once the packages in testing have been tested enough Debian will declare the testing branch the new stable branch 112 HACK Explore the Knoppix Installer 40 Unstable nicknamed Sid The Debian unstable branch contains newer packages in a more rapid state of flux that have only been moderately tested to work well together Some people mistakenly believe that the packages within the unstable branch are buggy While packaging bugs and instability are more common in the unstable branch than in testing or stable branches the packages in the unstable branch still undergo a fair amount of testing before release particu larly for large popular packages such as desktop environments and X It is commonly held that the packages in the unstable branch are as good as any you would find in other Linux distributions if not more so You often hear Debian branches referred to as Etch Lenny and Sid These nicknames refer to the stable testing and unstable branches but change with each Debian release For example Etch is the name for the Debian 4 0 release For as long as Debian is at 4 0 Etch will also be synonymous with the stable branch However with the next Debian release Lenny the cur rent nickname for the testing release will be declared stable and will then become the nickname of the new stable branch
539. tation for all of the main KDE applications so you can use this resource if you have a question about the Konqueror web browser for instance On the Web There are a number of resources for getting help with Knoppix on the Inter net First of all there is the official Knoppix site at http www knoppix org which maintains a FAQ you can view at http www linuxtag org 2005 index php Corporate users of Knoppix might be interested in official commercial support provided by ed media s Knoppix hotline located at http vww ed media org knoppix en index html If you need more help there is an active online forum at http www knoppix net forum Knoppix net is an excellent all around resource for Knoppix questions with an active community because it answers questions on the forum and writes and maintains documentation and HOWTOs at Chapter 2 Use Your Knoppix Desktop 65 HACK 23 Try Other Desktop Environments http www knoppix net docs You can track reported bugs in different ver sions of Knoppix at http www knoppix net bugs and file a bug report your self There are also forums dedicated to supporting Knoppix in many other languages including German French Japanese Polish Russian and others Visit http www knopper net knoppix links index en html for a full listing Knoppix you are using and if you have a hardware related question what hardware you are using with Knoppix and any cheat codes you have used KR
540. tation has to do with poor 3D driver sup port and performance from video card vendors Other factors are to blame as well including games that are programmed with 3D libraries and aren t easily ported to other platforms like Linux and the fact that many Linux gamers buy Windows versions of games even if a Linux alternative exists There is good news however Over the past few years 3D driver support in Linux has dramatically improved particularly for Nvidia cards Nvidia has released binary drivers that support their full TNT and Geforce line of video cards In some benchmarks games running under Linux even outperform their Windows counterparts As the video support continues to improve the application support improves as well particularly in the first person shooter world As an avid first person shooter fan myself many of my favorite clas sic FPS games including the full Quake Unreal Tournament and Return to Castle Wolfenstein series all have native Linux binaries 100 Chapter 3 Tweak Your Desktop Install Nvidia 3D Drivers You might not think of Knoppix as a 3D gaming platform and indeed there are only a few applications and games on the disk that take advantage of 3D acceleration However if you do want 3D acceleration for those programs and you have an Nvidia card getting and using the Nvidia drivers is only a few steps away Extra Steps for the CD It is much easier to install the Nvidia drivers from the DVD tha
541. tatus gt 1020 gt cd Mi 63bde0 Microsoft gt Notice that you don t have to type out Microsoft to go to that key This command shell does not support tab completion but if you type the first few characters of a key s name it automatically fills it in with the first key that matches those characters when you press Enter Also if you know the full path of the key you want to change to you can type it all at once such as cd Microsoft Windows NT CurrentVersion Once you get to the directory containing the key you wish to change type 1s and confirm that the key exists and then you can use the cat command to show the value of the key as follows 791488 Microsoft Windows NT CurrentVersion gt cat SystemRoot Value lt SystemRoot gt of type REG SZ data length 22 0x16 266 Chapter 7 Rescue Windows HACK Restore Corrupted System Files 92 D WINDOWS 791488 Microsoft Windows NT CurrentVersion gt i If you want to delete this key simply type dk SystemRoot at i the prompt Use the ed command to change the value 791488 Microsoft Windows NT CurrentVersion gt ed SystemRoot EDIT lt SystemRoot gt of type REG SZ with length 22 0x16 0 D WINDOWS ow enter new strings one by one Enter nothing to keep old 0 D WINDOWS gt E WINDOWS 791488 Microsoft Windows NT CurrentVersion gt cat SystemRoot Value lt SystemRoot gt of type REG SZ data length 24 0x18 E WINDOWS If you hit
542. ter 1 Boot Knoppix Free Your CD to Make Knoppix Run Faster Boot from a CD Image Another feature in Knoppix is the bootfrom cheat code With this option instead of a CD or DVD you can choose an ISO image you currently have on your hard drive for Knoppix to run from While similar to the fromhd cheat code boot from uses an actual Knoppix ISO that you must already have on your hard drive One stipulation for this cheat code is that the ISO you choose must have the same kernel version as the disk you are using to boot There are different ways to check the kernel version but probably one of the best ways is to go to a Knoppix mirror and download the KNOPPIX CHANGELOG txt file This file lists all of the major changes in each Knop pix release and usually lists the kernel versions for each release Otherwise to quickly check the kernel version from within Knoppix itself run the fol lowing command in a terminal knoppix Knoppix uname r 2 6 19 To boot from an ISO type bootfrom followed by the full path to the ISO file The bootfrom cheat code expects the same Linux paths as tohd and fromhd so if you have Knoppix iso in the root directory on your Primary IDE hard drive type boot from dev hda1 Knoppix iso This cheat code also accepts wildcards so if you specified K iso instead of Knoppix iso it would look for any file starting with K and ending in iso The bootfrom cheat code is particularly useful if you are customizing Knop
543. ter 2 Use Your Knoppix Desktop HACK Get Help 22 check first with the friendly folks at your local Internet caf before using it on their machines Get Help f When you are lost or stuck or you just have a question on Knoppix there are a number of places you can go to get help Knoppix definitely makes it easy for a new user to get started on Linux but even with all of the automated configuration tools and the easy to use desk top environment you are bound to need help sometimes Knoppix has a vibrant and multilingual community and a number of support outlets Every Knoppix user is basically using the same exact software if you are having a problem someone else is probably having that problem too On the Disk First of all the Knoppix CD itself provides a good first line of support for any questions you might have The Knoppix help page is actually the first page you see when the desktop environment loads If you have closed your browser and want to get back to that page click the icon labeled KNOPPIX on your desktop Select your language along the bottom of the web page for English click EN to see a basic help page that introduces Knoppix and pro vides some introductory information on the Knoppix project and some links for getting further help If you need help with your desktop environment more than with Knoppix itself click K Menu gt Help to access KDE s full user manual This help pro gram also includes documen
544. the BIOS find the section that changes boot device order On some BlOSes this setting is changed by selecting a tab along the top labeled Boot while on others the option may be named Boot device order or something similar Once you have found this setting move the CD ROM or DVD ROM device so that it is listed before any hard drives If you can t find or change this option or you need other information specific to you system refer to the BIOS manual that should have come with your computer or motherboard you can often find out the BIOS key by searching Google for your computer model and the word BIOS Once you have changed the boot device order save your settings doing this should also reboot the com puter and after your system boots and detects the Knoppix disk you will be placed at the Knoppix boot prompt Boot Knoppix from a Floppy Some older computers do not support booting directly from a CD ROM For these computers you must first create a boot floppy that enables the system to boot from the Knoppix disk With older versions of Knoppix there were tools available to allow you to create a boot floppy but unfortunately the Linux kernel has gotten so large that it won t fit on a single floppy any more While there are still ways to split the kernel across floppy disks an easier approach is to use the Smart Boot Manager http btmgr sf net a tool that creates a boot floppy that can boot just about any optical disk T
545. the desktop is simply a Mozilla window with the kiosk page loaded The url cheat code tells Knoppix which URL to use for the kiosk page The example above would load O Reilly s home page but you would replace that with a site you have set up for the kiosk The kiosk mode creates a browser with only a limited toolbar to make it more difficult for a user to browse outside of your kiosk pages In addition if the user closes the browser window a new window will automatically be created Configure the Web Browser Unfortunately since this kiosk mode was first created the browsers and browser settings that are installed on Knoppix have changed To complicate things further the CD and DVD use different browsers from each other As a result the current kiosk mode needs a few tweaks to get it up and running on the current version of Knoppix The tweaks differ based on whether you use the CD or DVD so I will split up the steps for each disk below CD kiosk mode If you boot the CD into kiosk mode on Knoppix 5 1 1 you will see a standard Iceweasel window with a warning saying Iceweasel has prevented this site from opening a popup window What has happened is that the location for browser settings has changed from where Knoppix is 86 Chapter 3 Tweak Your Desktop Make a Kiosk expecting them In addition the old option that allowed the kiosk mode to open a popup has also changed Luckily it only takes a few tweaks to get things b
546. the hfsplus module is loaded sudo modprobe hfsplus Now edit the etc fstab file Make a note of the hard drive icons on your desktop and the name of the partitions there so you know which partitions to edit You will need root privileges so for instance to edit the file with the KDE text editor kwrite type the following sudo kwrite etc fstab From the text editor locate any lines that reference the partitions you saw on your desktop such as dev hda1 media hda1 auto noauto users exec 0 0 274 Chapter 7 Rescue Windows HACK Knoppix on Intel Macs 95 Now change the auto to hfsplus as follows dev hda1 media hda1 hfsplus noauto users exec 0 0 Save your changes and close the file Now when you click on the hard drive icons on the desktop Knoppix should mount them correctly Bill Childers Chapter 7 Rescue Windows 275 CHAPTER EIGHT Knoppix Reloaded Hacks 96 108 If imitation is the sincerest form of flattery Klaus Knopper should be blush ing According to Knoppix net Knoppix is used as a base for over 90 other live CDs and those are just the CDs that the Knoppix net community has added It is difficult to include all the necessary software with only 2 GB of uncompressed space at your disposal Knoppix variants have appeared because people who wanted to create their own live CDs discovered just how easy it is to remaster Knoppix something you too will discover in Hack 109 With Knoppix
547. the hotsync speed or other settings click Settings gt Configure KPilot To sync a Palm PDA with Kontact click Settings gt Configure Kontact and then select Kpilot Configuration from the window that appears Make sure that Addressbook KNotes Memos KOrganizer Calendar and KOrganizer Todo s are checked Apply your changes and then hotsync with your Palm to populate your Kontact applications with all your data To perform a hotsync click the hotsyne button at the top left of the KPilot window and then press the hotsync button on your cradle The main KPilot window shows you the synchronization progress With word processing spreadsheet presentation and groupware applica tions all on a single CD Knoppix has all the common tools needed for get ting office work done Combine this with a persistent home directory and settings on a floppy or USB key Hack 26 and Hack 120 and you can get your work done even while visiting Microsoft s Redmond campus Chapter 2 Use Your Knoppix Desktop 43 HACK 14 HACK 15 Configure Your Printer Configure Your Printer Even in an increasingly digital world sometimes you still need a hardcopy of your files The KDE printer manager has a lot of options and this hack guides you through them If you have taken advantage of any of the office applications from Hack 14 you might find yourself wanting to print out some of the work that you have done Knoppix s excellent hard
548. the menu that appears and it will launch qtparted Once gtparted starts select your hard drive from the list of disks on the left side of the window dev sda for our example If you have any partitions that you need to delete before you can install Knoppix select them and click Operations gt Delete then click on the gray free space labeled hda 1 and select Operations gt Create The Knoppix installer requires that you create a swap partition so select linux swap from the Partition Type drop down menu and then choose a size for the swap as shown in Figure 4 2 The current rule of thumb is to pick a swap size ranging from your amount of RAM to twice that amount so for a system with 256 MB of RAM you should choose a swap size between 256 MB and 512 MB Click OK and qtparted shows a new swap partition at the beginning of the disk To create your root partition click on the gray free space after the swap par tition and select Operations gt Create again The gtparted program defaults to creating an ext3 partition that spans the rest of the free space Knoppix also supports installing to ReiserFS partitions This example is for the Debian system so click OK to create the partition After you partition the drive as shown in Figure 4 3 click File Commit to save the changes to the disk Once the changes are saved close gtparted and the main installer menu should appear 118 Chapter 4 Install Linux with Knoppix Install K
549. the most accurate current information Try it for free at http safari oreilly com xxiv Preface How to Contact Us We have tested and verified the information in this book to the best of our ability but you may find that features have changed or even that we have made mistakes As a reader of this book you can help us to improve future editions by sending us your feedback Please let us know about any errors inaccuracies bugs misleading or confusing statements and typos that you find anywhere in this book Please also let us know what we can do to make this book more useful to you We take your comments seriously and will try to incorporate reason able suggestions into future editions You can write to us at O Reilly Media Inc 1005 Gravenstein Highway North Sebastopol CA 95472 800 998 9938 in the U S or Canada 707 829 0515 international local 707 829 0104 fax To ask technical questions or to comment on the book send email to bookquestions oreilly com The web site for Knoppix Hacks lists examples errata and plans for future editions You can find this page at http www oreilly com catalog 9780596514938 For more information about this book and others see the O Reilly web site http www oreilly com Got a Hack To explore Hacks books online or to contribute a hack for future titles visit http hacks oreilly com Preface xxv CHAPTER ONE Boot Knoppix Hacks 1 11 Thro
550. the results If you leave it running for an extended period of time expect hundreds or even thousands of the same password over and over Further Reading e http en wikipedia org wiki Tcpdump e http en wikipedia org wiki ARP_spoofing e http en wikipedia org wiki Dsniff e http en wikipedia org wiki Wireshark TCP Tools The TCP Tools category is a collection of applications that allow you to access and manipulate the full TCP IP stack 306 Chapter 8 Knoppix Reloaded Full Protection with S T D S T D includes tools such as Gspoof Excalibur nested and hping These are all packet assemblers that allow you to generate any kind of custom packet and send it out onto the wire When coupled with a sniffer this gives you the ability to test any IP option that may not have a convenient pre pack aged tool Other TCP Tools available include the following Tcpreplay Allows you to replay a capture file grabbed by a sniffer such as ethereal or tcpdump back onto the wire Arpwatch Monitors the IP MAC pairs on the wire and emails them to the S T D root account This allows you to monitor for ARP poisoning attacks and IP duplicates Tcpkill Tears down any TCP session at which it s pointed This is a dangerous tool so use it with caution in a production environment Fragroute Is a routing and fragmentation tool In conjunction with arpspoof this can be a very powerful tool for customizing your own ARP poisoning attack
551. there is similar debate over vulnerability assessment versus penetration testing In general most people bundle the two terms together to mean something like the act of quantifying risk by actively testing for vulnerabilities on a system Regardless of the semantics as a security enthusiast or professional this is where the real work begins First of all realize that there is no such thing as a 100 secure network unless you turn it all off encase it in steel drop it in a vat of concrete and sink it to the bottom of the Mariana Trench If a network is usable it will at some point be insecure There is a real world trade off between usability and security the act of testing merely helps you make educated decisions on the balance Next realize that just like firewalls vulnerability testing only makes you more secure for a certain period of time Allow me to explain it this way The more security holes a system has the more likely an attack will take place The complexity and location of these holes plays a part with a trivial web server hack far more likely to be seen and abused than a tiny hole on a piece of bespoke code on your private Intranet It all boils down to this Test find fix or accept the risk Security through ignorance or obscurity is no security at all and any level of testing you con duct and act upon will make your system more secure Even if you don t Chapter 8 Knoppix Reloaded 309 HACK 101
552. thing very por table and under 50 MB like LNX BBC I decided to try my hand at remas tering Knoppix Hack 109 I actually cheated in the beginning and used an already reduced ISO called Model_K which is now defunct In later releases DSL began as a reduction of Knoppix proper Getting a fully functional desktop into 50 MB is not a simple process Fortu nately all the lightweight applications had already been developed I just had to be very particular about what was included in DSL For instance the X from Knoppix is much too big so I had to hack a system that uses Keith Packard s Kdrive X servers hitp freedesktop org Software xserver DSL has evolved a lot over time Some applications have been dropped and replaced with programs that are a better fit By the third public release users started to contribute hacks which cumulatively improved DSL In that sense open source projects are interesting Some people provide a one time hack while others continue their involvement and help the project along For several releases Peter Sieg http vww petersieg de made contributions that greatly enhanced DSL s functionality From about 0 5 and on Robert Shingledecker http www shingledecker org has been a major contributor to DSL development With so many improve ments and suggestions he should be recognized as a coauthor He s a cre ative genius and we are implementing his amazing improvements including a fully automated
553. this question the script creates an smb conf file that shares only your home directory and any printers that you have previously config ured on the system If you answer yes to this question the script adds shares for all hard drives and CD ROM drives that Knoppix has detected and automatically mounts the devices for you as they are accessed Once you click yes or no the script creates the smb conf file and starts Samba If you only want to share all of the drives on your system as read only over the network then you are finished By default the share shows up in the WORKGROUP workgroup as a machine named KNOPPIX and if you have shared all of the drives on your system they appear with the same names they were previously assigned on your desktop such as hda1 You can find the configu ration for each drive at the bottom of the etc samba smb conf hda1 comment mnt hda1 browseable yes path mnt hda1 writeable yes preexec bin mount mnt hda1 postexec bin umount mnt hda1 These shares all require that you log in with the username knoppix and the password you created for the knoppix account Then Knoppix automatically mounts the drive when you access it and unmounts it when you are fin ished Notice that by default Samba is configured to allow writing to the drives but Knoppix automatically mounts all drives read only so it over rides this option If you do want to allow write access to a drive mod
554. this statement to your copy of etc apache modules conf LoadModule includes module usr lib apache2 modules mod_include so If Apache doesn t have the modules you need you must remaster Knoppix with your custom Apache setup see Create a Customized Knoppix Hack 109 Otherwise the next step is to actually copy over the pages you want to serve and configure Apache to use them If you choose you can use your Apache configuration for your current server This may mean restoring the configuration from tape backup if you cannot directly access it from its current hard drive Simply move the cur rent Apache configuration out of the way and copy your complete Apache configuration in this example we have put it in home knoppix apache in its place sudo mv etc apache etc apache bak sudo cp a home knoppix apache etc apache Otherwise you can edit Knoppix s Apache configuration directly All of the Apache configuration in Knoppix can be found in etc apache with the main configuration file being etc apache httpd conf Add any special changes you need to make for your site such as adding multiple virtual hosts or chang ing the location of the DocumentRoot directory Remember that when copy ing over the configuration and the accompanying web content you must change any paths in httpd conf to point to the new content directories that you have created Also if you are adding virtual hosts remember to change the IP addresse
555. till have Knoppix run some of its hardware configuration scripts This type of installation is a blend of the best features of the other two system types The downside is that the hardware detection scripts can potentially overwrite any hardware settings you might have made manually the next time the sys tem reboots Knoppix This choice basically creates a copy of the live disk on your hard drive and allows you to boot from it Just like the disk this option installs only a single user system with disabled passwords Think of this option as running the Knoppix disk only without the disk restriction so you can permanently install new software or updates and permanently edit 116 Chapter 4 Install Linux with Knoppix Explore the Knoppix Installer system files Because passwords are disabled this system type is poten tially less secure than the other two Once you choose a system type the installer shows you a list of potential partitions on which it can install If you don t want to install on any of these partitions click Previous until you can choose the Partition option and then create a new partition Once you select a partition Knoppix asks for personal information such as your name your username your user and root password and where you want to install the boot loader You won t necessarily be asked all of these questions It depends on the system type that you have chosen for instance the Knoppix system type uses
556. ting block and with the same partition type Write down the exact size of the new parti tion because this information is necessary to use ntfsresize Then write your changes to the disk Don t worry This does not actually delete any data on the partition it only changes the partition table itself a table describing where partitions begin and end located at the beginning of your hard drive If you decide not to resize the partition you can still turn back by using cfdisk or fdisk to change the partition size back to its original value You did remember to write those down right If you leave the partition table at its new size do not try to reboot to Windows until you finish the steps or you could lose or damage your files Once you resize your NTFS partition you might need to reboot before the kernel uses the new partition table Fdisk or cfdisk should notify you if this is the case once you write the changes After the new partition table is written and ready you can resize the partition with the following command knoppix ttypo knoppix sudo ntfsresize s size dew hda1 Replace size with the new size of the partition that you wrote down earlier and replace hda1 with the partition you want to resize By default the size parameter is in bytes but you can specify kilobytes megabytes or gigabytes by appending K M or G respectively Make sure that the size you specify with ntfsresize is the exact new size of the partition yo
557. ting swap partitions it finds on the hard drive This saves you extra steps of disabling the swap later if you need to delete the swap partition to create new partitions on your drive for the install There is no need for a Gentoo Live CD because the Knoppix CD is replacing it in your setup When the desktop finishes loading open a termi nal window At the prompt type knoppix ttypo knoppix su This switches the current user to root and reloads the shell configuration Next type root ttypo root mkdir mnt gentoo While naming the mount point gentoo is not strictly necessary it does make it easier to follow the install documentation that asks you to mount the root filesystem under mnt gentoo All Knoppix specific steps have now been completed The first page of the Gentoo Installation Handbook has links to each chapter of the install You are using a Knoppix CD for the install so the first few chapters only provide information about the install process You won t actu ally start performing any of the steps until Chapter 4 Chapter 1 of the Gentoo Installation Handbook provides an overview of the entire installation process Chapter 2 describes the differences between the stages and how to boot the Gentoo CD When you read Chapter 2 ignore the CD booting steps and instead focus on the differences between a Stage 1 Stage 2 and Stage 3 Chapter 4 Install Linux with Knoppix 125 HACK 44 HACK 45 Update a K
558. tings to boot into Win dows XP by default Either use a tool like bootcfg and boot into Windows 2000 or edit the boot ini with Notepad Instead of rebooting you can mount the new Windows 2000 partition read write click on the drive icon on the desktop to open it then right click on the icon and select Change Read Write Mode Next open up the boot ini file with a text editor from Knoppix and change it to the following boot loader timeout 30 default multi 0 disk 0 rdisk 0 partition 3 WINDOWS operating systems multi 0 disk 0 rdisk 0 partition 1 WINNT Windows 2000 fastdetect Chapter 7 Rescue Windows 255 HACK 87 HACK 88 Back Up Files and Settings multi 0 disk 0 rdisk 0 partition 3 WINDOWS Windows XP Professional fastdetect You have changed the partition information for the XP boot to read partition 3 Now when you reboot the system loads Windows XP by default You can also use this ability to create a boot ini file from scratch in case your file has been corrupted and the Windows Recovery CD is nowhere in sight Here is a sample boot ini file that should work for most default single OS Windows installations This sample assumes that you have installed Win dows on the first partition on the first IDE drive the default for most home desktops and that all of the system files are located in the WINDOWS directory on that partition boot loader timeout 30 default multi 0 disk 0 rdisk 0 partition 1
559. tion directory Each klik recipe has to create its own wrapper script Sometimes application binaries even contain hardcoded paths In these cases the software must be patched by klik in order to change paths to point to the local application directory Luckily KDE applications generally do not use hardcoded paths Writing klik recipes by hand for every application is a bit tedious there should be a better way to manage live CD software installation The idea behind klik s serverside apt project is to automatically generate klik recipes for all software in the Debian distribution on the fly There is a working development version you can try by pressing Alt F2 and entering klik packagename Replace packagename with the name of any Debian package such as bidwatcher which is known to work If you are a programmer interested in advancing serverside apt please contact the klik development team Simon Peter 106 Chapter 3 Tweak Your Desktop HACK Install Programs to the Live Disk 37 ME Install Programs to the Live Disk i 37 Use graphical tools to install programs directly to the booted disk Installing software to a live Knoppix disk used to be a complicated matter of putting files in a special location in the home directory and then creating a complicated series of symlinks Now that Knoppix has used AUFS to merge the ramdisk over the top of the main filesystem you can write basically any where you like This means th
560. to enable it All you need to do is add an extra MX record in the DNS zone for that domain Configuring DNS is outside of the scope of this hack but essentially locate the MX records for your domain and add a new record that points to this new backup mail server Make sure that the number assigned to this new mail server is higher than the primary mail server This ensures that the primary mail server will ulti mately receive the mail For instance assume I had a zone entry of example com IN MX 100 mail1 example com Chapter 5 Put Knoppix in Your Toolbox 153 HACK 52 HACK 53 Run Other Emergency Services If I needed to add a new A record so that my new Knoppix host s IP was assigned mail2 example com then I would add a new record below the pri mary MX record that looked like this example com IN MX 200 mail2 example com After this configuration I would need to reload my DNS server to reflect the changes New mail should start to be redirected to mail2 example com now As mail spools there be sure to monitor the storage on the machine to make sure that it doesn t fill up before the primary mail server comes back online Once the server does come back online all of these queued messages will start being delivered one after the other Type mailq in a terminal to see how many messages are currently queued on the system Once the primary mail server comes online wait for the mail queue to empty and then you ca
561. tomatically start iceape again only this time your kiosk page will be revealed Hit F11 to display it full screen One potential security flaw with the iceape kiosk mode is that it displays an icon on the toolbar that you can click to go to the Debian home page A user could use this icon to leave your kiosk page and potentially browse the rest of the web This is something to keep in mind when deciding between it and the firefox kiosk modes If you want to use firefox like the Knoppix CD hit Ctrl Alt F1 to go to a Knoppix shell and then type rm etc alternatives mozilla ln s usr bin firefox etc alternatives mozilla init 2 init 5 This will change the mozilla alias so that it runs firefox instead of iceape Now you can follow the steps for the CD to do the final steps to set up the kiosk mode to KDE hit Ctrl Alt F1 to get to the terminal and type root tty1 echo DESKTOP kde gt etc sysconfig desktop root tty1 init 2 amp amp init 5 RK If you decide you want to leave the kiosk mode and go back Save Kiosk Settings With the kiosk up and running you will want to save all of your hard work to easily start in kiosk mode later The easiest way to do this is to use the saveconfig script that is mentioned in Hack 26 The kiosk is probably loaded so the easiest way to run this script is to hit Ctrl Alt F1 to get to a console and then run the script as the knoppix user root tty1 su kno
562. top like many new laptops lacks a legacy serial port This pre sents a problem when using serial devices but luckily there are USB to serial adapters readily available with support for Knoppix I suggest the use of the Keyspan adapter series because most of its adapters seem to be supported under Linux with the company s sponsorship I use the Keyspan USA 19HS How patriotic of them It s a single USB port to DB 9 and it s bus powered GPS unit If you want to combine GPS statistics with your wardriving you need a GPS unit I have one of those yellow Garmin eTrex units It s a useful unit to have if you need a GPS unit for use without a computer This unit supports interfacing with a DB 9 serial cable These cables are available online for approximately 40 although it s possible to make your own Basically any GPS unit works if it s compatible with gpsd According to usr share gpsdrive GPS receivers the known compatible modules are Magellan 310 315 320 Garmin GPS III Chapter 5 Put Knoppix in Your Toolbox 159 HACK 54 HACK 54 Wardrive with Knoppix Garmin etrex GPS 45 Crux II GPS PCMCIA card Holux GM 200 serial version Holux GM 200 USB needs USB to serial support in kernel Holux GM 210 USB needs USB to serial support in kernel Garmin eMap Garmin GPSMAP 295 Garmin GNS 530 Garmin GPS 12MAP EAGLE Expedition II DeLorme Earthmate Rayming TripNav TN 200 Haicom HI 203E GM 307 USB
563. tory instead of etc If you are back ing up a large filesystem you should be backing it up to another mounted filesystem such as mnt hdb1 knoppix tty1 hda1 sudo tar cvzf mnt hdb1 hda1 tar gz Replace mnt hdb1 with the mounted filesystem to which to save this archive To save a backup over the network you can pipe tar to ssh with this command knoppix tty1 hda1 sudo tar cvzf ssh username 192 168 0 2 cat gt home username hda1 tar gz To restore mount the filesystem you wish to restore cd to it and run the same command used to restore from etc tar gz If you only want to restore a particular directory for instance home then specify that directory on the command line like so knoppix tty1 hda1 sudo tar xvzf mnt hdb1 hda1 tar gz home Tar is an old archival tool but still does a great job for back up and recovery in most circumstances With these basic backup and recovery options you can take a Knoppix CD to any machine and back up or recover important files quickly with consistent results and without worrying about backed up or restored files being written to by other programs in the process 222 Chapter 6 Repair Linux Migrate to a New Hard Drive E Migrate to a New Hard Drive Move your complete system to a new hard drive Not only do hard drives hold your programs and data but they fill up and run out of free space sooner than you would like When this happens it s time to buy a l
564. tra steps when you want to access them from a rescue CD Luckily Knoppix has all of the tools you need to mount your LVM partitions and can set them up in only a few steps First boot your system into Knoppix and open a terminal To mount the LVM you need to have a copy of the configuration file for that LVM Of course it is likely to be stored on the partition you are trying to mount so how do you get it Multiple copies of the LVM configuration are stored near the beginning of each LVM partition so once we have identified the LVM partitions we can then grab the configuration from them Use fdisk to iden tify all of the LVM partitions on the system sudo fdisk 1 Disk dev hda 255 heads 63 sectors 1044 cylinders Units cylinders of 16065 512 bytes Device Boot Start End Blocks Id System dev hda1 1 13 104391 83 Linux dev hda2 14 1044 8281507 8e Linux LVM In this example I have a default Fedora install that has only created a single LVM partition dev hda2 If your LVM partition spans multiple disks then you will need to first assemble your array before you can grab the configura tion Load the md module then use mdadm to scan the available disks in your system for any RAID arrays and output the results into Knoppix s mdadm configuration file Finally start the array sudo modprobe md sudo mdadm examine scan gt gt etc mdadm mdadm conf sudo mdadm assemble auto yes dev mdo dev sd ab 1 Here I m
565. trial and error For example even though Nvidia cards have 3d support under Linux their drivers aren t automatically included with Knoppix If your card does work type knoppix desktop bery1 at the boot prompt The text mode cheat code type knoppix 2 at the boot prompt is useful in circumstances when you don t need a full graphical environment or your graphical environment does not work This cheat code goes through the full hardware detection but leaves you at a simple prompt instead of launching a desktop environment On machines with less than 64 MB of RAM less than 82 MB if using KDE this mode lets you boot into Knoppix and take advan tage of all of Knoppix s command line utilities just without the desktop environment This mode is also useful because it quickly boots into a full shell without the wait for X and a desktop environment to load After you boot into text mode you can switch into a full desktop environment by 10 Chapter 1 Boot Knoppix Speak Different Languages changing your runlevel at a prompt type the following command and Knoppix will start up the default desktop environment root tty1 init 5 The splash cheat code adds some extra eye candy to the boot process This cheat code replaces the colorized text output with a fancier graphical back ground as the system is booting reminiscent of loading Windows Hit the Esc key to drop back to the default text output The noeject and noprompt cheat
566. ts corrupted you might find yourself unable to boot back into Windows While the Windows Recovery CD can restore a default boot file unlike Knoppix it won t let you edit it directly Back in the old days of Windows you could change many different startup settings by editing ini files that were in the root of your hard drive Over the years Microsoft has moved most of the settings that control configuration to the registry but there is one important file that remains boot ini In this file you can find information that the Windows boot loader uses to deter mine booting options and in the case of more than one Windows OS on a system which OS to boot For example this is a boot ini file that allows you to boot between Windows 2000 and Windows XP Professional boot loader timeout 30 default multi 0 disk 0 rdisk 0 partition 1 WINNT operating systems 254 Chapter 7 Rescue Windows Fix the Windows Boot Selector multi 0 disk 0 rdisk 0 partition 1 WINNT Windows 2000 fastdetect multi 0 disk 0 rdisk 0 partition 2 WINDOWS Windows XP Professional fastdetect This file is split into two parts the part that contains settings for the boot loader that starts with boot loader and the part that containing the differ ent operating systems available for booting that starts with operating systems The first option timeout controls how many seconds the boot loader waits before booting the default operating system The
567. ttings to Knoppix type knoppix ttypo knoppix cp a reply yes mnt hda1 Documents and Settings username Application Data Open0ffice org2 user home knoppix office If you want to be prompted for each file that will be overwritten remove the reply yes option Instant Messaging and IRC The multiprotocol instant messenger program Gaim also has a client for Windows You can share your Gaim configuration by typing knoppix ttypo knoppix cp a mnt hda1 Documents and Settings username Application Data gaim home knoppix The IRC client Xchat also has a Windows port You can copy its settings with knoppix ttypo knoppix cp a mnt hda1 Documents and Settings username Application Data X Chat 2 home knoppix xchat2 Use My Documents Making use of your existing application settings is nice but sometimes you really just want to listen to your music collection I mean fill out some TPS reports for work To make your Windows data readily accessible create a symlink to your Windows My Documents directory by typing knoppix ttypo knoppix ln s mnt hda1 Documents and Settings username My Documents home knoppix Desktop Remember to change your Windows partition to have write access if you want to save the changes that you have made As you can see it is pretty easy to make use of configuration files for the applications your Windows and Knoppix systems have in common and to access your Windows datafiles for use un
568. tton and then select only the relevant groups of plug ins from what s now available If you know the host you re going to scan isn t a Cisco router you don t need to scan it with every Cisco plug in Choose your selection depending on your need This increases the speed of your probing as it s going to test only what you tell it to Chapter 5 Put Knoppix in Your Toolbox 169 HACK 99 HACK 55 Audit Network Security g Nessus Setup Nessusd host Plugins Prefs Plugin selection CGI abuses windows Default Unix Accounts Misc Useless services Windows User management General Denial of Service Remote file access Backdoors RPC Enable all Enable all but dangerous plugins Disable all Upload plugin C Enable dependencies at runtime Filter DHCP server info gathering HealthD detection IRCXPro Default Admin password Detect SWAT server port Enhydra Multiserver Default Password DameWare Mini Remote Control Information Disclosure redhat Interchange Detect the presence of Napster Predictable TCP sequence number PHP Nuke sql_debug Information Disclosure Kerberos IV cryptographic weaknesses SiteScope Web Managegment Server Detect l Start the scan Load report Quit Figure 5 6 Nessus Plugins tab Preferences After you select the desired plug ins click the Prefs tab Start at the top and work your way down selecting the options that you want Note that
569. ttp en wikipedia org wiki Vulnerability_assessment e http en wikipedia org wiki Nmap e http en wikipedia org wiki The_Open_Source_Security_Testing Methodology_Manual Wireless Tools Wireless scanning is a relatively new security discipline that has quickly grown into a phenomenon due to a combination of its accessibility to the masses the appeal created by getting out and doing something and the sheer number of access points in play globally Chapter 8 Knoppix Reloaded 311 HACK 101 HACK 101 Full Protection with S T D The drop in equipment costs hardware miniaturization and the creation of powerful semi automatic scanning tools have made it almost a craze with people wardriving warwalking and even warflying no we are not joking see our forum It is an unfortunate fact of life that the masses are in general oblivious to security problems despite the almost constant press coverage Dependent on your country wardriving ranges from questionably ethical to completely illegal However it is a safe bet that within five minutes of walking in any reasonably sized metropolitan area you will find an open access point with DHCP if you want to Do not assume every open access point AP is benign Many open APs are honeytraps It is very easy to create an open AP with something like Dsniff to harvest your passwords For this reason I personally never use free coffee shop type access without at
570. type lan localhost in the location bar and press Enter The machines on the network that LISa detects should appear named according to their IP address as in Figure 5 1 la wy ES laniflosaliost Karguz Q iO gt On kj d Location Edit View Go Bookmarks Tools Settings Window Help QQA0 0G HoA8RRe E gt Location Banoa a S AA z AHome Folder Desktop EAtmp 192 168 0 1 1 SD HmeFer SH xX VW One Item 0 Files One Folder Figure 5 1 Networks detected by LISa Click on a machine to see the different filesharing services it offers see Figure 5 2 Click on any of the folders to access files that the services are offering To access Windows shares click on the SMB folder There are a number of filesharing services LISa supports including FISH filesharing over SSH FTP NFS and SMB My Create an Emergency Router 49 Turn Knoppix into a router or firewall Avoid thinking that Knoppix can be used only for demonstration purposes or is fit only for light desktop use Knoppix is a full fledged portable installa tion of Linux which means it can do most anything an installed version of Linux can do For instance Knoppix comes ready to use as a fully functional Chapter 5 Put Knoppix in Your Toolbox 139 HACK 49 Create an Emergency Router E lansiflasalliia i 122 1 4 941 Konqueror 91515 ix Location Edit View Go Bookmarks
571. u a virtual arcade full of games Primarily you should use Knoppix to complete work but sometimes it s good to have some fun too Knoppix has something for everyone with its broad selection of games Here s an overview of the game categories and descriptions of some of the games All of the games included in Knoppix are organized in the K Menu under Games This submenu lists the different game categories such as adventure arcade board games card games puzzles strategy and a special category for Tetris like games Many of the games in the arcade category revive classic arcade games from the 1980s and most fall into two categories games with spaceships and games with bouncing balls Don t laugh sometimes the simplest games are Chapter 2 Use Your Knoppix Desktop 49 HACK 18 Rock Out with Knoppix Multimedia the most addictive Galaga is a Linux remake of the famous arcade game with more power ups and a faster pace and Frozen Bubble is an addictive clone of Bust A Move also known as Puzzle Bobble Imaze is a multiplayer game that requires both a server and a client Run the server to determine the size of the maze and then connect the client to it to run through the maze firing bouncing balls at your opponents The board and card game categories provide computerized versions of many classic games XBoard KMahjongg and KReversi are computerized counter parts to Chess Mahjongg and Othello The card game catego
572. u created with fdisk or cfdisk Otherwise you risk losing the files on the partition When ntfsresize is finished it sets the partition to require a filesystem check at next boot So when you next boot to Windows the filesystem will be checked with the Windows chkdsk utility before you re allowed to load that OS It is important that you do not mount the new disk under Knoppix until you have allowed chkdsk to run on the new partition that is rebooted in Windows 260 Chapter 7 Rescue Windows HACK Reset Lost NT Passwords 90 Shrink NTFS Partitions The method for shrinking an NTFS partition with ntfsresize is the reverse of the method used to enlarge it You must run ntfsresize on the drive and specify the drive s new size knoppix ttypo knoppix sudo ntfsresize s size dew hda1 The ntfsresize program then attempts to shrink the partition to the specified size If it encounters file fragments or you give it a size that is too small ntfsresize exits with an error that states that the partition size is too small and provides an acceptable size After you resize the filesystem itself you must shrink the partition Use fdisk or cfdisk to delete and recreate the new partition making sure to start the partition on the same block with the same partition type as before knoppix ttypo knoppix sudo fdisk dev hda Fdisk accepts a partition size in kilobytes megabytes or gigabytes just like ntfsresize so just make a
573. u need to test a computer virtual machines allow you to create multiple virtual representations of a physical machine that you can more easily manage In addition virtual machine servers allow you to run a number of virtual servers on a single server to make more efficient use of power and other resources As you start to use virtual machines you might find that you would like to convert a server that you already have running on a physical machine into a virtual machine While there are a number of ways to achieve this I ve found a method using Knoppix that streamlines the process of virtualizing a server while minimizing downtime For this hack I am going to specifically talk about the process of converting a physical Redhat server into a VMware virtual machine but many of the methods I use would apply equally well Chapter 6 Repair Linux 247 HACK 86 HACK 86 Turn a Physical Machine into a VMware Virtual Machine with a few tweaks to other distributions or virtualization technologies or even when migrating a machine from one hardware platform to another Create Your Virtual Machine The first step in the migration process it to create a virtual machine to migrate to The methods and steps to create a VMware virtual machine vary a bit depending on which VMware tools you use and are outside of the scope of this hack but be sure to configure the virtual machine for the type of Linux that matches your current server The s
574. uages Knoppix supports to rapidly create and manage software projects One of the great things about Linux and open source in general is that it isn t an exclusive club Anyone who has the ability can contribute to his favorite projects or start a new open source project of his own Basically Knoppix is built from open source code so it isn t surprising that Knoppix itself includes many of the programs you need to develop and build soft ware of your own Chapter 3 Tweak Your Desktop 97 HACK 33 Develop Applications Unfortunately due to space constraints a lot of the development tools no longer fit on the CD but with the extra space on the DVD even more tools can be included While Knoppix includes compilers and interpreters for many different languages including C C Perl Python Tcl Tk and oth ers it also includes a complete Integrated Development Environment IDE called KDevelop which combines all of the different tools templates pro grams and scripts that developers frequently need into a single application KDevelop can handle your software development from picking a language to writing and debugging your code reading documentation compiling and running your program and even keeping development in sync with others using applications such as CVS and Subversion To start KDevelop click K Menu gt Development gt KDevelop or run kdevelop from a terminal window Within this submenu are a number of d
575. ughout this book Knoppix is described as the Swiss Army knife for sys tem troubleshooting and repair Like a Swiss Army knife Knoppix has many handy tools both general purpose like a knife or a screwdriver and special purpose like a corkscrew Some of these tools are used for specific repairs while others are used for routine maintenance You should not use a Swiss Army knife for the first time when you are locked in a room with a bomb that is just seconds away from exploding we can t all be MacGyver Likewise you should familiarize yourself with Knoppix before you use it to attempt to rescue your sick notebook that you never backed up or the company s failed accounting server This chapter starts you on the path to Knoppix mastery by beginning at the beginning booting Knoppix By using the cheat codes and boot time options covered in this chapter you should be able to get Knoppix to boot on almost any x86 computer The first hacks in this chapter highlight the basics for obtaining the latest version of Knoppix and getting to the boot prompt All new computers sup port booting from an optical CD or DVD drive and many computers attempt to boot directly from a CD rather than from the hard drives on the system In case your computer doesn t support booting directly from a CD I have included instructions for booting Knoppix from a floppy disk and from the network The second part of this chapter covers cheat codes options y
576. ull name The next window prompts you for a username the default is your first initial and last name If that is fine for you then continue to the next window otherwise change the username You are then asked to enter Chapter 4 Install Linux with Knoppix 119 HACK 41 HACK 42 Install Knoppix on a Multiboot System a password for your user You can uncheck Hide typing if you re having trouble entering your password twice The next window looks like the previous one but this password is for the root account The root account is a special account that has the ability to change and delete any file on the system so choose a good password You will use this account only when changing system settings installing pack ages or other potentially dangerous things Once your accounts are set up it is time to enter a few system settings The first setting is the hostname This is the name your computer goes by on the network You are asked to accept the default hostname or enter one of your choosing Next you choose where to install the boot loader This is the only operating system on the disk so choose MBR This installs the boot loader on the boot sector of the Master Boot Record the first 512 bytes on any hard drive that contains the boot code and the partition table Now the con figuration is done and you are ready to install To install Knoppix on your hard drive based on this configuration select Start Installation and
577. ultiple machines distccKNOPPIX 314 music Frets on Fire installing 91 multimedia applications 50 55 pydance installing 90 Musix 329 331 My Documents directory backing up 257 linking 85 myconfig cheat code 79 MySQL running emergency 155 MythTV 326 329 namespaces INSERT 285 naming CD images 7 NAT Network Address Translation configuring 143 navigating desktop 28 34 K Menu 30 33 panels 33 installers 113 118 Internet 62 65 registries 264 Windows shares 138 ncplogin 301 ncurses 319 nessud servers connecting 168 nessus tool 166 173 310 nessus adduser command 167 Network Address Translation see NAT Network File System NFS running emergency 157 networks booting 94 96 Clusterknoppix 316 Damn Small Linux 283 hard drives cloning 180 184 wiping 184 185 joining wardriving 165 locking onto Kismet 163 NX Thin Clients creating 96 Quantian 323 security auditing 166 173 settings saving 76 tools 301 VNC servers 129 130 news readers 63 NES Network File System running emergency 157 Nikto 310 Nmap 310 noapic cheat code 22 noapm cheat code 20 noaudio cheat code 19 noeject cheat code 11 382 Index nofirewire cheat code 22 NoMachine NX servers 131 FreeNX connecting with 133 138 noprompt cheat code 11 noscsi cheat code 22 nowheelmouse cheat code 18 NTFS partitions enlarging 259 shrinking 261 ntfsresize tool 258 Ntop 302 numbers random s
578. un sudo etc init d ssh start 154 Chapter 5 Put Knoppix in Your Toolbox Run Other Emergency Services DHCP DHCP allows you to automatically assign IP addresses to other computers on the network along with other basic network information It s quicker than manually entering the network information into each computer The DHCP configuration file in Knoppix is etc dhcp3 dhcpd conf If you use this machine to replace another DHCP server on the network simply copy the other machine s dhcpd conf file to etc dhcp3 If you do not have a preconfigured dhcpd conf to use here is a simple template you can use to get started Create this file with your favorite text editor then copy it to etc dhcp3 dhcpd conf as root Change the IP addresses to match your local network how long the DHCP lease lasts in seconds default lease time 600 maximum length of lease in seconds max lease time 7200 name servers for clients on all subnets to use option domain name servers 192 168 0 1 192 168 0 2 HHH here we put specific per subnet options HH subnet 192 168 0 1 netmask 255 255 255 0 IPs will be assigned between these two ranges range 192 168 0 50 192 168 0 99 option subnet mask 255 255 255 0 option broadcast address 192 168 0 255 the gateway for the network option routers 192 168 0 1 Once you have configured dhcpd conf start dhcpd sudo etc init d dhcp3 server start If dhcpd is unable to start
579. unstable branch 122 124 dual boot systems 120 122 Gentoo 124 126 navigating installers 113 118 single boot systems 118 120 kernels updating 6 loopback mounting option 182 RealVNC client xvncviewer 130 root kits scanning for 174 176 troubleshooting adding extra drives to RAID 235 configuring RAID 227 230 converting servers to VMware 247 252 copying kernels 246 disabling init scripts 240 243 file systems 211 214 installing RPM packages 245 managing Debian packages 243 244 migrating RAID 230 235 migrating to hard drives 223 225 mounting LVM partitions 237 239 mounting RAID 225 recovering deleted files 214 217 rescuing files from hard drives 217 221 resetting passwords 239 resizing partitions 209 211 restoring and backing up MBRs 205 207 restoring grub to MBRs 203 205 restoring lilo to MBRs 202 searching partitions 207 209 tar command 221 223 linuxrc file 366 LISa LAN information server configuring 138 lists mailing 331 SCSI modules 22 live disk installing applications to 107 109 LNX BBC 282 Local Area Security Linux see L A S Linux local desktops sharing 132 Lock Session menu 33 locking onto networks Kismet 163 Log Out menu 33 Logical Volume Management see LVM logo 16 file 195 logs wardriving 164 loopback files 78 loopback option mounting 182 Lost and Found submenu 32 Ismod command 193 317 LVM Logical Volume Management mounting partitions 237 239
580. unt the drives to get the server up and running Hack 50 until they could rebuild the server In my previous jobs I have often carried a copy of L A S in my back pocket so if I am at another site I can boot to the CD and use VNC tunneled over SSH to connect to my desktop in my office Hack 46 Countless users have informed me of how helpful they find L A S Linux when network troubleshooting in various locations using Ethereal and other tools to ascertain the cause of problems The ability to run nessusd from RAM to create a temporary node for net work vulnerability assessments Hack 55 The ability to recover files from corrupted hard drives or to use tools such as SleuthKit to perform forensic analysis The ability to set up temporary Snort IDS nodes running off of L A S Linux These are just a sampling of the countless uses of L A S Linux Many times your imagination is the only stumbling block to the variety of hacks you can use the distribution to perform The future holds many new additions to the L A S Linux family We are currently rebuilding a new version of the distribution from the kernel up as well as adding a 400 MB Desktop Auditor version with the help of one of our partners ISECOM the Institute for Security and Open Methodolo gies makers of the OSSTMM Open Source Security Testing Methodology Manual See Also The Local Area Security Linux home page at http localareasecurity com The Inst
581. ur Knoppix ISO file and creates a fingerprint that only that one file is capable of mak ing Changing even a single bit affects the MD5sum therefore if any error occurs during the download process the generated sum is different from the one listed on the mirror If both MD5sums match the file you have is exactly like the file on the mirror There are a number of utilities to create an MD5sum under Windows One such tool can be found at hitp www md5summer org Once you install this program run it click on Verify Sums and navigate to the Knoppix ISO you wish to verify and click OK On your Linux machine you will probably find that the md5sum utility is already installed Mac OS X has a similar utility md5 which will print out the MD5sum so you can compare it to what s in the md5 file You ll need to install it if it is not Once md5sum is installed make sure the md35 asc file from the mirror is in the same directory as the image and then type md5sum cv KNOPPIX_V5 1 1CD 2007 01 04 EN iso md5 asc KNOPPIX_V5 1 1CD 2007 01 04 EN iso OK If the md5sums match you are dropped back to a prompt otherwise you receive the following error md5sum cv KNOPPIX_ V5 1 1CD 2007 01 04 EN iso md5 asc KNOPPIX_V5 1 1CD 2007 01 04 EN iso FAILED md5sum 1 of 1 file s failed MD5 check You can also generate an MD5sum from the command line by typing md5sum KNOPPIX_V5 1 1CD 2007 01 04 EN iso 379e2f9712834c8cef3efa6912f3075
582. user which means you can easily save projects to removable media such as a USB drive and then boot Knoppix on a different machine and resume development Even if KDevelop isn t your style you can still use one of the many text edi tors Knoppix provides and take your programming projects with you Chapter 3 Tweak Your Desktop 99 HACK 33 HACK 34 Install Nvidia 3D Drivers X hello KDevelop File Edit View Project Build Debug Scripts Bookmarks Window Tools Settings BQQRRBHwMeVd DHARAAY amp no function j Cal a amp We ea amp le hello cpp File Selector T File List I File Tree Variables File Groups pe include hello h Bookmarks include lt qlabel h gt x include lt kmainwindow h include lt klocale h i S 5 E S a 2 o 3 l O o 2 o ow mA 5 g z Ss QP 3s 3 Ea EJ D S D a a hello hellol KMainWindow 6 hello F lt tiba eile Nd lo E Classes Application Dif Messages gy Findin Files 4 Replace il Konsole Valgrind Line 1 Col 1 INS NORM Figure 3 5 KDevelop Hello World application Install Nvidia 3D Drivers i Get 3D acceleration under Knoppix for your Nvidia graphics card Linux has long had a bad reputation when it comes to 3D gaming There are still many die hard Linux users who dual boot into Windows to play their favorite games Some of this repu
583. usix boots you will be presented with the default Icewm desktop see Figure 8 5 The default desktop contains icons for many of the most popular applications you might want to use but one of the particularly nice features of Musix is how they have organized different desktops for differ ent categories of use While you can click the Musix button at the left of the panel at the bottom to access all of the applications on the disc next to that button are a number of different buttons that correspond to different appli cation categories Mouse over each button to see the particular category Once you click on a button the desktop will change and the current icons on the desktop will be replaced with icons for that category Musix organizes its desktops into the following categories Chapter 8 Knoppix Reloaded 329 HACK 107 HACK 107 Compose Musix Musix DE BEBE OE afd 5 4 Misnet xKonsole ey 07 08PH Figure 8 5 Default Musix desktop General The default Musix desktop that contains the most used applications Help This desktop contains documentation for Musix and some of the appli cations on the disk Office Here you will find icons for the office applications Musix has Some applications of note include gnumeric a spreadsheet application Abiword word processor kwrite a word processor and kcalc a calculator Root On this desktop are a number of root level system programs such as co
584. uster management GUI for monitoring and administrating the cluster To use openMosixview you Chapter 8 Knoppix Reloaded 319 HACK 103 HACK 103 Distribute the Load with ClusterKnoppix must have key based authentication over SSH working Key based authenti cation uses RSA or DSA encryption for special keys that allow you to log in to other SSH servers without entering a password by hand This lets openMosixview communicate with all of the nodes securely without requir ing you to enter a password as it logs into each node If you use the CD ROM boot method you must complete a few extra steps before it works Here is an example for two nodes Node1 IP address 10 33 1 14 is the node where openMosixview is running and Node2 IP address 10 33 1 6 represents a regular node on the network On Nodel open a shell su to root enter a password and remember it knoppix ttypo knoppix su root ttypo root passwd Enter new UNIX password Retype new UNIX password passwd password updated successfully Now generate the keys This DSA key has both a public and private counter part The public key exists on any remote machines this machine wants to connect to and can be used to decrypt packets that this machine creates with the private key root ttypo root ssh keygen t dsa N f root ssh id_dsa Generating directory root ssh Your identification has been saved in root ssh id_dsa Your public key has be
585. ustering This kernel extension turns a network of ordinary computers into a supercomputer for Linux applications The openMosix software makes it easy to create a supercomputer out of your spare machines for heavy number crunching from brute forcing encryption cracking to 3D rendering Details about technologies behind computer clusters and openMosix clusters in particular are outside the scope of this hack For a more thorough explanation consult the open Mosix project http openmosix sf net Set Up a Cluster To set up a cluster you need at least two systems networked to each other via a crossover cable or a switch For small clusters you can get away with 10 MB s of network bandwidth but 100 MB s is advised There are basically two ways to set up an instant cluster with Clusterknop pix with a network boot or with multiple CDs The easiest way is to use network boot PXE or etherboot PXE Preboot eXecution Environment downloads the bootstrapping code to load an operating system the Linux kernel in our case over the network Most new computers support it look for Booting from NIC or PXE in the BIOS If you don t have a PXE capable network card you can get etherboot to do almost the same thing by using a ROM on a floppy to download the bootstrapping code More infor mation about etherboot can be found at http www etherboot org If your computer doesn t have a PXE or working Ethernet you don t want to boot fr
586. utions today default to a desktop manager that lets you log in graphically This desktop manager is typically set to run continuously so that even if X is stopped it automatically restarts itself and presents you with another login screen If X is broken the desktop manager resets every five seconds or so which makes it rather tricky to quickly switch to a virtual terminal log in as root and disable the program Some desktop managers now set a maximum number of restarts before disabling the pro gram for you and you can also disable this script in a nongraphical or sin gle user runlevel but for the purposes of demonstration I will explain how to disable the desktop manager In the previous example the default runlevel for Knoppix is 2 Change to the directory for that runlevel on your root partition in this example mnt hdal etc rc2 d This directory has a number of scripts but you want to dis able the desktop manager so you are interested only in scripts for xdm gdm or kdm the three common desktop managers In your system you must determine which desktop manager is actually used or otherwise simply dis able any of the three that you see for that runlevel Typically the desktop manager is one of the last scripts to be run so it is often numbered 99 This is a script that is started at boot so the symlink starts with an S to disable gdm the desktop manager for Gnome look for a file named 99gdm or something similar To disab
587. ve remote desktop environment for Linux even over slow network connections Before exploring the technical details of NX you should run the test drive first to see the performance NX offers NX Client is already included with Knoppix To start NX Client click K Menu gt Inter net gt NX Client for Linux The NX Connection Wizard starts and allows you to create a new session It asks for a name for the session nxserver host and optionally a port which in most cases is just the SSH port 22 You can also select the speed of your connection Even if you have a very fast connection it s worthwhile to try modem speed first Chapter 5 Put Knoppix in Your Toolbox 133 HACK 47 Run X Remotely with FreeNX If you don t have an NX Server to which to connect visit NoMachine s web site at http www nomachine com testdrive php and sign up for its test drive You ll receive an email with details on how to connect to its test server You can select the type of the connection Windows Unix VNC and the preferred desktop in the next step NX can connect to other servers at the backend so it s also useful as a secure and fast gateway to Windows or VNC machines You can use a full screen in which case you can click on the top right pixel to minimize the session or a specified size for the session window You can also select SSL encryption to tunnel all traffic over SSH For the administrator of the network and the
588. ve some partitions to clear up space click K Menu gt Sys tem QTParted Hack 69 Once you have a partition that meets these 334 Chapter 9 Knoppix Remastered HACK Create a Customized Knoppix 109 requirements go to your root shell and mount it with read write permissions root ttyp1 knoppix mount o rw dev hda1 mnt hda1 Replace hda1 with the partition and mount point you are using Check Available RAM CD Remastering a Knoppix CD requires about one gigabyte of total RAM physical memory plus swap It needs this much RAM so it can fit the entire compressed KNOPPIX image into RAM during the remastering process while still having some extra RAM available for the OS itself You can check the amount of total RAM on your system by adding up the total column for both Mem and Swap rows root ttyp1 knoppix free total used free shared buffers cached Mem 515264 218832 296432 0 5932 115728 buffers cache 97172 418092 Swap 0 0 0 In my case I have 515 264 KB about 503 MB of physical memory and no swap I need at least one gigabyte of memory so I will create a 750 MB swap file From within the mounted partition I run the following commands root ttyp1 hda1 dd if dev zero of swapfile bs 1M count 750 750 0 records in 750 0 records out 786432000 bytes transferred in 27 858599 seconds 28229417 bytes sec root ttyp1 hda1 mkswap swapfile Setting up swapspace version 1 size 786427 kB root ttyp1 hda1 s
589. ver if he wants to use NX you must activate his account for the NX server First add joe to the NX user data base then give him a password knoppix ttypo knoppix sudo nxserver useradd joe knoppix ttypo knoppix sudo nxserver passwd joe Joe can now use the NX Client on his laptop to connect to this machine Server Management The NX server has a number of command line options help Shows a small help page useradd Adds a user userdel Deletes a user userlist Lists all configured users passwd Sets a password for a user start Starts NX server stop Stops NX server This option does not stop the SSH daemon restart Restarts NX server status Shows whether the server is currently running Chapter 5 Put Knoppix in Your Toolbox 137 HACK 48 Browse Windows Shares list Each session that starts on the server receives a unique session ID This option lists all running sessions terminate Terminates all sessions for a user Alternatively you can terminate users based on the display number they use to connect suspend Suspends a session to be reconnected later send Sends a message to the specified user broadcast Enables you to send a message to all connected users lock Locks the display of a user unlock Unlocks the display of a user Fabian Franz TJI Browse Windows Shares 48 Graphically browse Windows files on your network Microsoft has made it easy to b
590. ver answers a client s request for an address Configure openMosix In X click on K Menu gt KNOPPIX gt Services gt Start KNOPPIX open Mosix Terminal Server see Figure 8 1 In the dialog that appears select setup re configure server and re start and press OK Next choose the NIC where your DHCP TFTP NFS server is listening and press OK Now you can add the IP address range you want to distribute to the client nodes The default that the wizard uses should be sufficient for most applications Now select the correct network modules You must select all the modules that your client nodes uses For example if you have three clients each with a different NIC select those three modules on this screen They are probed automatically on each client node at boot time A number of common NIC modules are already checked in this list so if you aren t sure which module your NIC uses try the default and skip ahead Otherwise you can try boot ing Knoppix directly on the machine and checking which module it uses for your NIC with the lsmod command run from a terminal Chapter 8 Knoppix Reloaded 317 HACK 103 HACK 103 Distribute the Load with ClusterKnoppix Eurdpas gr te Messe und Linux und Freder Software LINUX 26 Ju ongressrentrum Karlsruhe Jetzt kostenlos vorregistrieren unter www linuxtag org TAG oder kostenlose Eintrittskarte auf dem Knoppix Desktop ausdrucken All Applications T Development
591. verything would be back to normal Chapter 6 Repair Linux 207 HACK 68 Find Lost Partitions Lucky for me there is such a tool gpart short for guess partition Gpart scans a hard drive for signs of a partition s start by comparing a list of file system recognition modules it has with the sectors it is scanning and then creates a partition table based on these guesses Doubly lucky for me gpart comes included with Knoppix so I was able to restore my laptop s MBR without having to take apart the laptop and hook the drive to a desktop machine I ran gpart checked over its guesses which matched my drive and voila My partitions were back Gpart is an incredibly useful tool and I am grateful for it however it does have its limitations Gpart works best when you are restoring a partition table of primary partitions In the case of extended partitions gpart tries its best to recover the partition information but there is less of a chance of recovery To recover your partition table run gpart telling it only to scan your drive knoppix ttypo knoppix sudo gpart dev hda By default gpart only scans the drive and outputs results it does not actu ally write to the drive or overwrite your MBR This is important because gpart may not correctly guess all of your partitions so you should check its guesses before you actually write them to disk Gpart scans through the hard drive and outputs possible partition tabl
592. ves you the following options Frontend Configures and runs KnoppMyth as a frontend Auto Install Automatically installs to disk Auto Upgrade Attempts to upgrade previous version Manual Install Configures and installs to hard disk Reboot Reboots the machine Quit Exits to console prompt Chapter 8 Knoppix Reloaded 327 HACK 106 HACK 106 TiVo Your Computer A KnoppMyth frontend uses the MythTV interface the frontend but accesses a different MythTV server the backend for listings recorded shows and so on The Frontend option is the only one that actually uses KnoppMyth as a live CD This option requires another machine on the net work that is configured with MythTV potentially another KnoppMyth install with MySQL listening http www mythtv org docs mythtv HOWTO 6 html Answer some questions about your MythTV backend server and then the MythTV frontend software loads This can be useful in case you already have MythTV configured on the network recording shows for your TV but you want to watch them on your computer instead If you intend on sending the frontend output to a TV then at the boot prompt type tv This boots KnoppMyth to an 800x600 resolution suitable for TVs The Auto Install option is the main purpose of KnoppMyth Select this option and answer some very basic questions such as your name user name and password and then KnoppMyth automatically partitions your hard drive and installs Deb
593. view the syslog for details including possible errors you might have made in dhcpd conf DNS The name resolution services provided by a DNS server are essential to any modern day network Knoppix comes with complete support for running your DNS server with the included BIND9 package The simplest way to get your DNS server up and running is similar to the method used in Hack 51 First move etc bind out of the way with this command sudo mv etc bind etc bind bak Second copy your complete BIND configuration some distributions put it in etc bind while others put it in etc named to etc bind Chapter 5 Put Knoppix in Your Toolbox 155 HACK 53 HACK 53 Run Other Emergency Services Now start BIND by typing sudo etc init d bind9 start Now your DNS server is up and running If BIND does not start after this command check the syslog for any errors it might have reported MySQL Databases are vitally important to most businesses and a rising star in the database world is the open source MySQL database This database has proven to be especially popular as a backend to dynamic web sites because of its low cost and amazing speed If you have a MySQL database server that is down and need to run something in its place you may be able to use Knoppix which contains the MySQL database program To configure MySQL under Knoppix first start the MySQL server sudo etc init d mysql start There are differen
594. wapon swapfile root ttyp1 hda1 The dd command creates a 750 MB file full of zeros The mkswap command formats that file with the swap filesystem Finally the swapon command starts using the file for swap DVD Remastering a Knoppix DVD requires at least 2 5 gigabytes of total RAM physical memory plus swap It needs this much RAM so it can fit the entire compressed KNOPPIX or KNOPPIX2 image into RAM during the remastering process while still having some extra RAM available for the OS itself You can check the amount of total RAM on your system by adding up the total column for both Mem and Swap rows root ttyp1 knoppix free total used free shared buffers cached Mem 515264 218832 296432 0 5932 115728 buffers cache 97172 418092 Swap 0 0 0 Chapter 9 Knoppix Remastered 335 HACK 109 Create a Customized Knoppix In my case I have 515 264 KB about 503 MB of physical memory and no swap I need at least two gigabytes of extra memory so I will create a 2048 MB swap file From within the mounted partition I run the following commands root ttyp1 hda1 dd if dev zero of swapfile bs 1M count 2048 2048 0 records in 2048 0 records out 2147483648 bytes 2 1GB copied 90 7975 seconds 23 7 MB s root ttyp1 hda1 mkswap swapfile Setting up swapspace version 1 size 2147479 kB root ttyp1 hda1 swapon swapfile root ttyp1 hda1 The dd command creates a 2048 MB file full of zeros The mkswap co
595. ware support extends to printers and Knop pix provides a simple graphical configuration tool for setting up any print ers you may need to use Click K Menu gt KNOPPIX gt Configure gt Configure printer s to launch the KDE printer manager In this application you should find that a few special printers for faxing and printing PDFs have already been created for you These default printers are provided by the Common Unix Printing Sys tem CUPS that is running on the Knoppix CD CUPS is the standard print ing system on most Linux distributions and is even the underlying print technology behind Apple s OS X operating system To launch the new printer wizard to add a new local printer click Add gt Add Printer Class The printer wizard has support for many types of printer connections and this hack describes some of the more common ones After the first few ques tions the configuration is the same for both local and network printers the first question the wizard asks is where the printer is located For printers that are physically connected to the computer with a parallel serial or USB cable select Local Printer You will be presented with a list of local devices your printer is connected to If you use a parallel port you most likely need to select Parallel Port 1 and if you use a USB connection you should probably select USB Printer 1 These selections mean that the printer is connected to your first parallel or USB port
596. watch recorded video and DVDs play arcade games and even check the weather Think TiVo or Microsoft Media Center on steroids and you get an idea of what MythTV can do MythTV is a great project and easy to use once it is running but many peo ple find it difficult to install and configure MythTV and all of its compo nents especially the installation and configuration of the TV Tuner hardware itself under Linux KnoppMyth automates the process of configuring MythTV on a standalone computer Desktop environments like KDE and the applications most other Knoppix based distributions include are absent from KnoppMyth which only includes software to install and configure a MythTV system Knopp Myth uses Knoppix s hardware configuration scripts to make it easy to detect TV Tuners video cards and other hardware As with MythTV to use KnoppMyth you need to register with the free Zap2It DataDirect service to download TV listings for your area Go to http labs zap2it com and click on the New User Sign Up link to register with the service As you fill out the survey on the registration page notice that it asks for a certificate code As explained at http vww mythtv org docs mythtv HOWTO 5 html ss5 4 use ZIYN DQZO SBUT Use your login and password in the MythTV setup program after Knopp Myth is installed When you boot KnoppMyth for the first time the first thing you see is a no frills frontend for the installation script that gi
597. wer users and sys tem administrators may use it for rescue operations grabbing data from a defective or nonbooting filesystem on a different OS or ad hoc installations of web file or print servers with or without hard disk installation With the terminal server utility which is just a shell script that creates configuration files for DHCP NFS and squid and starts all of them you can boot an entire classroom of PCs over a local network using just a single CD ROM which comes in handy if you want to run an Internet cafe for example It s also a good tool for learning about operating systems or for functioning as a base if you want to customize your own bootable GNU Linux CD The Future Knoppix the downloadable edition from LinuxTag will continue being a public experiment with a snapshot of the current most representative desk top programs rescue tools and some popular servers installed The chal lenge of keeping hardware support up to date is always difficult Some of the newer hardware components especially hotpluggable devices require that binary firmware files be uploaded to the device during activation Unfortu nately the licenses of the firmware don t allow free redistribution in every case so some hardware will never be supported in the download edition even if drivers are available for private use One attempt to circumvent this nontechnical problem with proprietary licenses is the live installer that was add
598. when it boots If it picks a resolution that s too high or there is some other problem with framebuffer support on your machine you will see a blank screen and are not able to read any console output If you want to disable the framebuffer console completely and use a regular 25 by 80 character mode console instead add the following to the boot prompt it will still start up X after the system boots vga normal 18 Chapter 1 Boot Knoppix HACK Use Advanced Knoppix Cheat Codes 8 Wr Use Advanced Knoppix Cheat Codes 8 Choose advanced options for system tweaking and booting on exotic systems Knoppix s cheat codes let you change many of its default behaviors These range from which desktop environment to use to whether or not to eject the CD at shutdown While many of the cheat codes are merely enhancements to the defaults there is also a full set of advanced options Many of these advanced cheat codes can help you work around bugs in your hardware or in Linux s support of your hardware or disable default options that could prevent Knoppix from booting Some of the more advanced cheat codes for Knoppix are listed in Table 1 4 Table 1 4 Advanced cheat codes Cheat Code Purpose knoppix no acpi apic agp apm audio Skip parts of hardware detection ddc firewire isapnpbios pcmcia scsi swap usb Failsafe Boot with almost no hardware detection knoppix pci bios Workaround for bad PCI controllers knoppix m
599. when it starts up it is pretty simple to disable the sounds First edit the source KNOPPIX etc X11 Xsession d 45xsession file Find the startwindowmanager function in the script for your window manager by default startkde To disable the startup sound simply comment out the playsound command for your window manager with a character startkde Play sound playsound Disabling the shutdown sound requires that you edit source KNOPPIX etc init d xsession Find the section in the script that looks like the following Play informational sound if soundcore module present checking dev sndstat is unreliable OGGPLAY usr bin ogg123 PLAY usr bin wavp x PLAY PLAY usr bin play sample x PLAY PLAY usr bin play if x OGGPLAY a f usr share sounds shutdown ogg then case 1smod in sound 0GGPLAY q p 64 usr share sounds shutdown ogg gt dev null 2 gt amp 1 amp sleep 7 esac elif f usr share sounds shutdown wav a x PLAY then case lsmod in sound PLAY usr share sounds shutdown wav gt dev null 2 gt 81 amp sleep 7 3 esac fi Then comment out the complete if statement so that the section looks like this Play informational sound if soundcore module present checking dev sndstat is unreliable OGGPLAY usr bin ogg123 PLAY usr bin wavp x PLAY PLAY usr bin play sample x PLAY PLAY usr bin play if
600. when you backed up your settings and extracts the files from configs tgz like to save you must run the saveconfig script again RK Remember that if you make any new changes that you would Create a Persistent Disk Image Knoppix offers a second very powerful method to make settings persist Through the use of the knoppix mkimage script Knoppix can also save all changes you have made since you booted the system and can restore them at later boots Thanks to the power of AUFS all changes you make on the filesystem are stored in a separate ramdisk transparently The knoppix mkimage script simply backs up all of these changed files Upon reboot Knoppix can use this image and restore all of the files you changed no mat ter where they were on the filesystem This makes it quite a bit different from the saveconfig script which just backs up user settings configuration files and the desktop Another difference with this method is that creating a persistent disk image allows Knoppix to mount this new image on top of its regular filesystem so as long as you tell Knoppix to use this image any changes or new files you create are still changed the next time you reboot without the need to run the script again To create the persistent disk image run K Menu gt KNOPPIX gt Configure gt Create a persistent KNOPPIX disk image or from a console run knoppix ttypo knoppix sudo usr sbin knoppix mkimage The execution of this script is simi
601. wiki files and then run a kwiki command to create a new kwiki site in that directory mkdir home knoppix kwiki kwiki new home knoppix kwiki Configure Apache Now that kwiki is installed and ready to go the next step is to configure apache to use it First open the etc default apache2 file in a text editor with root permissions for instance type sudo kedit etc default apache2 and make sure that the NO_START variable is set to 0 like below NO_START 0 Now change to the Apache mods_enabled directory and enable the CGI module cd etc apache2 mods_enabled sudo ln s mods_available cgi load Now that CGls are enabled create a new virtual host entry for kwiki Open a text editor with root permissions and save the following file as etc apache2 sites_available kwiki Alias home knoppix kwiki lt Directory home knoppix kwiki gt Order allow deny Allow from all AllowOverride All Chapter 5 Put Knoppix in Your Toolbox 199 HACK 64 HACK 64 Create a Weekend Wiki Options ExecCGI AddHandler cgi script cgi lt Directory gt Now changes to the Apache sites_enabled directory disable the default vir tual host enable the kwiki virtual host and start apache2 cd etc apache2 sites_enabled sudo rm 000 default sudo ln s sites_available kwiki 000 kwiki sudo etc init d apache2 start Test the wiki Now that Apache has started go to http localhost in a web browser and y
602. with routing or with NAT Generally you want to use routing to connect two local net works so that machines on either network can communicate directly with 140 Chapter 5 Put Knoppix in Your Toolbox HACK Create an Emergency Router 49 any machine on the other network Use NAT when you need to share a sin gle Internet or network connection across a local network with the NAT machine acting as a sort of firewall Machines on the other side of the NAT are not able to communicate directly with local machines unless you set up firewall rules on the NAT machine to forward ports To create either of these routers you must enable IP forwarding in the Linux kernel Most firewall and routing HOWTOs instruct you to do this by run ning the following command as root root ttypo root echo 1 gt proc sys net ipv4 ip_forward However under Knoppix this directory is protected so you must use sudo like this knoppix ttypo knoppix sudo sh c echo 1 gt proc sys net ipv4 ip_forward Now that IP forwarding is enabled you can configure your router If you are dropping this Knoppix machine in the place of a broken router save a lot of trouble by giving Knoppix the same IPs as the previous router In the case of a non NAT router once you provide Knoppix with the same IPs and enable IP forwarding the router is ready to go For the purposes of these examples assume that the Knoppix computer is connected to two networks 192 168
603. without That is unless you have a PC and a Knoppix CD In this hack I will discuss how to add open source clones of these popular games to your Knoppix CD for a party arcade you can take with you anywhere Knoppix actually does not come with either of the games required for this hack so I will walk you through installing pydance and Frets on Fire Both are open source games that are similar to Dance Dance Revolution and Gui tar Hero respectively You will need at least 200 MB of removable storage you can use to make these changes persistent a USB key is ideal To start boot up your Knoppix CD with the depth 24 cheat code to make sure the desktop starts with 24 bit color depth Also make sure that the computer is connected to the Internet you ll need Internet access to download the extra software Let s Dance The first game to install is pydance http icculus org pyddr which is an open source Dance Dance Revolution clone written in Python Pydance sup ports a number of difference dance pads that are designed to hook up to a PC typically with a USB interface and even supports joysticks and the arrow keys on a regular keyboard Pydance supports multiple players multi ple difficulty levels and can read a number of different dance formats including those used with popular dance games like DDR In addition pydance has its own dance file format that you can use to create custom dance moves and there are communities such as the D
604. ws shares 138 Samba servers 147 local desktops 132 Shingledecker Robert 282 Shorewall 297 shortcuts 29 shred tool 184 185 shrinking apt get databases 343 NTFS partitions 261 shutdown sounds disabling 348 Sieg Peter 282 single boot systems installing as 118 120 site surveys 159 166 size INSERT 286 Sleuthkit 176 slideshow presentations Impress OpenOffice org 41 Smart Boot Manager 3 smbclient 301 sndconfig program 23 51 Snort 300 software Freeduc 279 281 remastering 334 340 see also applications Solitaire 50 386 Index sound configuring 51 disabling 348 editing 53 multimedia applications 50 55 Musix 329 331 pydance installing 90 source file systems remastering 336 source trees adding to kernels 101 special purpose cheat codes booting 22 spellcheckers 283 splash cheat code 11 splash screens modifying 35 spreadsheets Calc OpenOffice org 41 SquashFS 286 SSH Secure Shell emergency running 154 stable branch Debian 112 Start the scan option nessus tool 172 starting booting 2 5 advanced cheat codes 19 20 cheat codes 9 11 detecting hardware 16 18 from expert mode 22 INSERT 286 language cheat codes 11 13 from laptops 21 Memtest86 23 26 modifying BIOS boot order 2 modifying remastering 363 366 networks 94 96 optimizing 13 15 prompts 4 troubleshooting 19 virtualized Knoppix 5 KDE 28 KDevelop 98 openMosix kernels 318 qtparted 118
605. www xfce org Gnome While there are many desktop environments and window managers to choose from in the desktop wars there are really only two big contenders KDE and Gnome In many ways the Gnome desktop environment is the Yin to KDE s Yang Where KDE aims to provide a large amount of configurabil ity options and functionality Gnome s approach is to provide a simple desktop with agreeable defaults and a reduced set of options While Gnome may not provide all of the configuration options of KDE it still provides a similar number of features To select the Gnome desktop use the desktop gnome cheat code Chapter 2 Use Your Knoppix Desktop 69 HACK 23 HACK 24 Become Root The default Gnome desktop is quite different from KDE For starters the main panel sits along the top of the screen Along the bottom is only a small taskbar The top menu bar provides access to programs and settings within three categories Applications Here you will find a standard menu structure for all of the programs available on the system Places This menu gives you a shortcut to locations such as your desktop and home directories devices such as your CD ROM drive and any remov able media along with any network filesystems you might have mounted Click Connect To Server to bring up a menu that makes it easy to mount a networked filesystem Desktop This menu contains configuration settings organized into subfolders called Administ
606. x Knoppix sudo lsof ni grep gpsd gpsd 6018 root 3u IPv4 8922 TCP 2947 LISTEN To verify that gpsd is reporting correct values connect to localhost 2947 with netcat knoppix Knoppix nc localhost 2947 DATA GPSD D A 0 000000 A 0 000000 This output shows that the GPS unit isn t even plugged in but it s clear that gpsd is keeping the device open and is ready for data Even if you don t receive a signal for your GPS unit Kismet still functions This way the GPS subsystem in Kismet knows that the GPS unit doesn t have a lock but in the event that it does Kismet receives that data without you starting up gpsd again Configure Kismet The main configuration files for Kismet are in etc kismet Most of the set tings you are interested in changing are in kismet conf and kismet_ui conf To make sure you have to set this up only once use a persistent home Hack 26 and copy the configuration files to it knoppix Knoppix mkdir kismet knoppix Knoppix cp etc kismet kismet conf kismet kismet conf knoppix Knoppix cp etc kismet kismet_ui conf kismet kismet_ui conf This hack works without the need to create a persistent home directory or copy the configuration files You can edit the etc kismet configuration files in place but the changes you make will not be retained after a reboot At the very least change the default card to match your hardware Find this line source madwifi_ag wifi
607. x also provides the capability to record and edit audio with the Audacity program see Figure 2 12 Audacity can record from microphone input or from a variety of audio formats including WAV MP3 and Ogg Vorbis Once sound is loaded into Audacity you can make basic edits such as cropping and moving to more advanced edits such as noise removal and other effects Once you are done with editing the sound you can save it into any number of audio formats When you save your sound as an Audacity project it keeps track of any changes that you have made along with other aspects of the project Audacity can be found under K Menu gt Multimedia gt Sound menu File Edit View Project Generate Effect Analyze Help Z e gt n m ol R j 48 42 36 30 24 18 12 6 0 Pu 48 42 36 30 24 18 12 6 0 JE ona b fi b a Gil Tah e PEE 3 0 40 5 0 Project rate 44100 Cursor 0 00 000000 min sec Snap To Off Figure 2 12 Audacity Chapter 2 Use Your Knoppix Desktop 53 HACK 18 HACK 18 Rock Out with Knoppix Multimedia Burn CDs and DVDs Of course Knoppix comes with a CD burning application If it didn t how could you be expected to burn new Knoppix CDs and distribute them to your friends family and fellow passengers on the subway Knoppix includes the excellent K3b application accessible by clicking K Menu gt Multimedia gt K3b With K3b
608. x for many Linux boot problems is to disable APIC support used for interrupt control in some multi processor systems which can be done with the noapic cheat code Disable power management with noapm or acpi off to help stabilize systems with buggy power management Pass pci bios to the kernel to work around problems with bad PCI controllers Experiment with disabling different options or multiple options at once as sometimes it is more than one piece of hard ware that prevents Linux from booting If all else fails boot with failsafe to disable almost all of the hardware detection The failsafe mode serves as a good sanity check to see if the Knoppix hardware detection is even the problem Enable Hardware Knoppix by default makes heavy use of ramdisks for temporary file storage while it is booted Because of this it is important that Knoppix actually detects all of your available RAM otherwise you might not be able to start X or load many programs once X is started Some BIOSes have been known to be problematic and fail to accurately report the available RAM to Linux but you can bypass these problems and tell Linux how much RAM is in the system by using the mem boot parameter For example if Knoppix isn t detecting all 256 MB of your RAM tell the Linux kernel to use 256 MB of RAM despite what the BIOS might claim by typing mem 256M Linux typically detects the proper DMA settings for any IDE devices in your system and Knoppix ena
609. y created RK Check the box for saving your session because it is handy to User Rules The User Rules tab allows you to configure limitations on different users who access nessus You can see the default rule sets in the file etc nessus nessusd rules By default Knoppix allows everything Knowledge Base If you wish to save your scans on the nessusd host for future reference enable knowledge base KB report saving to rerun scans regularly to stop and resume scans and to probe conveniently It s useful to use the differ ence scan options check Reuse the knowledge bases about the hosts for the test and then check Only show differences with the previous scan to see what s changed since the last time you scanned a given host Chapter 5 Put Knoppix in Your Toolbox 171 HACK 99 HACK 55 Audit Network Security Credits Who could forget the Credits tab Many thanks are attributed to the authors and contributors of this fine prod uct It s not the only one of its kind but it s the best open source free soft ware project of its type It s easy to modify and even easier to extend with your own plug ins Start the Scan With all of the preferences configured or not if you have decided on defaults click Start the scan option The current status of the scan is shown in a window You can stop the scan at any point Otherwise take a coffee break or enjoy a movie and then come back to r
610. y repeat either of the above methods and replace hda1 and hdb1 with the new parti tions you want to copy from and migrate to respectively After the partitions have been migrated edit the etc fstab file on the new partition if any partition numbers have changed Remember to change etc fstab entries to reflect the partition letters on the new drive once it is moved to its final bus location not the partition letter it is currently assigned In my example since I plan to replace hda with hdb I won t need to change any settings You must also restore the boot loader to the new partition Follow the steps in Hack 65 or Hack 66 depending on your boot loader Once the boot loader is restored halt the machine swap the old drive with the new drive and boot the machine from the new partition and make sure everything has cop ied over correctly before wiping the old drive and using it for something else I have used these methods to copy numerous systems from one drive to another to transfer to a larger partition or a new filesystem and even to move to software RAID5 and back While the options passed to these commands seem daunting at first I have found them so useful that they have become engrained in my memory I usually run this command directly from the system being copied in single user mode but it s not necessary When you use Knoppix you also don t have to worry about whether files have changed since you started copying
611. y settings If you are ready to install Knoppix and are familiar with the configuration options or you have already configured the installer a previous time if you configure and then exit the installer Knoppix remembers the settings that you have chosen skip right ahead and select Start Installation If you are new to installing Knoppix on your hard drive you should probably select Configure Installation so you can see what kind of questions the installer asks before you commit to an install When you choose Configure Installa tion you are presented with a window that asks you to choose from one of the three types of systems Debian This is the default method for installing Knoppix to a hard drive This choice offers a multiuser Debian install without any extra Knoppix hardware detection scripts This means that the only cheat codes that still work are those that are actually options passed to the kernel such as noapic noscsi etc Think of this as the beginner option without any of the hardware detection scripts Experienced Knoppix users may rec ognize this as being the same installation method provided by the old Knoppix installer scripts Choose this option if you want to use Knop pix as an easy way to install a purer form of Debian Beginner With this option Knoppix sets up a multiuser Debian system but also leaves all of the Knoppix hardware detection scripts behind You can still use most of the cheat codes at boot time and s
612. y use a complete image editing program such as the Graphical Image Manipulation Program GIMP which is described in this section Be aware of the image size when scanning at high resolu tions because the scanned image can easily become larger than your available ramdisk space leaving you with an incomplete image file and a desktop with no extra free space which might cause weird behavior or crashes in any applica tions that must write to the ramdisk afterwards Kooka includes Optical Character Recognition OCR capabilities as well so you can convert a scanned document to text To OCR scan an image select it from the list of images in the top left of the main window and click Image OCR Image The OCR window that pops up lets you configure gray levels dust size and spacing of your document These settings can dra matically affect the results of the OCR scan so it is worth your time to adjust them if you are getting poor results When the OCR scan finishes the OCR window disappears and you are dropped back to the main window You must save the results of the OCR scan so you can use it later in a text editor click File gt Save OCR Result Text Once you save the file you can open it in your favorite text editor If you plan on doing a lot of image manipulation you can scan an image directly from the GIMP Load the GIMP by clicking K Menu gt Graphics gt The GIMP From within the GIMP select File Acquire gt xscanimage
613. you If you have physical access to a PC that can be booted from a CD then you can use S T D This means you can Conduct forensics work on a compromised PC Scan for viruses Port map a network Start an SSH server Crack a windows password Bypass login prompts to access OS files Sniff a network to find faults passwords files emails Start a honeypot see below Enumerate a wired or wireless network Recover data from a damaged operating system or filesystem S T D is a Live Linux Distribution whose sole purpose in life is to put as many security tools at your disposal via an interface that is as slick as it can be S T D was designed as a security testing tool and NOT as a secure OS or a replacement for your desktop or server Do not trust it to be secure because it is not S T D was specifi cally designed not to be secure as that would limit its usabil ity as a security testing tool Look and Feel FluxBox is the window manager of choice for S T D as it is lightweight and simple yet powerful enough for the security professional s needs To gain access to the FluxBox menu simply right click on the desktop and you will be presented with the options Future versions of S T D may include other desktop managers as well Chapter 8 Knoppix Reloaded 291 HACK 101 Full Protection with S T D To make things even easier to follow the tools available on S T D are divided into specific security disciplines
614. you from computer to computer Hack 26 discusses how to use these devices to save configuration settings and create a persistent home directory that can follow you from machine to machine USB and IEEE1394 also known as Firewire or iLink drives work under Knoppix much like digital cameras Plug in the drive if necessary power it on and Knoppix will detect the device and create a new hard drive icon on your desktop USB and IEEE1394 drives are accessed as SCSI drives under Linux so the first drive you plug into your system will probably be named sdal These devices should work like any other hard drive installed in the system and will mount read only by default As with digital cameras be sure to unmount the drive before unplugging it Other Devices The gqcam program click K Menu gt Graphics gt gqcam lets you use many popular USB webcams and other video devices within Knoppix Most popu lar USB joysticks should work out of the box and joysticks that use the gameport on your sound card should work if the sound card is supported under Knoppix There are many other types of devices that can work under Knoppix In fact booting Knoppix on a machine with a peripheral attached is a good way to gauge if there is Linux support for that device er Have Fun and Play Some Games f 1 7 While you can get a lot of work done with Knoppix you can also have a lot of fun Windows gives you Solitaire Freecell and Minesweeper Knoppix gives yo
615. you have a spare machine lying around and a web cam you have all the makings for a webcam server you could use for any thing from home security to a baby monitor The main challenge if you want to call it that to this project is finding a webcam that works with Knoppix out of the box These days Knoppix works with a wide array of webcams though and the best way to test its support is just to plug the webcam in and start up gqcam click K gt Graph ics gt gqcam Gqcam is an image capture program for video devices so if Knoppix has detected your webcam you will see a live feed from your web cam in the gqcam window If your webcam isn t supported gqcam won t start and if run from the command line it will complain dev video no such file or directory Once you have confirmed your webcam works the next step is to set up a cron job so that gqcam will take a snapshot from the webcam every minute and dump the output so that the web server you will set up later can access it To do this start your preferred text editor with root privileges and open etc crontab For instance if you prefer using kwrite open a terminal and type sudo kwrite etc crontab Chapter 5 Put Knoppix in Your Toolbox 197 HACK 63 HACK 64 Create a Weekend Wiki At the bottom of this file add the following line ee root gqcam d var www webcam jpg gt dev null Save your changes and after a minute has passed you should se
616. you might want to use Just click the checkbox next to the services you want to run on your machine and then click OK Limit outgoing connections Generally speaking you want to allow all outgoing connections but with this option you can also block them if the need arises You will be presented with a long list of potential services you can block Just check off any services you want to block then click OK Forwarding Masquerading You can also use this tool to configure a router that will forward all con nections from your local network out to the Internet Just double click this option and enable Forwarding Masquerading in the window that appears Proxy Transparent WWW Cache If you plan to use this computer as a router enabling this option will start a transparent squid proxy on the Knoppix host and create a fire wall rule to automatically forward all outgoing web connections through this proxy This will cache web sites you look at and can result in much faster web browsing when you return to a site that s already in the cache Chapter 5 Put Knoppix in Your Toolbox 145 HACK 49 HACK 50 Create an Emergency File Server IPSEC Transparency Allow IPSEC traffic through Generally you can safely leave this option alone Knoppix Terminal Server This option gives you access to enable disable and set up the Knoppix Terminal Server mentioned in Hack 31 Persistent Logfiles If you would like to log what your fir
617. you too Save Settings To save all of your changes click K Menu gt KNOPPIX gt Configure gt Save Knoppix configuration or run usr sbin saveconfig in a console There are a number of settings that Knoppix can save The different types of settings you can choose from are as follows Personal configuration desktop programs Select this option to save the configuration files in your home directory KDE and other Linux programs have standardized the saving of user settings in hidden files and directories which begin with a period and are commonly referred to as dot files This option saves any theme or color changes you have made for your desktop any settings changes made for any program so for instance this would save your web browser bookmarks and your email settings and any other configura tion settings that are stored in these hidden files Dot files are kept in your home directory Although they may refer to the look of your desk top they are not kept there All files on the desktop This option backs up the full home knoppix Desktop directory Any files you have saved on the desktop will still be there the next time you reboot if this option is checked Use this option in lieu of creating a per sistent disk image which is described below if you just have a few files on the desktop that you wish to save and don t particularly care about keeping configuration changes Chapter 3 Tweak Your Desktop 75 HACK 26
618. ystem but it might be difficult to talk the user through all of the commands not to mention that there is always a potential for typos that could cause further damage If the user has a Knoppix disk plan ahead and hide a copy under every user s machine then she can boot and get network access You can then walk her through the simple steps of sharing her desktop and remotely connect and finish the system recovery Sharing the local Knoppix desktop is pretty simple The user s first step is to run the Desktop Sharing applet by clicking K Menu gt System gt Krfb Desk top Sharing Have the user click Create Personal Invitation in the main window to create a personal invitation to share her desktop which then dis plays a new window containing the address and the temporary password to use for the connection This information can be entered into any VNC compatible client on the remote end causing a prompt to appear on the local user s screen and requesting the user to accept the remote desktop connection 132 Chapter 5 Put Knoppix in Your Toolbox HACK Run X Remotely with FreeNX 47 The user can also click Invite via Email to send an email containing connection information to the system administra tor This email provides a direct link to click on if the recipi ent is running a KDE desktop with krdc installed The sender must have an email account set up on her Knoppix machine for this to work The
Download Pdf Manuals
Related Search
Related Contents
MULTIMETRE NUMERIQUE DIGITAL MULTIMETER DIGITAL Samsung S27D365H User Manual 接続設定- ADSL(eA) 取扱説明書 - iiyama Operating Instructions and Parts Manual 4VW91A, 4VW92A TWINCA EASY User Manuel Bitstream 3X User Manual Tough Gauge 200C PDF 555KB IT - L`Antifurto SRL Copyright © All rights reserved.
Failed to retrieve file