The new partnew method can be used to boot most linux ISO files (including Ophcrack).
Note: The new partnew method is the same method used by Easy2Boot. Just make an Easy2Boot multiboot USB drive and copy your ISO files to it and boot! For special cases like linux ISOs with persistence, you will also need to add a .mnu file to the Easy2Boot drive.
RMPrepUSB Blog - please leave a comment or feedback on RMPrepUSB or this Tutorial (please mention Tutorial number).
Use any computer without leaving a trace with Tails!
Tails is a Debian based linux which leaves no trace of you ever having used the system. For more details about using Tails - see here. It does not support persistence and the boot device is not accessible to the user.
Tails can be installed to a USB Flash drive, and can be booted from an ISO file on a multiboot USB boot drive if you use the cheat code 'findiso' which luckily Tails supports. See this post from Ilko which shows how the findiso cheat code can be used. A tested and working grub4dos menu.lst entry from that post is shown below (as the post is poorly formatted!):
Once you create your Tails boot disc, you'll be ready to reboot your computer from a USB drive into an encrypted and private operating system preloaded with all the software you'll need to browse the Web, email, IM, and edit documents.
Built-in online anonymity: The key feature that's going to appeal to most people is Tails' built-in online anonymity. This comes in the form of the customized web browser Iceweasel built using the anonymous Web browsing technology from Tor. The browser also includes popular security extensions like HTTPS Everywhere for secure browsing, Adblock Plus to block ads, and NoScript to block Java and Flash. Other than those features, the web browser works exactly like you'd expect a web browser to work.
Built-in encrypted email and chat: Additionally, you also get encrypted and private messaging. Tails includes the Claws email client with OpenPGP for email encryption and the instant messaging client Pidgin with an OTR cryptography tool that encrypts your IM conversations.
Built-in file encryption: When boot Tails from a USB drive instead of a DVD, you can save documents to the thumb drive and they're automatically encrypted using an encryption specification called LUKS. (Since the DVD is read-only, you can't save any files - which is its own form of security.)
A full suite of editing software: On top your web access being private you also get a full suite of work and creative software. Tails comes preloaded with Openoffice for editing documents, Gimp for editing photos, Audacity for editing sound, and lots more additional software
Booting Tails using a menu
You can use the menu below to boot Tails from a USB Flash drive or USB Hard Disk.
Note: If booting from a USB hard disk, you must remove the live-media=removable cheat code (this forces Tails to only look at removable drives when loading the 2nd stage filesystem)!
This also applies if you are booting from a USB Flash drive using a Virtual machine - the VM will treat the USB Flash drive as a Fixed Disk and Tails will not boot if you have live-media=removable set.
Tails does not support persistence on the boot drive for security reasons.
However, this tutorial shows another method of adding a linux ISO to your grub4dos multiboot USB drive which will work with almost 100% of linux ISOs!
Yes, this method should work with almost ANY linux ISO file, even those that do not have a cheat code for post-loading of the ISO file!
The method described below was previously outlined by cdob on reboot.pro here. This method can be used with many linux ISOs but may be particularly useful if you have an NTFS boot partition but the linux version you want to boot to does not support the NTFS filesystem.
This method is used by Easy2Boot (a multiboot USB drive that will boot almost any boot able file just by copying it on!).
PLEASE NOTE: Your boot USB drive must not have more than 3 primary partitions. This procedure writes an entry in the the fourth partition entry in the partition table.
Tails is 'special' however, in that you can only use the method below on a USB Flash drive - it won't work on a USB HDD. However, 99% of most other linux livecd ISOs do work.
The menu below can be used with most linux ISO files.
This tutorial assumes that you already have a grub4dos multiboot USB drive. If you do not already have one, then make one using RMPrepUSB (follow steps 1 and 2 in this tutorial)
Again, be aware that the new grub4dos menu will write a new partition table entry on your USB boot drive (a fourth entry) - this will destroy any existing partition entry that may already be in the fourth position!
Typically most bootable USB drives have only one or two partitions. You can check the four partition table entries on your USB drive using RMPrepUSB - Drive Info - 0.
Booting direct from an ISO also prevents any malware from changing any files in the ISO.
NOTE: Tails is 'special' and does not boot from a USB Hard Disk (FAT32 or NTFS) using the partnew method described below!
Download a linux 'live' ISO and copy it to your grub4dos USB drive
Edit the menu.lst file (press F4 in RMPrepUSB to load it into Notepad). Add the following text to your menu (make sure the set ISO= line has the exact same name as your ISO file)..
# GENERIC - BOOT ANY LINUX FROM ISO
# This menu can be used for to boot any linux iso file
# It is especially useful if your boot drive is NTFS but linux does not understand NTFS once it boots and so cannot boot further
# WARNING: permanently alters the boot device's partition table (adds a 4th ptn entry)!
# Use with care as it will obliterate ptn 4 on the boot device if it already exists!
Note: Once the menu entry has been run, you will have a (nonsensical and overlapping) 4th partition entry (but of type 0 so Windows should not see it).
The new 4th partition will be set to start at a position just after the start of the ISO file and the partition length will be set to the length of the ISO file. It will look to linux as if there is a valid CDFS filesystem in partition 4 which linux will mount and then access for the rest of it's boot files (squashfs, etc.).
Running Ophcrack from an ISO
Ophcrack will boot from an ISO using this 'partnew' method (as used by Easy2Boot), however it will be unable to find the \tables folder.
The easiest way to fix this is simply to extract the top \tables folder from the ophcrack ISO(s) and place it in the root of your USB drive (USB:\tables\xxxx).
Note that this does not work for an exFAT USB drive because the Ophcrack linux distro cannot read exFAT volumes.
e.g. for Easy2Boot you would have this folder structure:
\tables\vista_free\(files here - e.g. table0.ind)
You can add both the XP and Vista/7 tables to the same \tables folder and thus be able to crack Windows XP/Vista/7 passwords.
You can download more tables and put each set of tables in its own directory under \tables (its name is not important, all folders under \tables will be searched):
If you don't want to add the large \tables folder separately, try this...
Booting Ophcrack from an ISO without extracting the \tables folder
Ophcrack version 3.4.0, do the following:
1. After booting from the Ophcrack ISO file, launch the bash shell by clicking on the black square icon at the top left of the Desktop
2. Type su and use the password root to get superuser access rights
3. We need to mount the ISO partition (4th partition) which is normally sdb4 on a single disk system - so type
mount /dev/sdb4 /media/oph
Note: This example assumes that your USB device will be the second disk in your system (i.e. the system has just one internal hard disk, sda, and no other external drives connected), if you have several drives connected, you may need to specify sdc4 or sdd4 rather than sdb4.
...try this procedure if you are not sure what device the 4th partition of the USB drive has been detected as by linux...
First click on My Documents folder on Desktop and then click on the drive symbol for your USB drive - if you have clicked on the correct USB drive, it should immediately change it's name to SliTaz ophcrack and you should be able to see a tables and boot folders within it, then in a console window, now type ...
(look at what \dev\sdx4 device is mounted as /media/SliTaz ophcrack - e.g. it could be /dev/sdb4). The entry should always end in 4 as it is the fourth partition. In the Explorer GUI window, right-click on the SliTaz ophcrack device and choose Unmount File System to unmount it. Now mount it to sdb4 by typing...
mount /dev/sdb4 /media/oph
4. Now double-click on the Launcher desktop icon and choose 'Search' from the Ophcrack Launcher menu list
Here is an example grub4dos menu.lst entry (cut and paste it into your menu):
# make empty table entry in 4th position in ptn table before running any menu entry
parttype (hd0,3) | set check=
if %check%==0x00 partnew (hd0,3) 0 0 0
if not %check%==0x00 echo WARNING: PTN TABLE ENTRY 4 IS ALREADY IN USE! && pause
# menu entry for Ophcrack ISO
title (ISO) OphCrack Password Cracker XP 3.4.0 from ISO (using partnew)\nTo find the tables type: su root, mkdir /media/oph, mount /dev/sdb4 /media/oph and then run Launcher.
find --set-root %ISO%
parttype (hd0,3) | set check=
if %check%==0x00 partnew (hd0,3) 0x00 %ISO%
if NOT %check%==0x00 echo ERROR: Partion Table entry 4 already exists - so will not map %ISO% to ptn 4 ! && pause --wait=3 && configfile /menu.lst
map %ISO% (0xff)
See here for a list of ISO files that have been tested.
Some linux ISOs can be found on this page - here are some I tested and worked...