{"id":973,"date":"2014-09-20T12:46:01","date_gmt":"2014-09-20T17:46:01","guid":{"rendered":"http:\/\/zitstif.no-ip.org\/?p=973"},"modified":"2014-09-20T15:57:52","modified_gmt":"2014-09-20T20:57:52","slug":"creating-your-own-usb-katana-sword","status":"publish","type":"post","link":"http:\/\/zitstif.no-ip.org\/?p=973","title":{"rendered":"Creating Your Own USB Katana Sword"},"content":{"rendered":"<p>JP Dunning (https:\/\/twitter.com\/r0wnin) is the creator of the Katana: Portable Multi-Boot Security Suite. Upon visiting www.hackfromacave.com, it appears that this projects have come to a halt.  It is true that you can still obtain the Katana toolkit via torrents (http:\/\/securityiskey.blogspot.com\/2012\/08\/katana-3-beta-torrent.html for those are interested). However, I can&#8217;t recommend downloading this toolkit as of now because a lot the Linux distributions within the Katana toolkit have been superseded by newer distributions. Another issue with Katana is that it&#8217;s kind of a pain to customize and add and remove distributions. <\/p>\n<p>With that being said, this post&#8217;s objective is to inform those who how to create a multi-booting USB flash drive toolkit that is easily customizable for end user&#8217;s specific needs. For this we will be heavily relying on YUMI (http:\/\/www.pendrivelinux.com\/yumi-multiboot-usb-creator\/). Using YUMI is pretty straight forward and I don&#8217;t believe there is a strong need for myself to create a tutorial (https:\/\/www.google.com\/#q=YUMI+tutorial).<\/p>\n<p>To create our &#8220;Home Made Katana&#8221;, you will need:<\/p>\n<p>-Time<br \/>\n-32GB Flash drive (smaller may work but I recommend 32GB or larger)<br \/>\n-YUMI ( http:\/\/www.pendrivelinux.com\/yumi-multiboot-usb-creator\/ )<br \/>\n-HomeMadeKatana.zip ( https:\/\/ia601401.us.archive.org\/15\/items\/HomeMadeKatana\/HomeMadeKatana.zip ) <\/p>\n<p>HomeMadeKatana.zip file hash<br \/>\nMD5: dc5b97133c9e6ca9a848b26b234f2210<br \/>\nSHA-1: 8a13ce78c380a05f60602a40790bf77021d52de9<\/p>\n<p>NOTE: TOOLS IN THIS ARCHIVE WILL SET OFF AV SYSTEMS<\/p>\n<p>The root directory of this zip file contains: <\/p>\n<p>Disk Investigator<br \/>\nHxD<br \/>\nKatanaToolKit.exe<br \/>\nodbg201<br \/>\nPortableApps<br \/>\nSpeccy<br \/>\nSysinternalsSuite<br \/>\nwindows-binaries-from-Kali<br \/>\nzittools<\/p>\n<p>I pulled the PortableApps directory and the KatanaToolKit.exe from the Katana:<br \/>\nPortable Multi-Boot Security Suite. I meant to add herdProtect portable scanner but forgot to. Feel free to add this if you want: http:\/\/www.herdprotect.com\/installers\/herdProtectScan_Portable.exe . <\/p>\n<p>To create our &#8220;Home Made Katana&#8221;, do as follows:<\/p>\n<p>1.) Backup any data you want on your flash drive<br \/>\n2.) Wipe the flash drive<br \/>\n3.) Download YUMI<br \/>\n4.) I recommend the following distributions\/bootable tools:<\/p>\n<p>Caine<br \/>\nClonezilla (Backup + Clone Tool)<br \/>\nDBAN<br \/>\nDeft (Forensics)<br \/>\nGParted<br \/>\nHiren&#8217;s Boot CD<br \/>\nKali<br \/>\nKon-Boot Floppy Image<br \/>\nMint Linux<br \/>\nOffline NT Password &#038; Registry Editor<br \/>\nOphcrack Vista\/7<br \/>\nOphcrack XP<br \/>\nTails<br \/>\nUltimate Boot CD<br \/>\nWindows 7<br \/>\nWindows 8<br \/>\nWindows Defender Offline<\/p>\n<p>5.) Download and extract HomeMadeKatana.zip to the root of the flash drive. <\/p>\n<p>You may ask yourself why would I recommend putting Windows 8 on your flash drive? I recommend this because  newer systems are now using UEFI and a lot of systems are shipping without optical drives. For instance if you need to reset a Windows 8 local account password ( http:\/\/pcsupport.about.com\/od\/windows-8\/a\/reset-password-windows-8.htm ), having Windows 8 on your &#8220;Home Made Katana&#8221; would be of great use. <\/p>\n<p>An additional note that should be taken into consideration when dealing with newer UEFI computers. To boot into Linux distros or even to boot from USB or optical drives with software that doesn&#8217;t necessarily support secure booting you will need to turn the secure boot option off and\/or enable legacy booting and\/or enable compatibility support module (CSM). <\/p>\n<p>In retrospect,  what we have done is create a mutlibootable and powerful flash drive with utilities for penetration testers, IT gurus and network administrators. In addition, I would also recommend getting a USB Rubber Ducky  (https:\/\/hakshop.myshopify.com\/collections\/usb-rubber-ducky) especially if you&#8217;re into penetration testing. If you have any questions, comments or input feel free to post a comment below. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>JP Dunning (https:\/\/twitter.com\/r0wnin) is the creator of the Katana: Portable Multi-Boot Security Suite. Upon visiting www.hackfromacave.com, it appears that this projects have come to a halt. It is true that you can still obtain the Katana toolkit via torrents (http:\/\/securityiskey.blogspot.com\/2012\/08\/katana-3-beta-torrent.html for those are interested). However, I can&#8217;t recommend downloading this toolkit as of now because &hellip; <a href=\"http:\/\/zitstif.no-ip.org\/?p=973\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Creating Your Own USB Katana Sword<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[710,104,44,713,712,703,705,41,707,706,704,714,709,711,708],"class_list":["post-973","post","type-post","status-publish","format-standard","hentry","category-posts","tag-gpt","tag-hacking","tag-hak5","tag-kali","tag-kali-linux","tag-katana","tag-katana-sword","tag-linux","tag-multi-booting","tag-multiboot","tag-new-usb-katana","tag-portable-exectuables","tag-uefi","tag-usb-rubbery-ducky","tag-yumi"],"_links":{"self":[{"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=\/wp\/v2\/posts\/973","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=973"}],"version-history":[{"count":28,"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=\/wp\/v2\/posts\/973\/revisions"}],"predecessor-version":[{"id":1001,"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=\/wp\/v2\/posts\/973\/revisions\/1001"}],"wp:attachment":[{"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=973"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=973"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=973"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}