Gee "1337", I wonder why you're asking these questions? Doesn't sound like you're particularly "1337" at all.
Well, when geeks casually refer to things like "The Internets" or other silly terms/conventions in common conversation, it's generally understood that we're implictly mocking those who actually talk that way, and not meaning it seriously. Given that this is a text-only medium, and a new user, let's not be too judgemental
To go back to the OP, Backtrack is a highly customized LiveCD, and not a general-purpose distro, so while some tools may work on the N900, you can't "run backtrack" on it in any normal sense.
As to the response from Nokia, I'm hardly surprised. The thing about counter-/security is that you're expected to figure things out yourself for the most part. Whatever shade their hat is, most are fairly professional about what they do. As such, academic/technical discussion and learning is encouraged, but questions like "how do I setup wifi cracking" tend to get dismissed on principle (even if you weren't being a noob). The assumption is that if you're seriously interested in security (and not just trying to compromise your neighbour's network to be a jerk), then you'll invest time and work into learning the art of security properly, and not expect a quick tutorial on how to do things of potentially dubious legality. I'm not accusing you of this personally, but trying to explain how such questions usually come across.
Well, when geeks casually refer to things like "The Internets" or other silly terms/conventions in common conversation, it's generally understood that we're implictly mocking those who actually talk that way, and not meaning it seriously.
I prefer "Blogotubes" myself.
That said, it's safe to assume that RE is not going to port the entire BT distro to the n900, but most of the utilities should cross compile OK.
If I remember correctly, one of the RE guys had been working with one of the older NITs a while back, so they're at least somewhat familiar with the devices. Perhaps their forum would be the best place to enquire? The remote-exploit team has been quite cooperative in my experience.
Don't know about Backtrack (I don't imagine they're going to want to go through and rebuild everything for ARM sources), but you might want to check out the next version of NeoPwn.
The previous version ran on Openmoko, and they announced that the new version is for the N900. I suspect odds are good that they'll get packet injection working.
its only a matter of time before we see tools like MSF and Aircrack-ng ported to fremantle. lucky for us, most of the pen testing apps are ran from within console, so porting should be fairly easy, unless there is an issue with the arm arch. i say either be patient, or get the sdk and see what you can do to speed things along. thats just me though.
its only a matter of time before we see tools like MSF and Aircrack-ng ported to fremantle. lucky for us, most of the pen testing apps are ran from within console, so porting should be fairly easy, unless there is an issue with the arm arch. i say either be patient, or get the sdk and see what you can do to speed things along. thats just me though.
There's no need to port MSF, since it runs on ruby, with a few additions (mainly rubygems). There's already ruby and irb ports in the extras-devel repository, and I can confirm that MSF works quite well, so far
I've installed aircrack-ng from debian arm repos without any issues.
After that, airodump works but seems to see everything on channel 6.
aicrack-ng --test try to inject packets but it's not successful.