I use my own version of BOOTBOX almost everyday.
-ANDROID TESTING & DEVELOPMENT
-LAW INFORCEMENT & EMS DISPATCH SERVICES
-TESTING OPERATING SYSTEMS
-BUILDING OPERATING SYSTEMS
-CUSTOMIZING / MODIFYING FILE SYSTEMS
-ACCESSING LOCKED MICROSOFT WINDOWS DRIVES
-PRIVATE / ANONYMOUS INTERNET BROWSING
-WEB DEVELOPMENT
-ADMINISTRATIVE TASK
-SDR TESTING
-SECURITY AUDITS
-DISK PARTIONING
-DISK CLONING
-DATA BACKUPS
-CLOUD SERVICES
-VIRTUALIZATION
-OSINT
-SIGINT
-GEO SPATIAL TESTING
-GRAPHIC DESIGN
-IMAGE MANIPULATION
-PYTHON
-HTML
-MALWARE / MALWARE ANALYSIS
-CRYPTOGRAPHY
-CREATING / FIXING MASTER BOOT RECORDS
-VPN'S
-WIFI AUDITING
-NETWORK ENGINEERING
-NETWORK TROUBLE SHOOTING
-NETWORK SECURITY
-PRIVATE INVESTIGATIONS
-CYBER FORENSICS
-LEARNING LINUX
-ACADEMIC RESEARCH
-TORRENTING
-PERSONAL SERVERS
I've tested BOOTBOX on various devices, but the original version for my personal use was developed and tested on a palm sized SanDisk wireless media drive.
I picked it up while in S. Korea, for it's portability, expandability, and built in wireles router; from there, it developed into a sytem that can be permanently ported to computers.
I've said for years, "It's not the feds or government you need to worry about; The real threat doesn't follow rules or policy."
Working along one of the American borders; a region thick with intelligence operatives & joint operations, internet usage in congested areas comes with inherited threats and obligations.
It doesn't matter if you're just shopping on amazon, doing your school work, banking, logging into your companies portal, or doing gov work, the threat IS REAL, and is not always evident; we have an obligation to secure ourselves & our data. Don't be the weak link. It's hard to be threat free, but we can make it harder for the adversary one step at a time.
Powering on my personal BOOTBOX, I select one of the pre-configured live boot systems that is designed for security & anonymity; for both wired & wireless network connections.
A built-in VPN, DNS encryption, MAC address spoofing, TOR SOCKS, modified browsers to limit threats in website code, and lower chances of device fingerprinting, just to name a few of the integrated features.
The system runs from RAM, writing no data to the hard drive. The system is "amnesiac"; once powered off, it is as though the computer never ran that system.
The system is already configured; just connect to the network of your choice and start your task.
There's also a built in crypto wallet, and cryptographic messaging options.
The supplied BOOTPEN, allows this same system to run on other computers temporarly without leaving much of a trace.
BOOTBOX comes with more than one security based live booting system.
-After powering on my BOOTBOX and selecting Android OS, a custom android kernal is loaded, complete with hardware detection: the touchscreen, mouse, keyboard, bluetooth, WiFi, and USB ports all work.
The system has "root" access by default.
Android enthusiast understand the importance of having root access right out of the box.
Advanced customization capabilities.
Developer Mode can be accessed through the build info.
Applications from any source can be side loaded and installed.
Android apps can be developed and tested all within BOOTBOX.
Below, you can see an example of me sideloading and installing my personal BOOTBOX companion app.
Phone Features
Testing Hardware Detection for onboard cameras
BOOTBOX comes with tools to build custom Android OS's or modify the one it comes with.
Being experienced in Android OS gives the feeling of having my own R2-D2.
Accessing the hard drive of a locked windows 10 computer.
From this live boot system, I can access the hard drives of locked windows computers, reset passwords, retrieve data, clone drives, modify boot records, and more.
Using open source software, I can use the devices harware to scout and map devices broadcast wifi signals, bluetooth signals, and celluar towers. My database of devices I've acquired signal from hit over 100,000 in January 2022; it was a historical moment.
Displayed are the names of the devices, the MAC addresses of the devices, what type of security the device has, the brand of the device, how close the device is to me, longitude, latitude, altitude, number of satellites connected, and the total of my database.
The location of the devices discovery is logged with keyhole markup language and displayed on a map integrated into the app.
Looking at the image below, you can see a mixture of devices captured while driving down the street; some are routers to homes & businesses, others are Bluetooth modules inside of moving vehicles.
SIGINT + GEOINT = ?
There is no single solution to the above equation; but recon & counter intelligence is one way I've used I've personally used it.
(COMING SOON)
Although BOOTBOX comes with resources for developing, investigating, and analyizing malware, this example is based on techniques used to mitigate the damage caused by a ransomeware attach on a laptop.