You are on page 1of 2

Logbook Reporting Week 4 #: Multi Boot USB Toolkit Date:13 Feb 2022

Introduction:

The overall purpose of the lab is to provide knowledge about the multiboot USB toolkit. How to
install ventoy tool along with checking all hash values and Kali Linux as well as other distros to
install. It also provides information about utilities to install and what type of other tools are
helpful for this field. The difference between BIOS and UEFI is provided in the lab also describes
how IT professionals utilize the tools in, multiboot USB drives.

Activities:

• Download the Ventoy tool and check the all downloaded file integrity in this lab
• Intstall Ventoy nad format usb drive
• Install Kali and other distros, such as Ubuntu, Linux Mint, RedHat, OpenSuse, etc.
• To select two utilities to install hash values.
• Completed reboot and demonstrate that you have completed the task using the
screenshot
• To provide a reason behind the selection of specific utilities
• What other types of tools can be seen from the Ventoy menu that would be useful in the
field.
• To provide a distinction between BIOS and UEFI to boot
• To explain how can an IT professional utilize the tools on your multiboot drive

Discussion:

• Ventoy is an open-source tool to create a bootable USB drive for


ISO/WIM/IMG/VHD(x)/EFI files. With, Ventoy there is not need to format the disk over
and over again. We just need to copy the ISO/WIM/IMG/VHD(x)/EFI files to the USB drive
and boot them directly. We can copy multiple files at a time and ventoy will give you a
boot menu to select them (screenshot).
• To check file integrity:
To check file integrity we use the checksum tool. Most checksum tools are command-line
tools that don't let you scare off.

• Kali Linux is an open-source, Debian-based Linus distribution geared towards various


information security tasks, such as Penetration Testing, Security Research, Computer
Forensics, and Reverse Engineering.
• One type is selected from other distros such as Ubuntu, RedHat, Linux Mint, OpenSuse
and asked to gather hash values.
• Moreover, after the completion of rebooting and demonstration of what we have
completed by showing Kali distro booting and our selected linux distro, siding
screenshots.
• Two utilities and reasons to install them :
1) Nmap- Network mapper, mostly known as Nmap in short form, is a free, open-source
utility used for network discovery and vulnerability scanning. Nmap is used by security
professionals to discover running in their environment. Moreover, the services, and ports each
host is serving, exposing potential security can also be revealed by Nmap. Flexibility to monitor
a single host or vast network including hundreds if not thousands of devices and subnets is
offered by Nmap. Furthermore, Nmap is a port scanning tool that collects information by
sending raw packets to a host system. Nmap then listens for responses and determines if a
port is open, closed, or filtered.

2)Metasploit- The Metasploit Framework is an open-source project that provides a


public resource for researching vulnerabilities and developing code with the assistance of which
security professionals can infiltrate their network and identify security risks and vulnerabilities.
Metasploit is very robust with its features and flexibility and another common reason to utilize it
is the exploitation of vulnerabilities. Metasploit is being considered as an advanced utility and
requires some time to become familiar, once it gets familiar it will be an invaluable resource.

• Difference between BIOS and UEFI

UEFI stands for Unified Extensible Firmwork Interface. It does the same job as a BIOS, but
with one basic difference, it stores all data about initialization and startup in a .efi file, instead of
sorting it on firmware. UEFI was designed to overcome the limitations of BIOS, UEFI supports
drive sizes up to 9 zettabytes, whereas BIOS only supports 2.2 terabytes.UEFI provides faster
boot time.UEFI has discrete drive support, while BIOS has drive support stored in its ROM,
updation of BIOS firmware is a bit difficult Secure boot type security is provided by UEFI which
prohibits the PC to boot unsigned applications.

BIOS stands for Basic Input Output System that operates by reading the first sector of the hard
drive which has the address of the next device to initialize or code executed. The boot device
which is required to initialize for starting the operating system is also selected by BIOS.BIOS
uses The Master Boot Record (MBR) to save information about the hard device while UFEI uses
the GUID partition table (GPT). The main difference between MBR and GPT is that the former
uses 32-bit entries in its table while the latter uses 64-bit entries in its table which extends the
support for size possibilities of the hard drive.

As well as, distinct types of tools can be useful for our field were also discussed in this lab.

Conclusion:
In nutshell, in this lab, we learned about different types of tools such as Ventoy and Kali Linux
for storing information using a USB drive and I learned about how to check file integrity using
tools and how to take screenshots of hash values of downloaded values. Moreover, I also
acquired information that after installing the tool format of the USB drive is required as stored
information will be lost. Furthermore, I also gained information about another type of utilities to
install of my own choice as well as I learned to reboot the system using the USB drive. Apart
from this, I gathered information about what we should consider for selecting distinct utilities as
well as what type of other tools we can see from the ventoy menu that would be useful to you in
your field. I leanred about the distinguish between BIOS and UEFI boot and also gained
knowlegde about how can an IT professional utilize the tools on your multiboot usb drive.

You might also like