Jump to content

My Multipass, All Programs Working


5h4rk
 Share

Recommended Posts

hi guys, after browsing this board and having learnt a few interesting things, i thought it was time i contributed with something myself.

i have seen a lot of people having trouble installing certain apps to their multipasses, i know certain apps gave me a hard time, but search and research never hurt anyone, so in the the end i managed to make my multipass with the programs i suppose i need, for now.

on my multipass i have the following programs:

BT4 R1

Hirens boot CD

memtest

Paragon Backup

Partition Magic 5.3

Kaspersky Rescue Disk

Trinity Rescue Kit

Ultimate Boot Cd 5.0.3

here is the tree:

|-- Boot
|   |-- konboot.gz
|   |-- memdisk
|   |-- memtest.bin
|   |-- memtest.exe
|   `-- soa.xpm
|-- [BOOT]
|   `-- Bootable_NoEmulation.img
|-- bootbt4
|   |-- bootsplash
|   |-- grub
|   |   |-- bt4.xpm.gz
|   |   |-- menu.lst
|   |   `-- stage2_eltorito
|   |-- initrd800.gz
|   |-- initrdfr.gz
|   |-- initrd.gz
|   |-- memtest86+.bin
|   `-- vmlinuz
|-- boot.catalog
|-- casper
|   |-- filesystem.manifest
|   |-- filesystem.manifest-desktop
|   |-- filesystem.squashfs
|   `-- sedIMqeji
|-- CLEAN
|-- Ghost11
|   |-- Ghost32.exe
|   |-- GHOSTERR.TXT
|   |-- Ghost.exe
|   |-- Ghostexp.exe
|   `-- GhostSrv.exe
|-- grldr
|-- HBCD
|   |-- Astra.uha
|   |-- BiosBoot.uha
|   |-- boot.gz
|   |-- chntpw
|   |-- chntpw.gz
|   |-- CopyR.uha
|   |-- CopyWipe.uha
|   |-- dban.gz
|   |-- DCC.uha
|   |-- DosNav.uha
|   |-- ESTest.uha
|   |-- FastLynx.uha
|   |-- FileMave.uha
|   |-- FWizard.uha
|   |-- grldr
|   |-- HDAT2.uha
|   |-- HddErase.uha
|   |-- HddTools.uha
|   |-- HWiNFO.uha
|   |-- isolinux.bin
|   |-- isolinux.cfg
|   |-- Keyboard.bat
|   |-- Killdisk.uha
|   |-- konboot.gz
|   |-- linux
|   |-- MBRUtil.uha
|   |-- memdisk
|   |-- memtest.gz
|   |-- menu.c32
|   |-- menu.lst
|   |-- MHDD.uha
|   |-- Mini98.uha
|   |-- Mix.uha
|   |-- Network.uha
|   |-- NSSI.uha
|   |-- Ntfs4Dos.uha
|   |-- ntldr.gz
|   |-- NtPwd.uha
|   |-- PCI32.uha
|   |-- plpbt.bin
|   |-- pResizer.uha
|   |-- PtEdit.uha
|   |-- QuickVie.uha
|   |-- ReadNtfs.uha
|   |-- RegView.uha
|   |-- SavePart.uha
|   |-- smartbm.gz
|   |-- SystemAn.uha
|   |-- TestDisk.uha
|   |-- Tools.uha
|   |-- uharc.exe
|   |-- VC.uha
|   |-- Victoria.uha
|   |-- Vivard.uha
|   |-- WinTools
|   |   |-- 7-Zip.bat
|   |   |-- AlternateStreamView.bat
|   |   |-- AngryIPScanner.bat
|   |   |-- AsteriskLogger.bat
|   |   |-- Autologon.bat
|   |   |-- Autorun.csv
|   |   |-- Autorun.exe
|   |   |-- AutoRuns.bat
|   |   |-- BartsStuffTest.bat
|   |   |-- BellaVista.bat
|   |   |-- BlueScreenView.bat
|   |   |-- BootICE.bat
|   |   |-- BootSect.bat
|   |   |-- BulkRenameUtility.bat
|   |   |-- CCleaner.bat
|   |   |-- Cleanup.bat
|   |   |-- ComboFix.bat
|   |   |-- ComboFix.exe
|   |   |-- ContentAdvisorPasswordRemover.bat
|   |   |-- CoolWebSearch_Remover.bat
|   |   |-- CPorts.bat
|   |   |-- CPUz.bat
|   |   |-- Defraggler.bat
|   |   |-- DeleteDoctor.bat
|   |   |-- DependencyWalker.bat
|   |   |-- DialAFix.bat
|   |   |-- DisableAutorun.bat
|   |   |-- DisableCompressOldFiles.bat
|   |   |-- DiskCryptor.bat
|   |   |-- DiskDigger.bat
|   |   |-- DiskMan4.bat
|   |   |-- DiskView.bat
|   |   |-- DoubleDriver.bat
|   |   |-- DriveImageXML.bat
|   |   |-- DriverBackup.bat
|   |   |-- DrWebCureIt.exe
|   |   |-- DskSpeed.bat
|   |   |-- DTemp.bat
|   |   |-- EasyUHA.exe
|   |   |-- EditHosts.bat
|   |   |-- ERDComputerManagement.bat
|   |   |-- ERDExplorer.bat
|   |   |-- ERUNT.bat
|   |   |-- Explore2fs.bat
|   |   |-- EzPCFix.bat
|   |   |-- FastCopy.bat
|   |   |-- Fat32Formatter.bat
|   |   |-- FileDisk.bat
|   |   |-- Files
|   |   |   |-- 7-Zip.uha
|   |   |   |-- BellaVista.uha
|   |   |   |-- BootICE.uha
|   |   |   |-- BootSect.uha
|   |   |   |-- BulkRenameUtility.uha
|   |   |   |-- Cleanup.uha
|   |   |   |-- CoolWeb.uha
|   |   |   |-- CpuZ.uha
|   |   |   |-- Cygwin1.uha
|   |   |   |-- DDriver.uha
|   |   |   |-- DependencyWalker.uha
|   |   |   |-- DialAFix.uha
|   |   |   |-- DiskCryptor.uha
|   |   |   |-- DiskDigger.uha
|   |   |   |-- DriveImageXML.uha
|   |   |   |-- Explore2fs.uha
|   |   |   |-- EzPCFix.uha
|   |   |   |-- FastCopy.uha
|   |   |   |-- FileDisk.uha
|   |   |   |-- Files.uha
|   |   |   |-- FixHDC.uha
|   |   |   |-- GImageX.uha
|   |   |   |-- GlaryRegistryRepair.uha
|   |   |   |-- GMER.uha
|   |   |   |-- GPU-Z.uha
|   |   |   |-- H2testw.uha
|   |   |   |-- HDDScan.uha
|   |   |   |-- HDHacker.uha
|   |   |   |-- HDTune.uha
|   |   |   |-- HijackThis.uha
|   |   |   |-- HxD.uha
|   |   |   |-- InfraRecorder.uha
|   |   |   |-- IrfanView.uha
|   |   |   |-- JkDefrag.uha
|   |   |   |-- KeyTweak.uha
|   |   |   |-- LicenseCrawler.uha
|   |   |   |-- Malwarebytes.uha
|   |   |   |-- MbrFix.uha
|   |   |   |-- MBRWiz.uha
|   |   |   |-- mkisofs.uha
|   |   |   |-- NirSoft.uha
|   |   |   |-- NTFSAccess.uha
|   |   |   |-- NTREGOPT.uha
|   |   |   |-- Opera.uha
|   |   |   |-- PartFind.uha
|   |   |   |-- PartitionRecovery.uha
|   |   |   |-- PartitionWizard.uha
|   |   |   |-- PasswordRenew.uha
|   |   |   |-- PCwizard.uha
|   |   |   |-- Piriform.uha
|   |   |   |-- PuTTY.uha
|   |   |   |-- RegEditPE.uha
|   |   |   |-- RemoveFakeAntivirus.uha
|   |   |   |-- Restoration.uha
|   |   |   |-- SelfImage.uha
|   |   |   |-- SmartDriverBackup.uha
|   |   |   |-- SmartPartitionRecovery.uha
|   |   |   |-- SmitfraudFix.uha
|   |   |   |-- SM.uha
|   |   |   |-- SoftPerfectFileRecovery.uha
|   |   |   |-- SpybotSD.uha
|   |   |   |-- SpywareBlaster.uha
|   |   |   |-- SRunners.uha
|   |   |   |-- SumatraPDF.uha
|   |   |   |-- SuperAntiSpyware.uha
|   |   |   |-- Sysinternals.uha
|   |   |   |-- TeamViewer.uha
|   |   |   |-- TightVNC.uha
|   |   |   |-- TotalCmd.uha
|   |   |   |-- TrueCrypt.uha
|   |   |   |-- TweakUI.uha
|   |   |   |-- UltimateWindowsTweaker.uha
|   |   |   |-- Unlocker.uha
|   |   |   |-- UpdateChecker.uha
|   |   |   |-- USBGrub.uha
|   |   |   |-- VFD.uha
|   |   |   |-- Victoria.uha
|   |   |   |-- VideoMemoryStressTest.uha
|   |   |   |-- WDDataLifeguardDiagnostic.uha
|   |   |   |-- WindirSt.uha
|   |   |   |-- WindowsGate.uha
|   |   |   |-- WinKeyFinder.uha
|   |   |   |-- Xp-AntiSpy.uha
|   |   |   `-- XXClone.uha
|   |   |-- FixHDC.bat
|   |   |-- GetDataFAT.bat
|   |   |-- GetDataNTFS.bat
|   |   |-- Ghost32.bat
|   |   |-- GhostExp.bat
|   |   |-- GImageX.bat
|   |   |-- GlaryRegistryRepair.bat
|   |   |-- GMER.bat
|   |   |-- GPU-Z.bat
|   |   |-- Grub4DosInstaller.bat
|   |   |-- H2testw.bat
|   |   |-- HBCDCustomizer.exe
|   |   |-- HDDScan.bat
|   |   |-- HDHacker.bat
|   |   |-- HDTune.bat
|   |   |-- HijackThis.bat
|   |   |-- HxD.bat
|   |   |-- IBProcMan.exe
|   |   |-- IEPassView.bat
|   |   |-- InfraRecorder.bat
|   |   |-- InstalledCodec.bat
|   |   |-- IrfanView.bat
|   |   |-- JkDefrag.bat
|   |   |-- KeyTweak.bat
|   |   |-- KillBox.exe
|   |   |-- LicenseCrawler.bat
|   |   |-- MailPassView.bat
|   |   |-- Malwarebytes.bat
|   |   |-- MbrFix.bat
|   |   |-- MBRUtility.bat
|   |   |-- MbrWizard.bat
|   |   |-- MemTest.bat
|   |   |-- MessenPass.bat
|   |   |-- MonitorTester.bat
|   |   |-- MyUninstaller.bat
|   |   |-- NetworkPasswordRecovery.bat
|   |   |-- NewSID.bat
|   |   |-- NTFSAccess.bat
|   |   |-- NtRegOpt.bat
|   |   |-- OpenedFilesView.bat
|   |   |-- Opera.bat
|   |   |-- PageDfrg.bat
|   |   |-- PartitionFindAndMount.bat
|   |   |-- PartitionRecovery.bat
|   |   |-- PartitionWizard.bat
|   |   |-- PartSaving.bat
|   |   |-- PasswordFox.bat
|   |   |-- PasswordRenew.bat
|   |   |-- PCI32.bat
|   |   |-- PCWizard.bat
|   |   |-- PhotoRec.bat
|   |   |-- ProcessActivityView.bat
|   |   |-- ProcessExplorer.bat
|   |   |-- ProcessMonitor.bat
|   |   |-- ProceXP.exe
|   |   |-- ProduKey.bat
|   |   |-- ProtectDriveFromAutorunVirus.bat
|   |   |-- PstPassword.bat
|   |   |-- PuTTY.bat
|   |   |-- RawCopy.bat
|   |   |-- Recuva.bat
|   |   |-- RegEditPE.bat
|   |   |-- RegFromApp.bat
|   |   |-- RegistryBackup.bat
|   |   |-- RegRestoreWizard.bat
|   |   |-- RegScanner.bat
|   |   |-- RegShot.bat
|   |   |-- RemoveFakeAntivirus.bat
|   |   |-- RemoveRestrictionsTool.bat
|   |   |-- RemoveWGA.bat
|   |   |-- Restoration.bat
|   |   |-- RootkitRevealer.bat
|   |   |-- SearchMyFiles.bat
|   |   |-- SelfImage.bat
|   |   |-- ShadowCopy.bat
|   |   |-- ShellMenuNew.bat
|   |   |-- ShExView.bat
|   |   |-- ShowHiddenDevices.bat
|   |   |-- Shredder.bat
|   |   |-- SilentRunners.bat
|   |   |-- siw.exe
|   |   |-- SmartDriverBackup.bat
|   |   |-- SmartPartitionRecovery.bat
|   |   |-- SmartSniff.bat
|   |   |-- SM.bat
|   |   |-- SmitFraudFix.bat
|   |   |-- SnapShot.bat
|   |   |-- snapshot.exe
|   |   |-- SniffPass.bat
|   |   |-- SoftPerfectFileRecovery.bat
|   |   |-- SpaceMonger.bat
|   |   |-- Speccy.bat
|   |   |-- Splitter.exe
|   |   |-- SpybotSD.bat
|   |   |-- SpywareBlaster.bat
|   |   |-- StartupCPL.bat
|   |   |-- StartupMonitor.exe
|   |   |-- SumatraPDF.bat
|   |   |-- SuperAntiSpyware.bat
|   |   |-- TCPView.bat
|   |   |-- TeamViewer.bat
|   |   |-- TestDisk.bat
|   |   |-- TightVNCServer.bat
|   |   |-- TightVNCViewer.bat
|   |   |-- TotalCommander.bat
|   |   |-- TrueCrypt.bat
|   |   |-- TweakUI.bat
|   |   |-- UltimateWindowsTweaker.bat
|   |   |-- Undelete.bat
|   |   |-- UnknownDevices.bat
|   |   |-- Unlocker.bat
|   |   |-- UnstoppableCopier.bat
|   |   |-- UpdateChecker.bat
|   |   |-- UsbDeView.bat
|   |   |-- USBFormat.bat
|   |   |-- Victoria.bat
|   |   |-- VideoMemoryStressTest.bat
|   |   |-- VirtualFloppyDrive.bat
|   |   |-- WDDataLifeguardDiagnostic.bat
|   |   |-- WinDirStat.bat
|   |   |-- WindowsGate.bat
|   |   |-- WinKeyFinder.bat
|   |   |-- WirelessKeyView.bat
|   |   |-- WriteProtectUSBDevicesOnThisPC.bat
|   |   |-- xp-AntiSpy.bat
|   |   |-- XP-Key-Reader.bat
|   |   |-- XpTCPIPWinsockRepair.bat
|   |   `-- XXClone.bat
|   |-- XP
|   |-- XpAutorun.cmd
|   |-- XP.BIN
|   |-- XP.CA_
|   |-- XP.DAT
|   `-- XPLOADER.BIN
|-- hirens
|   `-- menu.lst
|-- images
|   |-- memtest.bin
|   |-- ParagonBk.iso
|   `-- pmagic-5.3.iso
|-- konboot
|   |-- menu.lst
|   `-- menu.lst~
|-- liveusb
|-- memdisk
|-- menu2.lst
|-- menu2.lst~
|-- menu.lst
|-- menu.lst~
|-- mt86
|   `-- menu.lst
|-- pb9
|   `-- menu.lst
|-- pm5
|   `-- menu.lst
|-- rescue
|   |-- liveusb
|   |-- menu.lst
|   |-- menu.lst~
|   `-- rescue.iso
|-- sources
|   |-- boot.wim
|   `-- TRANS.TBL
|-- StartHBCD.cmd
|-- Trk3
|   |-- AUTORUN.INF
|   |-- boot.cat
|   |-- bootlogo.jpg
|   |-- captive
|   |-- disableautorun.exe
|   |-- initrd.trk
|   |-- isolinux.bin
|   |-- isolinux.cfg
|   |-- kernel.trk
|   |-- memdisk
|   |-- memtest.x86
|   |-- menu.lst
|   |-- mkpxelinux
|   |-- pxelinux.0
|   |-- pxelinux.cfg
|   |-- share
|   |   `-- pi
|   |       |-- pi.fr
|   |       |-- unpi.cfg
|   |       `-- unpi.fr
|   |-- syslinux
|   |-- syslinux.cfg
|   |-- syslinux.exe
|   |-- trinity.ico
|   |-- trkramfs
|   |-- trspack-1_0.exe
|   |-- trsrun-1_0.exe
|   |-- trsrun-1_0-nq.exe
|   `-- vesamenu.c32
`-- ubcd503
    |-- menu.lst
    |-- menu.lst~
    `-- ubcd503.iso

23 directories, 397 files 

to keep the root of the drive a bit cleaner what i did was make a menu.lst the would link me to another menu.lst file that is located in the particular programs folder, seeing as some of them need the iso image in the same directory as the menu.lst file, for ex, UBCD.

this way i keep the menu.lst file uncluttered, making it easier to work with if i have to make changes on that particular program's file.

on the root of the drive i have this menu.lst file:

splashimage /Boot/soa.xpm

default 11
timeout 600

title  MULTIPASS


################BOOT HARD DRIVE###############################
title Boot the First Hard Disk
rootnoverify (hd1)
chainloader +1

title -= BackTrack 4 R1 =-
configfile /bootbt4/grub/menu.lst

title Hirens Boot CD
configfile /hirens/menu.lst

title KONBOOT
configfile /konboot/menu.lst

title MemTest86+ 4.1
configfile /mt86/menu.lst

title Paragon Backup 9
configfile /pb9/menu.lst

title Parted Magic 5.3
configfile /pm5/menu.lst

title TRINITY RESCUE KIT 3.4
configfile /Trk3/menu.lst

title ULTIMATE BOOT CD
configfile /ubcd503/menu.lst

title KAV 2010 Rescue.iso
configfile /rescue/menu.lst

BACKTRACK

i made a folder on the root of the drive, named it bootbt4, and extracted the contents of the downloaded iso file to it.

i then edited the menu.lst in the grub folder to this:

# By default, boot the first entry.
default 0

# Boot automatically after 30 secs.
timeout 30

splashimage=/boot/grub/bt4.xpm.gz
foreground e3e3e3
background 303030

title                Start BackTrack FrameBuffer (1024x768)
kernel                /bootbt4/vmlinuz BOOT=casper boot=casper nopersistent rw quiet vga=0x317
initrd                /bootbt4/initrd.gz

title                Start BackTrack FrameBuffer (800x600)
kernel                /bootbt4/vmlinuz BOOT=casper boot=casper nopersistent rw quiet vga=0x314
initrd                /bootbt4/initrd800.gz

title                Start BackTrack Forensics (no swap)
kernel                /bootbt4/vmlinuz BOOT=casper boot=casper nopersistent rw vga=0x317
initrd                /bootbt4/initrdfr.gz

title                Start BackTrack in Safe Graphical Mode
kernel                /bootbt4/vmlinuz BOOT=casper boot=casper xforcevesa rw quiet 
initrd                /bootbt4/initrd.gz

title                Start Persistent Live CD
kernel                /bootbt4/vmlinuz BOOT=casper boot=casper persistent rw quiet 
initrd                /bootbt4/initrd.gz

title                Start BackTrack in Text Mode
kernel                /bootbt4/vmlinuz BOOT=casper boot=casper nopersistent textonly rw quiet
initrd                /bootbt4/initrd.gz

title                Start BackTrack Graphical Mode from RAM
kernel                /bootbt4/vmlinuz BOOT=casper boot=casper toram nopersistent rw quiet 
initrd                /bootbt4/initrd.gz

title                Memory Test
kernel                /bootbt4/memtest86+.bin

title                Boot the First Hard Disk
root                (hd0)
chainloader +1

KONBOOT

for konboot, i downloaded the zip file, which i extracted to my hard drive, then zipped it using gzip. i then put this gz file in the boot folder, where i also have memdisk and memtest.bin files, which it needs to boot.

menu.lst for konboot:


.:=| KONBOOT |=:.
title Kon-Boot\nWindows (any/blank password) and Linux (kon-usr) Login Without a Password
find --set-root /Boot/konboot.gz
kernel /Boot/memdisk
initrd /Boot/konboot.gz

title .:=| BACK TO MAIN SELECTION MENU  |=:.
configfile /menu.lst

HIRENS BOOT CD

for hirens i extracted the iso to its folder on the root of the drive, named HBCD. i then created another folder named hirens, and put this menu.lst in there:


splashimage /Boot/soa.xpm 
color green/black magenta/black

default 11
timeout 600




title .:=| Hiren's 11   - BootCD      (MS-DOS based programs) |=:.
find --set-root /HBCD/boot.gz
kernel /HBCD/memdisk
initrd /HBCD/boot.gz


title .:=| Hiren's 11   - Mini XP     (Based on Windows XP) |=:.
find --set-root /HBCD/XPLOADER.BIN
chainloader /HBCD/XPLOADER.BIN

title .:=| BACK TO MAIN SELECTION MENU  |=:.
configfile /menu.lst

i havent tried to replace the HBCD folder menu.lst with this one yet to see if it works, but if anyone wants to try it out and post the results, you are welcome.

i also created a folder called images, which is where i put some iso files, that can work from there.

in there i have:

memtest.bin

Paragon Backup.iso

Partition Magic.iso

the menu.lst are put in folders in the root of the drive, with only the menu.lst in there.

memtest86+ menu.lst is located at /m86/menu.lst

splashimage /Boot/soa.xpm 
color green/black magenta/black

default 11
timeout 600





title .:=| MemTest86+ 4.1 |=:.
find --set-root /images/memtest.bin
kernel /images/memtest.bin
boot

title .:=| BACK TO MAIN SELECTION MENU  |=:.
configfile /menu.lst

Paragon Backup, same procedure as memtes, file is located at /pb9/menu.lst

splashimage /Boot/soa.xpm 
color green/black magenta/black

default 11
timeout 600




#Direct mapping: read the direct mapped image. Fast than Memory mapping.
title .:=| Paragon Backup 9 Exp.      (Backup e Restauro de PCs) |=:.
find --set-root /images/ParagonBk.iso
map --mem /images/ParagonBk.iso (hd32)
map --hook
root (hd32)
chainloader (hd32)
boot

title .:=| BACK TO MAIN SELECTION MENU  |=:.
configfile /menu.lst

and Partition magic as well, /pm5/menu.lst

splashimage /Boot/soa.xpm 
color green/black magenta/black

default 11
timeout 600



#Direct mapping: read the direct mapped image. Fast than Memory mapping.  
title .:=| Parted Magic 5.3           (Mini-Linux*Gestor de Particoes) |=:.
find --set-root /images/pmagic-5.3.iso
map --mem /images/pmagic-5.3.iso (hd32)
map --hook
root (hd32)
chainloader (hd32) 
boot


title .:=| BACK TO MAIN SELECTION MENU  |=:.
configfile /menu.lst

KASPERSKY RESCUE DISK

kaspersky was a bit tricky, but after a bit of searching i got it.

first i created a file named liveusb (NO EXTENSION!!!!!) on the root of the drive (idk if it is needed, but i put it there anyway.)

i then created a folder and named it rescue. it must be named this to work, otherwise when it loads it wont be able to find the bootable device.

in this folder i created another file named liveusb again (again i dont if it is needed, i do know that one of the the 2 liveusb files is needed, so i use them both).

naturally we have the menu.lst file here, and the iso, which has to be named rescue.iso, for the same reason as the folder name (yes, i tried changing the names and editing the menu.lst, but it wouldnt work).

the menu.lst:

#splash color text test
splashimage /Boot/soa.xpm 
color green/black magenta/black
#  set color_highlight=magenta/black


#splashimage /Boot/soa.xpm

default 11
timeout 600


title KAV 2010 Rescue.iso
map /recue/rescue.iso (0xff) || map --mem /rescue/rescue.iso (0xff)
map --hook
root (0xff)
chainloader (0xff)

TRINITY RESCUE KIT

for trinity i created a folder on my hard drive and extracted the iso contents to it. do not name that folder trk3, but whatever else you like.

once extracted, copy all the contents of the trk3 to the folder you created, then you can delete the trk3 folder, seeing as you have its contents in the main folder. you can also delete the [bOOT] folder, it wont be needed.

now you can rename that folder to trk3, and copy it to the root of your drive. when you edit the menu.lst file, make sure that the vollabel is the same as the name you gave your usb drive (in my case my drive is named, wait for it...... MULTIPASS, lol), otherwise it wont work

the menu.lst:

default
splashimage /Trk3/bootlogo.xpm.gz


title Trinity Rescue Kit 3.4 (default mode, with text menu)
kernel /Trk3/kernel.trk ramdisk_size=65536 root=/dev/ram0 vga=788 splash=verbose pci=conf1 trkmenu vollabel=MULTIPASS timeout 100
initrd /Trk3/initrd.trk


title TRK 3.4 In failsafe mode (No menu, VGA, noacpi, noapic)
kernel /Trk3/kernel.trk ramdisk_size=65536 root=/dev/ram0 vga=788 splash=verbose acpi=off noapic pci=conf1 vga=1 vollabel=MULTIPASS
initrd /Trk3/initrd.trk

title TRK 3.4 Running from RAM (best >= 512mb, 256mb min)
kernel /Trk3/kernel.trk ramdisk_size=65536 root=/dev/ram0 vga=788 splash=verbose pci=conf1 trkinmem trkmenu vollabel=MULTIPASS
initrd /Trk3/initrd.trk

title TRK 3.4 Run 'mclone' in client mode (!)
kernel /Trk3/kernel.trk ramdisk_size=65536 root=/dev/ram0 vga=788 splash=verbose pci=conf1 mclone vollabel=MULTIPASS
initrd /Trk3/initrd.trk

title TRK 3.4 Simple VGA mode (debugging of kernel output)
kernel /Trk3/kernel.trk ramdisk_size=65536 root=/dev/ram0 vga=1 pci=conf1 splash=off trkmenu vollabel=MULTIPASS
initrd /Trk3/initrd.trk


title TRK 3.4 Virusscan all drives (Clamav, non interactive)
kernel /Trk3/kernel.trk ramdisk_size=65536 root=/dev/ram0 vga=788 splash=verbose pci=conf1 virusscan vollabel=MULTIPASS
initrd /Trk3/initrd.trk

title TRK 3.4 Try more pcmcia and usb nics (when not detected)
kernel /Trk3/kernel.trk ramdisk_size=65536 root=/dev/ram0 vga=788 splash=verbose pci=conf1 pcmcia trkmenu vollabel=MULTIPASS
initrd /Trk3/initrd.trk

title TRK 3.4 Try more SCSI drivers (when disks not detected)
kernel /Trk3/kernel.trk ramdisk_size=65536 root=/dev/ram0 vga=788 splash=verbose pci=conf1 scsidrv trkmenu vollabel=MULTIPASS
initrd /Trk3/initrd.trk

title TRK 3.4 With a secure shell server enabled
kernel /Trk3/kernel.trk ramdisk_size=65536 root=/dev/ram0 vga=788 splash=verbose pci=conf1 sshd vollabel=MULTIPASS
initrd /Trk3/initrd.trk

title TRK 3.4 Execute local scripts on harddrive of PC
kernel /Trk3/kernel.trk ramdisk_size=65536 root=/dev/ram0 vga=788 splash=verbose pci=conf1 locscr vollabel=MULTIPASS
initrd /Trk3/initrd.trk

title TRK 3.4 As bootserver to boot other TRK clients
kernel /Trk3/kernel.trk ramdisk_size=65536 root=/dev/ram0 vga=788 splash=verbose pci=conf1 trkbootnet trkmenu vollabel=MULTIPASS
initrd /Trk3/initrd.trk

title TRK 3.4 Fileshare all drives as guest, no security
kernel /Trk3/kernel.trk ramdisk_size=65536 root=/dev/ram0 vga=788 splash=verbose pci=conf1 smbguest trkmenu vollabel=MULTIPASS
initrd /Trk3/initrd.trk

title TRK 3.4 Single user mode (no menu)
kernel /Trk3/kernel.trk ramdisk_size=65536 root=/dev/ram0 vga=788 splash=verbose pci=conf1 runlevel 1 vollabel=MULTIPASS
initrd /Trk3/initrd.trk

title TRK 3.4 Acpi=off, noapic  PCI=^bios (Alternate boot 1)
kernel /Trk3/kernel.trk ramdisk_size=65536 root=/dev/ram0 vga=788 splash=verbose acpi=off noapic pci=bios trkmenu vollabel=MULTIPASS
initrd /Trk3/initrd.trk

title TRK 3.4 Acpi=off, noapic PCI=any (Alternate boot 2)
kernel /Trk3/kernel.trk ramdisk_size=65536 root=/dev/ram0 vga=788 splash=verbose acpi=off noapic trkmenu vollabel=MULTIPASS
initrd /Trk3/initrd.trk

title TRK 3.4 PCI=conf2 (Alternate boot 3)
kernel /Trk3/kernel.trk ramdisk_size=65536 root=/dev/ram0 vga=788 splash=verbose pci=conf2 trkmenu vollabel=MULTIPASS
initrd /Trk3/initrd.trk

title TRK 3.4 Verbose startup for debugging (no menu)
kernel /Trk3/kernel.trk ramdisk_size=65536 root=/dev/ram0 vga=788 splash=verbose pci=conf1 debugging vollabel=MULTIPASS
initrd /Trk3/initrd.trk

title TRK 3.4 SSH, boot- and guest fileserver, run from RAM
kernel /Trk3/kernel.trk ramdisk_size=65536 root=/dev/ram0 vga=788 splash=verbose pci=conf1 sshd trkinmem smbguest trkbootnet trkmenu vollabel=MULTIPASS
initrd /Trk3/initrd.trk

title TRK 3.4 Run from RAM, run mclone as client
kernel /Trk3/kernel.trk ramdisk_size=65536 root=/dev/ram0 vga=788 splash=verbose pci=conf1 trkinmem mclone vollabel=MULTIPASS
initrd /Trk3/initrd.trk

title TRK 3.4 With proxyserver support enabled
kernel /Trk3/kernel.trk ramdisk_size=65536 root=/dev/ram0 vga=788 splash=verbose pci=conf1 proxy trkmenu vollabel=MULTIPASS
initrd /Trk3/initrd.trk

title TRK 3.4 All devices set to read-only
kernel /Trk3/kernel.trk ramdisk_size=65536 root=/dev/ram0 vga=788 splash=verbose pci=conf1 allro vollabel=MULTIPASS
initrd /Trk3/initrd.trk

title Memory tester: Memtest86+ v1.65
kernel /Trk3/memtest.x86

title .:=| BACK TO MAIN SELECTION MENU  |=:.
configfile /menu.lst

ULTIMATE BOOT CD

for ubcd i just created a folder in the root of my drive named ubcd503, and stuck the iso in there. the menu.lst file must also be in this folder for UBCD to boot.

menu.lst:

splashimage /Boot/soa.xpm 
color green/black magenta/black

default 11
timeout 600


title ULTIMATE BOOT CD
find --set-root /ubcd503/ubcd503.iso
map --mem /ubcd503/ubcd503.iso (hd32)
map --hook
chainloader (hd32)
boot

all these programs are working for me, i tried them on 3 laptops, and they all work, including Konboot.

i hope this helps anyone who, like me, struggled with some of these apps. i should also add that i did this on a 8GB thumb drive with one partition for the multipass, which is hidden, and another partition for data and backups, both are formatted in FAT32.

as a last note, to everyone on this board, and especially the HAK5 staff, keep up the good work, its because i actually learned something that i keep coming back here, and as for the show, well all i can say is its amazing, i saw stuff on there i didnt even dream was possible

cheers

5h4rk

Link to comment
Share on other sites

  • 3 months later...
  • 3 months later...

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...