Hacking and Pen-Testing With The Nokia 770/800/810 Notes

Hacking and Pen-Testing With The Nokia 770/800/810 Notes

 

        The n770 and n800 are Linux based mobile devices from Nokia that are designed for portable web surfing, Internet Tablets as Nokia calls them. The platform for these devices is know as Maemo and since it's Linux based many hackers have extended its functionality greatly. Since both models have built in WiFi and Bluetooth, and the older 770 model has come down in price ($130 when I got mine),  I've decided to use it as a mobile pen-testing device. This page will be a collection of my notes on how to install and run hacking/pen-testing software with the n800/n770/n810. This page is a very rough draft for now, I plan to update it as I have more information to convey.

The Operating System

        Obviously, the first thing you will need is the proper OS. For my notes, I'm using Internet Tablet OS 2007 Hacker Edition (abbreviate IT2007HE) on a Nokia 770. IT2007 is meant for the n800, but the Hacker Edition version will run on the n770. I'm hoping that by using this edition I'll be able to write notes that should work on both models. To install IT2007HE download it from:

http://tabletsdev.maemo.org/os2007_hacker_edition.php

then use the installer from:

http://europe.nokia.com/A4144790

When the installer asks what firmware to use, point it at the bin file you downloaded from Maemo.org. Everything else the installer should walk you through. For the record, I'm using SU-18_2007HACKER_4.2007.36-2_PR_F5_MR0_ARM.bin.

Adding Software

        Maemo appears to be Debian based and uses the APT package management system. You can install software off  the web by using repositories you download from, or by installing individual .debs from the RS-MMC card. You can set up repositories by hand if you wish, like in the following screen shots:

Find the Application Manager Bring up  the catalogue
Add to the catalogue Add to the catalogue

Or by using the built in web browser and clicking on .install files that are provided by the developers. The following are repositories I found useful, just open up your n770/n800s/n810 web browser to this page and click on the .install files to add them:

Repository Name: Polish Eko1 repository

Notable Packages: Not sure

Install File: http://irongeek.com/maemo/eko1.install

Notes: I've put this up despite it not having packages.

 

Repository Name: Polish Eko1 repository for IT2006
Notable Packages: becomeroot, btscanner, kismet, libpcap0.8, privoxy
Install File: http://irongeek.com/maemo/eko1kismet.install
Notes: I modified this to work on IT2007, mostly just for Kismet.

 

Repository Name: Maemo-hackers
Notable Packages: dropbear-client, dropbear-server, Gaim, Xterm, PHP
Install File: http://irongeek.com/maemo/maemo-hackers-osso-xterm.install
Notes: A metric ton of apps. Xterm is a must for the comand line apps.

 

Repository Name: MUlliNER.ORG Maemo Software
Notable Packages: aircrack-ng, aircrack-ng, btaudit, dsniff, libp cap, nmap 3.95-1, tcpdump
Install File: http://irongeek.com/maemo/mullinerorg_bora.install
Notes: MUlliNER.ORG seems to have more security apps than anyone else.

 

Repository Name: Maemo.org Repository
Notable Packages: libpcap0.8, nano, netcat, tcpdump, wireless-tools, iputils, traceroute, wget, gpsd, Bash
Install File: http://irongeek.com/maemo/repository.maemo.org.install
Notes: Install this and get all those usefull IP tools like Ping and Traceroute

 

Repository Name: Maemo.org Repository Extras
Notable Packages:  vncviewer, python, mplayer, maemo-mapper, evince, openssh, rdesktop
Install File: http://irongeek.com/maemo/repository.maemo.org.extra.install
Notes: Even more good stuff.

If you want a large list of repositories, check out http://gronmayer.com/it/index.php?lang=en&system=maemo4

Once the repositories are set up you can install apps using the Application Manager and let it take care of the dependences for you. Just choose "Browse installable applications" and go through the alphabetical list, or use the binoculars icon to search for the package you want. It should be noted that to install some packages you will have to be in "Red Pill" mode. If you ever get an error that says you can't install something, put your tablet in "Red Pill" mode by going to add a new repository, typing just "matrix" in the web address line then hitting cancel and choosing Red as show in the screen shots below. If you want to find even more software for you 770/800 check out http://maemo.org/community/wiki/applicationrepositories/ .

 

Red Pill Mode 1  Red Pill Mode 2

Using the above repositories you should be able to add pen-testing apps like Nmap, Kismet, Netcat and others.

 

Becoming Root

        For some apps like Kismet a Nmap, to get the full functionality you will have to become root. The easiest way is to drop out to a command line using Xterm and type "sudo gainroot" then use use whatever apps you like.

 

 

 

 

 

 

That's it for now, more to come later.

MetaSploit!!!

        Pierre Droids has done some work to install Metasploit on the n800. Check out his blog entry here:

http://blog.pierre.droids-corp.org/2007/04/n800-with-scapy-and-metasploit.html

and download hi packages from here:

http://pierre.droids-corp.org/maemo/

He even has a newer version of Nmap for use. Step by step instructions for installing Metasploit on your n800 can be found here:

http://mfresh-n800.blogspot.com/2007/07/installing-metasploit-framework-3-on.html

I'm still working on getting it to run on the n770.

Conclusion

        If you want be to continue working on this page send me your how to snibits and suggestions and I'd be glad to add them. If you are still having problems, check out by video on configuring a Nokia 770 with pen-testing tools:

Nokia 770/800 Pen-Testing Setup Video

Change Log:

09/22/2007: First draft of the notes.
09/26/2007: Added link to Paul Rubens' Metasploit instructions. Added link to my video.
01/16/2008: Added link to http://gronmayer.com/it/index.php?lang=en&system=maemo4 (thanks to BlackDeath for the link)



If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek