User manual | This document details how I configure my Motion Computing m1300
Add to my manuals13 Pages
Motion Computing M1300 is a powerful and versatile tablet computer designed for professionals on the go. With its Intel Core 2 Duo processor and 2GB of RAM, it can handle even the most demanding tasks. The 13.3-inch widescreen display is perfect for viewing documents, presentations, and videos. And with its built-in GPS receiver, you can easily navigate your way around town.
advertisement
This document details how I configure my Motion Computing m1300 tablet with Linux so that I can conduct wireless auditing with Kismet, Aircrack‐ng, and Karmasploit.
Boot the Ubuntu 8.04 LST Hardy Heron cd. Choose the option to begin the installation.
Welcome [English]
Where are you? [NY EDT]
Keyboard layout [U.S. English]
Prepare disk space [Guided – use the largest continuous free space]
This will use the free space behind the Windows XP installation
Migrate Documents and Settings [Nothing to do]
Who are you? [username: wireless, computername: wireless-tablet]
Ready to install
http://ubuntuguide.org/wiki/Ubuntu:Hardy is invaluable for getting Ubuntu configured post
install.
Issues Post Install Fails: screen resolution and digitizer pen (this stuff worked just fine with
version 7.04!)
After installing Hardy Heron 8.04 LST the screen resolution will be set to 800x600 and past methods to correct it (sudo dkpg‐reconfigure xserver‐org) will not work. The following blurb is
from http://ubuntulinuxtipstricks.blogspot.com/2008/04/faq‐hardy‐upgrade.html
The new Xorg is supposed to be all nice and hotplugable, but dpkg‐reconfigure xserver‐xorg is no more. /etc/X11/xorg.conf is also now very barebones. This is for the hotplugability. The correct way to configure this new version of X is with the xfix command. Changing resolution is done on the fly with xrandr.
I say to hell with the new way of doing things. The previous version of Ubuntu I ran on the m1300 was Feisty Fawn 7.04 and I have saved that xorg.conf configuration file. I replaced the
8.04 xorg.conf with the version from 7.04.
#cp /etc/X11/xorg.conf /etc/X11/xorg.conf.xx.xx.xx
NOTE: xx.xx.xx is the current date ;‐)
#vim /etc/X11/xorg.conf or #gedit /etc/X11/xorg.conf
Replace the text below...
Section "Device"
Identifier "Configured Video Device"
Driver "vesa"
EndSection
Section "Monitor"
EndSection
Section "Screen"
EndSection
...with...
Section "Device"
Identifier "Intel Corporation 82852/855GM Integrated Graphics
Device"
Driver "i810"
EndSection
Section "Monitor"
Option "DPMS"
EndSection
Section "Screen"
Graphics Device"
DefaultDepth 24
EndSubSection
EndSubSection
EndSubSection
EndSubSection
EndSubSection
EndSubSection
EndSection
Reboot or kill X to login with the new resolution.
Now for the wacom digitizer pen. There is a great tutorial on the ubuntuforums.org from an individual who has gotten Hardy Heron working on the m1300. He offers details on getting the pen working. You can visit the forum page at http://ubuntuforums.org/showthread.php?s=f7bfdde0a3a1ce4b0ff8a52f35ab4537&t=79635
9 . However, before I found this site all I did was add the following xorg.conf settings (copied from my previous Feisty Fawn 7.04 installation) and the pen worked fine.
Add the following lines to /etc/X11/xorg.conf
#vim /etc/X11/xorg.conf
Section "InputDevice"
Driver "wacom"
Option "Type" "stylus"
ONLY
Option "Mode" "Absolute"
Option "Button3"
Option "Button2"
"2" #properly configure the
"3" #button on the pen for rig ht click
Option "TPCButton" "on"
EndSection
Section "InputDevice"
Driver "wacom"
Option "Type" "eraser"
ONLY
EndSection
Section "InputDevice"
Driver "wacom"
Option "Type" "cursor"
ONLY
EndSection
Also, you will need to add the following lines to Section "ServerLayout".
InputDevice "stylus"
InputDevice "cursor"
InputDevice "eraser"
"SendCoreEvents"
"SendCoreEvents"
"SendCoreEvents"
Reboot or restart X and you pen should now work.
Updating and upgrading
#sudo cp -i /etc/apt/sources.list /etc/apt/sources.list_backup
#gksu gedit /etc/apt/sources.list
##--------------------
## UBUNTU REPOSITORIES
## ------------------- deb http://my.archive.ubuntu.com/ubuntu/ hardy main restricted deb-src http://my.archive.ubuntu.com/ubuntu/ hardy main restricted deb http://my.archive.ubuntu.com/ubuntu/ hardy-updates main restricted deb-src http://my.archive.ubuntu.com/ubuntu/ hardy-updates main restricted deb http://my.archive.ubuntu.com/ubuntu/ hardy universe deb-src http://my.archive.ubuntu.com/ubuntu/ hardy universe deb http://my.archive.ubuntu.com/ubuntu/ hardy-updates universe deb-src http://my.archive.ubuntu.com/ubuntu/ hardy-updates universe deb http://my.archive.ubuntu.com/ubuntu/ hardy multiverse deb-src http://my.archive.ubuntu.com/ubuntu/ hardy multiverse deb http://my.archive.ubuntu.com/ubuntu/ hardy-updates multiverse deb-src http://my.archive.ubuntu.com/ubuntu/ hardy-updates multiverse deb http://my.archive.ubuntu.com/ubuntu/ hardy-backports main restricted universe multiverse deb-src http://my.archive.ubuntu.com/ubuntu/ hardy-backports main restricted universe multiverse deb http://archive.canonical.com/ubuntu hardy partner deb-src http://archive.canonical.com/ubuntu hardy partner deb http://security.ubuntu.com/ubuntu hardy-security main restricted deb-src http://security.ubuntu.com/ubuntu hardy-security main restricted deb http://security.ubuntu.com/ubuntu hardy-security universe deb-src http://security.ubuntu.com/ubuntu hardy-security universe deb http://security.ubuntu.com/ubuntu hardy-security multiverse deb http://my.archive.ubuntu.com/ubuntu/ hardy-proposed restricted main multiverse universe deb-src http://security.ubuntu.com/ubuntu hardy-security multiverse deb http://ppa.launchpad.net/ubuntume.team/ubuntu hardy main # Ubuntu Muslim Ed ition deb-src h ttp://ppa.launchpad.net/ubuntume.team/ubuntu hardy main # Ubuntu Muslim
Edition deb http://www.linuxmint.com/repository romeo/ deb http://tskariah.000webhost.com/ubuntu ubuntu main
## +++ Backports & Proposed (Ubuntu Unstable) +++ deb http://archive.ubuntu.com/ubuntu/ hardy-backports main restricted universe multiverse deb http://archive.ubuntu.com/ubuntu/ hardy-proposed main restricted universe multiverse
## +++ Source Repositories +++ deb-src http://archive.ubuntu.co
m/ubuntu/ hardy main restricted universe multiverse deb-src http://archive.ubuntu.com/ubuntu/ hardy-updates main restricted un iverse multiverse deb-src http://security.ubuntu.com/ubuntu/ hardy-security main restricted universe multiverse deb-src http://archive.ubuntu.com/ubuntu/ hardy-backports main restricted universe multiverse deb http://us.archive.ubuntu.com/ubuntu/ hardy main restricted deb-src http://us.archive.ubuntu.com/ubuntu/ gutsy main restric ted deb http://us.archive.ubuntu.com/ubuntu/ hardy-updates main restric ted deb-src http://us.archive.ubuntu.com/ubuntu/ hardy-updates main restric ted
##Universe deb http://us.archive.ubuntu.com/ubuntu/ hardy universe deb-src http ://us.archive.ubuntu.com/ubuntu/ hardy universe deb http://us.archive.ubuntu.com/ubuntu/ hardy-updates un iverse deb-src http://us.archive.ubuntu.com/ubuntu/ hardy-updates un iverse
## Multiverse deb http://us.archive.ubuntu.com/ubuntu/ hardy multiverse deb-src http://us.archive.ubuntu.com/ubuntu/ hardy multive rse deb http://us.archive.ubuntu.com/ubuntu/ hardy-updates multive rse deb-src http://us.archive.ubuntu.com/ubuntu/ hardy-updates multive rse
## Backports deb http://us.archive.ubuntu.com/ubuntu/ hardy-backports main restricte d universe multiverse deb-src http://us.archive.ubuntu.com/ubuntu/ hardy-backports main restricted universe multiverse
## Canonical Partner Repository
deb http://archive.canonical.com/ubuntu hardy partner deb-src http://archiv e.canonical
.com/ubuntu hardy partner deb http://security.ubuntu.com/ubuntu hardy-security m ain restricted deb-src http://security.ubuntu.com/ubuntu hardy-securit y m ain restricted deb http://security.ubuntu.com/ubuntu hardy-security univer se deb-src http://security.ubuntu.com/ubuntu hardy-security universe deb http://security.ubuntu.com/ubuntu hardy-security multiverse deb-src http://security.ubuntu.com/ubuntu hardy-security multiv erse
## PLF REPOSITORY deb http://packages.medibuntu.org/ gutsy free non-free deb http://ppa.launchpad.net/reacocard-awn/ubuntu gutsy main
## +++ Medibuntu +++ deb http://packages.medibuntu.org/ hardy free non-free deb http://packages.medibuntu.org/ feisty free non-free
#wget -q http://packages.medibuntu.org/medibunt u-key.gpg -O- | sudo ap t-ke y add -
#wget -q http://deb.mulx.net/pol.gpg -O- | sudo apt-key add -
#s udo apt-get updat e
#sudo apt-get upgrade
This will take a while!
Adding compilers and kernel so urce code
# sudo apt-get install build-essential
#sudo apt-get install linux-head ers-`uname -r`
Onscreen Keyboard at Login
U buntu Hardy Heron comes with a nice onscreen keyboard writte n in python during the Google
Summer of Code. This little app is called onboard.py
NOTE: This may be due to something I did after insta llation of Hardy Heron or and actual p roblem with the disto itself but when I start onboard it gives a segmentation fault. After some research it was suggested that I remove onboard and reinstall. That worked for me .
#apt-get remove python-virtkey onboard
# apt-get install python-virtkey onboard
Unlike in Feisty Fawn in Hardy Heron you no longer ha ve to manually edit the python files to c onfigure onboard to the specific screen size and starting position. To create an icon on the panel just right‐click the panel, select Add to Panel..., choose Custom Application Launcher, an d
click Add
Enter the foll owing, you can change the command settings to the size and position you prefer.
Type: Application
N ame: On Screen Keyboard
Command: /usr/b in/onboard ‐x 0 ‐y 470 ‐‐size=600x180
Comment: Onboard On Scr een Keyboard
To add Onboard on start‐up (so you can log in with the pen) do the following:
#cp /etc/gdm/Init/Default /etc/gdm/Init/Default.backup
Ensure the last three lines of the file look like this: fi exec onboard -x 0 -y 0 --size=600x180 & exit 0
Afterwa rds, open the menu:
System‐ > Administration ‐>Login Window
NOTE: be patient, for some reason it tak es a long time to start
The window containing the preferences of the Login Window wi ll open. In this window do the fo llowing:
‐ choose the tab named 'Local'
‐ click on the popup at the right of 'Style' and set it to 'Plain'. (mine was set to 'Themed with face
Browser')
‐ close the window
Install XVKBD if you don’t like onboard
# apt-get install xvkbd
#cp /etc/gdm/Init/Default /etc/gdm/Ini t/Default.backup
#gedit /etc/gdm/Init/Default
Ensure the last three lines of the file look like this: fi exec xvkbd & exit 0
Afterwa rds, open the men u:
S ystem‐ >Administration ‐>Login Window
NOTE: be patient, for some reason it tak es a long time to start
The window containing the preferences of the Login Window wi ll open. In this window do the fo llowing:
‐ choose the tab named 'Local'
‐ click on the popup at the right of 'Style' and set it to 'Plain'. (mine was set to 'Themed with face
Browser')
‐ close the window
Create Screen Rotat ion Icon
# apt‐get install wacom‐tools
#gedit /bin/rotate.sh
#!/bin/sh
orientation="`/usr/bin/X11/xrandr --query | /bin/grep 'default connected' | /usr/bin/awk '{print $5}'`" if [ "$orientation" = "normal" ]; then
# Rotates screen orientation to the right
/usr/bin/X11/xrandr --orientation right
# Rotates the stylus cordinate plane
/usr/bin/xsetwacom set stylus rotate CW elif [ "$orientation" = "right" ]; then
# Rotates the screen back to normal
/usr/bin/X11/xrandr --orientation n fi
#chomd 777 /bin/rotate.sh ormal
# Rotates the stylus cordinate plane to n
/usr/bin/xsetwacom set "stylus" Rotate 0 ormal
Cr eate an icon with that script and enjoy screen rotation!
Madwifi – latest version
# apt-get install madwifi-tools
NOTE: Ubuntu Hardy Heron comes prei nstalled with a version of madwifi that is suitable.
If you want the latest version then follow the steps below.
#apt-get install subversion
#apt-get install sharutils
#svn checkout http://svn.madw
ifi.org/trunk madwifi-ng
#cd madwifi/trunk
#make
#make install
NOTE: if the svn link does not work go to http://madwifi.org to get the up‐to‐date link.
Kismet
#apt-g et install flex m4 bison
#apt-g et install gpsd sox libncurses5-dev
#apt-get install libgmp3-dev lib expat1-dev libmagick9-dev
Download the latest stable version of libpcap from http://www.tcpdump.org (c urrently li bpcap‐1.0.0)
#tar z xvf libpcap-1.0.0.tar.gz
# cd libpcap-1.0.0
#./configure
#make dep
#make && make install
Download the latest stable ver sion from http://www.kismetwireless.net
(c urrently 2008‐05‐R1)
#tar zxvf kismet-2008-05-R1.tar.gz
#cd kismet-2008-05 -R1
Patch for GOOGLE MAPS
#wget http://parknation.com/gmap/files/gpsmap-gmap-0.1.tgz
#tar zxvf gpsmap-gma p-0.1.tgz
#patch -p0 < gpsmap-gmap-0.1/gpsmap-gmap-0.1.diff
Compile and install
#./configure
#make
#make install
You need to install a web server in order to view the output from generating a google/kismet m ap
#aptget install apache2
#mkdir /var/www/gpsmap
Copy the files that came with the patch over to the directory you just created.
#cd gpsmap-gmap-0.1
# cp –R mapfiles /var/www/gpsmap
#cp index.html /var/w ww/gpsmap
Y ou also need to get an api key for using g oogle maps from google
( http://www.google.com/apis/maps/signup.html). Insert this key into the top of the
index.html file in the location of KEYHERE
NOTE: See Creating Google Maps with Kismet below for the next step in using gpsmap to create
a gps plotted google map.
BUT FIRST . . .
Configure Kism et
Edit /usr/local/etc /kismet.conf (NOTE: kismet.conf may be installed elsewhere. Run find /
‐name kismet.conf or whereis kismet to find it)
#vim /usr/local/etc/kismet.conf
# Kismet config file
# Most of the "static" configs have been moved to here -- the command line
# config was getting way too crowded and cryptic. We want functionality,
# not continually reading --help!
# Version of Kismet config version=2004.10.R1
# Name of server (Pu rely for organiational purposes)
servername=Kismet
# User to setid to (shou ld be your normal user)
13 suiduser=wireless
# Sources are defined as:
# source=cardtype,interface,name[,initialchannel]
# Card types and required drivers are listed in th e README.
# The initial channel is optional, if hopping is no t enabled it can be use d
# to set the channel the interface listens on.
# YOU M UST CHANGE THIS TO BE THE SOURCE YOU WANT TO USE
21 source=madwifing_b,wifi0,madwifi
NOTE: the line numbers may change slightly per instal lation of kismet (newer version).
T he lines we are editing should be around where I specified.
Change the bolded lines to what is listed (your source may be different and will require re search)
SMC2532W ‐B = hostap
C isco a/b/g = madwifing_b
Proxim a/b/g = madwifin g_b
Intel ipw2100 (internal tablet wireless) = ipw2100
You may also specify the source at the command lin e when starting kismet
#kismet –c ipw2100,eth1,ipw
NOTE: for detailed info on Source ty pes see O’Reilly Security Power Tools p.109
You may want to change the columns that are displayed on the screen when you st art kismet.
E dit kismet_ui.conf
#vim /usr/local/etc/kismet_ui.conf
# columns are valid. columns=decay,name,type,wep,channel,packets,flags,ip,size
# What columns do we d isplay for clients? Comma seperated. clientcolumns=decay,type,mac,manuf,data,crypt,size,ip,signal ,qual ity,noise
I like to see the signal strength on the screen
# columns are valid. columns= name,type,wep,decay,channel,signal,packets,flags,ip,size
# What columns do we display for clients? Comma seperated. clientcolumns=decay,type,mac,manuf,data,crypt,size,ip,signal,qual ity,noise
Also cha nge showintro =false and sound=false. The introscreen and sound are annoying.
Starting GPSD
G psd is the daemon that facilitates communication between a gps capable program (i.e. kismet) and the gps har dware. Gpsd supports most all popular gps chipsets and they can be connected
via usb, serial, Bluetooth, or pcmcia/compact flash.
When connecting the gps device run dmesg from the command prompt to see how the device was detected and what filename it was assigned. This will be required when starting gpsd.
E xample:
#dmesg – tail 10
[ 1723.424000] us b 2-1: configuration #1 chosen from 1 choice
[ 1724.200000] usbcore: registered new interface driver usbseri al
[ 1724.200000] drivers/usb/serial/usb-serial.c: USB Serial support registered for generic
[ 1724.200000] usbcore: registered new interface driver usbserial_generic
[ 1724.200000] drivers/usb/serial/usb-serial.c: USB Seria l Driver core
[ 1724.228000] drivers/usb/serial/usb-serial.c: USB Seria l support registered for pl2303
[ 1724.228000] pl2303 2-1:1.0: pl2303 converter detected
[ 1724.228000] usb 2-1: pl2303 converter now attached to ttyUSB0
[ 1724.228000] usbcore: registered new interface driver pl2303
[ 1724.228000] drivers/usb/serial/pl2303.c: Prolific PL2303 USB to serial adaptor driver
When starting gpsd
# gpsd /dev/ttyUSB0
Test to make sure it work s:
# telnet 127.0.0.1 2947
When in telnet type R and you should see gpsd spit gps output to the screen (NOTE: you
don’t need to be outside to test this)
ctrl‐] then quit to exit out of telnet.
B y defa ult kismet is configured to connect to gpsd on port 2947.
Creating Google Maps with Kismet gpsmap options:
‐j = use googlem aps
‐o = output file
‐u = draw conve x hull of data points
‐r = draw estimated range circles
gp smap ‐j ‐o gpsdata.js ‐u ‐r <path_to_Kismet_Gps_File>
After running gpsmap on a .gps file copy the output .js file to the same folder as the index.html file and name it gpsdata.js. You will also need to make the file world readable.
#cp gpsdata.js /var/www/gpsmap
#chmod +r /var/www/gpsmap/gpsdata.js
Now browse to your webserver with a browser (e.g. http://localhost/gpsmap/index.html)
E ttercap
When I co nnect to an access point like to use ettercap to sniff all the traffic and capture any
passwords that may be flying through the air.
# apt-get install ettercap-gtk ettercap-common libnet1
A ircrack
Download the latest version of aircrack‐ng from http://www.aircrack‐ng.org (current version is
1.0‐rc3).
O penssl libraries will need to be installed
#apt-get install libssl-dev
#t ar zxvf aircrack-ng-1.0-rc3 .tar.gz
#cd aircrack-ng-1.0-rc3/
#make && make install
K armasploit
There was an older exploit software called Karma, written in Ruby, that allowed you to mimic host APs, changing its SSID on the fly to lure clients in to connect to the attackers host. Karm a relied on a patched version of the Madwifi drivers that are no longer supported and won't compile on modern Linux systems. Enter Karmasploit, a rewrite of Karma that integrates with the Metasploit framework (nice that Metasploit was rewritten in Ruby :‐)
F irst we need to make sure we can inject packets with our wireless setup.
S etting up Proxim 8480‐FC (802.11 a/b/g) and testing packet injection
#wlanconfig ath0 destroy
#wlanconfig ath create wla ndev wifi0 wlanmode monitor
#aireplay-ng --test ath1
07:25:32 Trying broadcas t probe requests...
07:25:32 Injection is working!
07:25:34 Found 1 AP
07 :25:34 Trying direct ed probe requests...
07 :25:34 00:0C:E5:4E:F1:18 - channel: 6 - 'D 8F'
07:25:36 Ping (min/avg/max): 2.050ms/45.083ms/66.
677ms Power: 23.93
07:25:36 27/30: 90%
S UCCESS...
F rom http://trac.metasploit.com/wiki/Karmetasploit
Metasploit does not have a DHCP module, so a third‐party DHCP service must be configured and installed. The easiest way to accomplish this is by installed the ISC "dhcpd" package for your
distribution. On Ubuntu‐based systems, the package is called "dhcpd3" (sudo apt‐get install dhcpd3). Once the DHCP server has been installed, an appropriate configuration file needs to be created. This file is normally called "dhcpd.conf" or "dhcpd3.conf" and resides in /etc, /etc/d hcp, or /etc/dhcp3. The example below uses the 10.0.0.0/24 network with the access point configured at 10.0.0.1.
We will download the lat est source from https://www.isc.org/downloadables/12 and compile
a nd install it (currently version 4.1.0).
#tar zxvf dhcp-4.1.0.tar.gz
# cd dhcp-4.1.0
#./configure
#make && make i nstall
#mkdir /etc/dhcp
#g edit /etc/dhcp/dhcpd.
conf
option domain-name-servers 1 0.0.0.1; default-lease-time 60; max-lease-time 72; ddns-update-style none; authoritative; log-facility local7; subnet 10.0.0.0 netma sk 255.255.255.0 {
range 10.0.0.100 10.
0.0.254;
option routers 10.0.0.1;
option domain-name-servers 10.0.0.1;
}
#touch /etc/dhcp/dhcpd.leases
#chmod 777 /etc/dhcp/dhcpd.leases
Dhcp is now configured for what we need it to do. The command to run dhcp will be found
la ter in the document.
Install the latest ve rsion of Metasploit and configure it to use a database backend to support
K armasploit.
#apt-get in stall subversion
# apt-get install ruby ruby1.8-dev libruby1.8 libdbd-sqlite3-ruby1.8 irb1.8 rdoc1.8 libreadline-ruby1.8 r ubygems libsqlite3-dev sqlite3
#svn co http://metasploit.com/svn/framework3/trunk msf3
#gem install activerecord sqlite3-ruby
Get it up and running!
# wlanconfig ath0 destroy
#wlanconfig ath0 c reate wlandev wifi0 wlanmode monitor
#airbase-ng -P -C 30 -e "F ree WiFi" -v ath1
#ifconfig at0 up 10.0.0.1 netmask 255.255.255.0
#dhcpd -cf /etc/dhcp/dhcpd.conf at0
#cd ~/msf3
#./msfconsole -r karma.rc
#iptables -t nat -A PREROUTING -i at0 -j REDIRECT
R eferences:
h ttp://blog.metasploit.com/2006/09/metasploit‐30‐automated‐exploitation.html http://carnal0wnage.blogspot.com/2008/08/playing‐with‐karmasploit‐part‐1.htm
l
http://trac.metasploit.com/wiki/Karmetasploit
http://www.vulnerabilityassessment.co.uk/wma p_meta.htm http://www.linux.com/archive/feature/61609
advertisement
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project