{"id":110,"date":"2007-08-26T23:01:15","date_gmt":"2007-08-26T21:01:15","guid":{"rendered":"http:\/\/www.corelan.be:8800\/?p=102"},"modified":"2007-08-26T23:01:15","modified_gmt":"2007-08-26T21:01:15","slug":"creating-and-installing-lzm-modules-in-backtrack-2","status":"publish","type":"post","link":"https:\/\/www.corelan.be\/index.php\/2007\/08\/26\/creating-and-installing-lzm-modules-in-backtrack-2\/","title":{"rendered":"Creating and installing lzm modules in Backtrack 2"},"content":{"rendered":"<div class=\"ExternalClass54E5EAC0BEF8402E818B55814A55EB1C\">\n<p>Today, I will explain how you can create your own lzm modules &amp; patch the backtrack 2 final ISO file (by adding your new module).<\/p>\n<p>First of all, get a fresh copy of the bt2final.iso file from http:\/\/www.remote-exploit.org\/backtrack_download.html<\/p>\n<p>Write the ISO file to a CD and boot from the CD. This will load the bt2final version. By default, if you make changes to the live cd, the changes will be lost after rebooting the CD. You can of course install Backtrack to harddisk or a USB stick and install your patches afterwards, but you would still create some scripts to make sure changes to the filesystem are stored and used next time.<\/p>\n<p>So ideally, you would want to include your custom scripts, new tools, updated tools or drivers into the ISO file, so you can use it to either boot from CD (including your own scripts) or install it to harddisk\/usb and use your own tools as well.<\/p>\n<p>These tools can be loaded at boot time by converting them into a module and adding the module into the boot process by adding the module into the ISO file.<\/p>\n<p>This is how it works.<\/p>\n<p>First of all, I'll show you how you can create your own module (lzm file). Basically, there are 2 ways to create a lzm file : either from a directory, or from a source tarball.<\/p>\n<p><span style=\"text-decoration: underline;\"><strong>Create a lzm file from a directory<\/strong><\/span><\/p>\n<p>Suppose you have a script myscript.sh that needs to be place in \/usr\/bin. First of all, boot up backtrack<br \/>\nNext, create the following folder structure (reflecting the file paths that will be used by your script and script lzm file) :<\/p>\n<div>\n<table style=\"background: #d2eaf1; border-collapse: collapse;\" border=\"0\">\n<colgroup span=\"1\">\n<col style=\"width: 638px;\" span=\"1\"><\/col>\n<\/colgroup>\n<tbody>\n<tr>\n<td style=\"padding-right: 7px; padding-left: 7px; border: #78c0d4 1pt solid;\"><span style=\"font-size: 9pt; font-family: Courier New;\"><strong>bt ~ # cd \/tmp<br \/>\nbt tmp # mkdir MODULE<br \/>\nbt tmp # mkdir -p MODULE\/usr\/bin<\/strong><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p>Next, copy the file(s) into the folder structure. Put the file(s) in the right place within that structure<\/p>\n<div>\n<table style=\"background: #d2eaf1; border-collapse: collapse;\" border=\"0\">\n<colgroup span=\"1\">\n<col style=\"width: 638px;\" span=\"1\"><\/col>\n<\/colgroup>\n<tbody>\n<tr>\n<td style=\"padding-right: 7px; padding-left: 7px; border: #78c0d4 1pt solid;\"><span style=\"font-size: 9pt; font-family: Courier New;\"><strong>bt tmp # cp myscript.sh MODULE\/usr\/bin<\/strong><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p>Create a lzm file from the folder structure<\/p>\n<div>\n<table style=\"background: #d2eaf1; border-collapse: collapse;\" border=\"0\">\n<colgroup span=\"1\">\n<col style=\"width: 638px;\" span=\"1\"><\/col>\n<\/colgroup>\n<tbody>\n<tr>\n<td style=\"padding-right: 7px; padding-left: 7px; border: #78c0d4 1pt solid;\"><span style=\"font-size: 9pt; font-family: Courier New;\"><strong>bt tmp # dir2lzm MODULE\/ module.lzm<br \/>\n[======================================================================] 1\/1 100%<br \/>\nbt tmp #<br \/>\nbt tmp # ls -l module.lzm<br \/>\n-r-------- 1 root root 4096 Feb 27 11:30 module.lzm<\/strong><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p><span style=\"text-decoration: underline;\"><strong>Create a lzm file from a source tarball <\/strong><\/span><\/p>\n<p>If your tool or script needs to be installed\/compiled, then there's another way to create a lzm file :<\/p>\n<p>Boot from the Backtrack CD and put the source tarball on your system. Let's assume you want to convert \"authforce-0.9.8.tar.gz\" into a lzm module, but the tool needs to be compiled first<\/p>\n<p>First, extract the files and run the .\/configure and make tool<\/p>\n<div>\n<table style=\"background: #d2eaf1; border-collapse: collapse;\" border=\"0\">\n<colgroup span=\"1\">\n<col style=\"width: 638px;\" span=\"1\"><\/col>\n<\/colgroup>\n<tbody>\n<tr>\n<td style=\"padding-right: 7px; padding-left: 7px; border: #78c0d4 1pt solid;\"><span style=\"font-size: 9pt; font-family: Courier New;\"><strong>bt ~ # tar zxpf authforce-0.9.8.tar.gz<br \/>\nbt ~ # cd authforce-0.9.8<br \/>\nbt authforce-0.9.8 # .\/configure<br \/>\nbt authforce-0.9.8 # make<\/strong><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p>Next, run \"checkinstall\". This will automatically launch \"make install\", so you don't have to do it yourself<\/p>\n<div>\n<table style=\"background: #d2eaf1; border-collapse: collapse;\" border=\"0\">\n<colgroup span=\"1\">\n<col style=\"width: 638px;\" span=\"1\"><\/col>\n<\/colgroup>\n<tbody>\n<tr>\n<td style=\"padding-right: 7px; padding-left: 7px; border: #78c0d4 1pt solid;\"><span style=\"font-size: 9pt; font-family: Courier New;\"><strong>bt authforce-0.9.8 # checkinstall<br \/>\n...<br \/>\nCreating package authforce-0.9.8-i386-1...OK<br \/>\n...<\/strong><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p>A tgz file is being generated as result from the checkinstall script.<\/p>\n<p>Finally, convert the tgz package into a lzm file :<\/p>\n<div>\n<table style=\"background: #d2eaf1; border-collapse: collapse;\" border=\"0\">\n<colgroup span=\"1\">\n<col style=\"width: 638px;\" span=\"1\"><\/col>\n<\/colgroup>\n<tbody>\n<tr>\n<td style=\"padding-right: 7px; padding-left: 7px; border: #78c0d4 1pt solid;\"><span style=\"font-size: 9pt; font-family: Courier New;\"><strong>bt authforce-0.9.8 # tgz2lzm authforce-0.9.8-i386-1.tgz authforce-0-9-8.lzm<br \/>\nInstalling package authforce-0.9.8-i386-1...<br \/>\nPACKAGE DESCRIPTION:<br \/>\nauthforce: Package created with checkinstall 1.5.3<br \/>\nExecuting install script for authforce-0.9.8-i386-1...<\/p>\n<p>[=========================================] 19\/19 100%<\/strong><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p>You are now left with a file called authforce-0.9.8.lzm<\/p>\n<p>\u00a0<\/p>\n<p><span style=\"text-decoration: underline;\"><strong>Patch the ISO file<\/strong><\/span><\/p>\n<p>After creating your lzm files, you need to put those files on CD. In order to do so, you need to edit the ISO file. Either mount the original ISO file from backtrack or edit the ISO file using a tool such as Magic ISO<\/p>\n<p>The new lzm files need to be placed in the \/BT\/modules folder. If you use MagicISO, this is as easy as dragging &amp; dropping the files in that folder. Save the ISO file, burn to CD, and you're done.<\/p>\n<p>If you want to do it from within Backtrack, use the following procedure :<\/p>\n<p>Create a temp folder and mount the ISO file (stored as \/tmp\/bt2final.iso)<\/p>\n<div>\n<table style=\"background: #d2eaf1; border-collapse: collapse;\" border=\"0\">\n<colgroup span=\"1\">\n<col style=\"width: 638px;\" span=\"1\"><\/col>\n<\/colgroup>\n<tbody>\n<tr>\n<td style=\"padding-right: 7px; padding-left: 7px; border: #78c0d4 1pt solid;\"><span style=\"font-size: 9pt; font-family: Courier New;\"><strong>bt tmp # mkdir \/tmp\/INSTALL<br \/>\nbt tmp # mkdir \/mnt\/iso<br \/>\nbt tmp # mount -o loop -t iso9660 \/tmp\/bt2final.iso \/mnt\/iso<br \/>\nbt tmp # cp -rf \/mnt\/iso\/* \/tmp\/INSTALL\/<\/strong><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p>Copy the new module into the BT\/modules folder :<\/p>\n<div>\n<table style=\"background: #d2eaf1; border-collapse: collapse;\" border=\"0\">\n<colgroup span=\"1\">\n<col style=\"width: 638px;\" span=\"1\"><\/col>\n<\/colgroup>\n<tbody>\n<tr>\n<td style=\"padding-right: 7px; padding-left: 7px; border: #78c0d4 1pt solid;\"><span style=\"font-size: 9pt; font-family: Courier New;\"><strong>bt tmp # cp \/tmp\/module.lzm \/tmp\/INSTALL\/BT\/modules<\/strong><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p>\u00a0<\/p>\n<p>Recreate the ISO file :<\/p>\n<div>\n<table style=\"background: #d2eaf1; border-collapse: collapse;\" border=\"0\">\n<colgroup span=\"1\">\n<col style=\"width: 638px;\" span=\"1\"><\/col>\n<\/colgroup>\n<tbody>\n<tr>\n<td style=\"padding-right: 7px; padding-left: 7px; border: #78c0d4 1pt solid;\"><span style=\"font-size: 9pt; font-family: Courier New;\"><strong>bt tmp # cd INSTALL\/BT\/<br \/>\nbt BT # .\/make_iso.sh<br \/>\nTarget ISO file name [ Hit enter for ..\/..\/BT.iso ]: \/tmp\/bt2final-mod.iso<br \/>\nmkisofs 2.01 (i686-pc-linux-gnu) <\/strong><\/span><\/p>\n<p><span style=\"font-size: 9pt; font-family: Courier New;\"><strong>Scanning ..\/.<br \/>\nScanning ..\/.\/BT<br \/>\nScanning ..\/.\/BT\/base<br \/>\nScanning ..\/.\/BT\/configs<br \/>\nScanning ..\/.\/BT\/modules<br \/>\nScanning ..\/.\/BT\/optional<br \/>\n...<br \/>\nDone with: Directory tree cleanup Block(s) 0<br \/>\nWriting: Extension record Start Block 65<br \/>\nDone with: Extension record Block(s) 1<br \/>\nWriting: The File(s) Start Block 66<br \/>\n1.41% done, estimate finish Fri Mar 9 02:22:37 2007<br \/>\n2.81% done, estimate finish Fri Mar 9 02:22:37 2007<br \/>\n4.21% done, estimate finish Fri Mar 9 02:22:13 2007<br \/>\n5.61% done, estimate finish Fri Mar 9 02:22:19 2007<br \/>\n...<br \/>\nTotal translation table size: 2048<br \/>\nTotal rockridge attributes bytes: 8261<br \/>\nTotal directory bytes: 34816<br \/>\nPath table size(bytes): 244<br \/>\nDone with: The File(s) Block(s) 356309<br \/>\nWriting: Ending Padblock Start Block 356375<br \/>\nDone with: Ending Padblock Block(s) 150<br \/>\nMax brk space used 0<br \/>\n356525 extents written (696 MB)<\/strong><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p>\u00a0<\/p>\n<p>Now write the new ISO file and you're ready to rock 'n roll again<\/p>\n<p>\u00a0<\/p>\n<p>Links : http:\/\/<span style=\"font-size: 10pt; color: black; font-family: Arial;\">backtrack.offensive-security.com<\/span><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Today, I will explain how you can create your own lzm modules &amp; patch the backtrack 2 final ISO file (by adding your new module). First of all, get a fresh copy of the bt2final.iso file from http:\/\/www.remote-exploit.org\/backtrack_download.html Write the ISO file to a CD and boot from the CD. This will load the bt2final &hellip; <a href=\"https:\/\/www.corelan.be\/index.php\/2007\/08\/26\/creating-and-installing-lzm-modules-in-backtrack-2\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> \"Creating and installing lzm modules in Backtrack 2\"<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[64,127],"tags":[204,131],"class_list":["post-110","post","type-post","status-publish","format-standard","hentry","category-linux","category-security","tag-backtrack","tag-linux"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Creating and installing lzm modules in Backtrack 2 - Corelan | Exploit Development &amp; Vulnerability Research<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.corelan.be\/index.php\/2007\/08\/26\/creating-and-installing-lzm-modules-in-backtrack-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Creating and installing lzm modules in Backtrack 2 - Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"og:description\" content=\"Today, I will explain how you can create your own lzm modules &amp; patch the backtrack 2 final ISO file (by adding your new module). First of all, get a fresh copy of the bt2final.iso file from http:\/\/www.remote-exploit.org\/backtrack_download.html Write the ISO file to a CD and boot from the CD. This will load the bt2final &hellip; Continue reading &quot;Creating and installing lzm modules in Backtrack 2&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.corelan.be\/index.php\/2007\/08\/26\/creating-and-installing-lzm-modules-in-backtrack-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corelanconsulting\" \/>\n<meta property=\"article:published_time\" content=\"2007-08-26T21:01:15+00:00\" \/>\n<meta name=\"author\" content=\"corelanc0d3r\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@corelanc0d3r\" \/>\n<meta name=\"twitter:site\" content=\"@corelanc0d3r\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2007\\\/08\\\/26\\\/creating-and-installing-lzm-modules-in-backtrack-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2007\\\/08\\\/26\\\/creating-and-installing-lzm-modules-in-backtrack-2\\\/\"},\"author\":{\"name\":\"corelanc0d3r\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\"},\"headline\":\"Creating and installing lzm modules in Backtrack 2\",\"datePublished\":\"2007-08-26T21:01:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2007\\\/08\\\/26\\\/creating-and-installing-lzm-modules-in-backtrack-2\\\/\"},\"wordCount\":852,\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"keywords\":[\"backtrack\",\"Linux and Unix\"],\"articleSection\":[\"Linux and Unix\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2007\\\/08\\\/26\\\/creating-and-installing-lzm-modules-in-backtrack-2\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2007\\\/08\\\/26\\\/creating-and-installing-lzm-modules-in-backtrack-2\\\/\",\"name\":\"Creating and installing lzm modules in Backtrack 2 - Corelan | Exploit Development &amp; Vulnerability Research\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\"},\"datePublished\":\"2007-08-26T21:01:15+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2007\\\/08\\\/26\\\/creating-and-installing-lzm-modules-in-backtrack-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2007\\\/08\\\/26\\\/creating-and-installing-lzm-modules-in-backtrack-2\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2007\\\/08\\\/26\\\/creating-and-installing-lzm-modules-in-backtrack-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.corelan.be\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Creating and installing lzm modules in Backtrack 2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"name\":\"Corelan CyberSecurity Research\",\"description\":\"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.corelan.be\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\",\"name\":\"Corelan CyberSecurity Research\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"contentUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"width\":200,\"height\":200,\"caption\":\"Corelan CyberSecurity Research\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corelanconsulting\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\",\"https:\\\/\\\/x.com\\\/corelanconsulting\",\"https:\\\/\\\/instagram.com\\\/corelanconsult\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\",\"name\":\"corelanc0d3r\",\"pronouns\":\"he\\\/him\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"caption\":\"corelanc0d3r\"},\"description\":\"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.\",\"sameAs\":[\"https:\\\/\\\/www.corelan-training.com\",\"https:\\\/\\\/instagram.com\\\/corelanc0d3r\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/petervaneeckhoutte\\\/\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\"],\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/author\\\/admin0\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Creating and installing lzm modules in Backtrack 2 - Corelan | Exploit Development &amp; Vulnerability Research","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.corelan.be\/index.php\/2007\/08\/26\/creating-and-installing-lzm-modules-in-backtrack-2\/","og_locale":"en_US","og_type":"article","og_title":"Creating and installing lzm modules in Backtrack 2 - Corelan | Exploit Development &amp; Vulnerability Research","og_description":"Today, I will explain how you can create your own lzm modules &amp; patch the backtrack 2 final ISO file (by adding your new module). First of all, get a fresh copy of the bt2final.iso file from http:\/\/www.remote-exploit.org\/backtrack_download.html Write the ISO file to a CD and boot from the CD. This will load the bt2final &hellip; Continue reading \"Creating and installing lzm modules in Backtrack 2\"","og_url":"https:\/\/www.corelan.be\/index.php\/2007\/08\/26\/creating-and-installing-lzm-modules-in-backtrack-2\/","og_site_name":"Corelan | Exploit Development &amp; Vulnerability Research","article_publisher":"https:\/\/www.facebook.com\/corelanconsulting","article_published_time":"2007-08-26T21:01:15+00:00","author":"corelanc0d3r","twitter_card":"summary_large_image","twitter_creator":"@corelanc0d3r","twitter_site":"@corelanc0d3r","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/www.corelan.be\/index.php\/2007\/08\/26\/creating-and-installing-lzm-modules-in-backtrack-2\/#article","isPartOf":{"@id":"https:\/\/www.corelan.be\/index.php\/2007\/08\/26\/creating-and-installing-lzm-modules-in-backtrack-2\/"},"author":{"name":"corelanc0d3r","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f"},"headline":"Creating and installing lzm modules in Backtrack 2","datePublished":"2007-08-26T21:01:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.corelan.be\/index.php\/2007\/08\/26\/creating-and-installing-lzm-modules-in-backtrack-2\/"},"wordCount":852,"publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"keywords":["backtrack","Linux and Unix"],"articleSection":["Linux and Unix","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.corelan.be\/index.php\/2007\/08\/26\/creating-and-installing-lzm-modules-in-backtrack-2\/","url":"https:\/\/www.corelan.be\/index.php\/2007\/08\/26\/creating-and-installing-lzm-modules-in-backtrack-2\/","name":"Creating and installing lzm modules in Backtrack 2 - Corelan | Exploit Development &amp; Vulnerability Research","isPartOf":{"@id":"https:\/\/www.corelan.be\/#website"},"datePublished":"2007-08-26T21:01:15+00:00","breadcrumb":{"@id":"https:\/\/www.corelan.be\/index.php\/2007\/08\/26\/creating-and-installing-lzm-modules-in-backtrack-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.corelan.be\/index.php\/2007\/08\/26\/creating-and-installing-lzm-modules-in-backtrack-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.corelan.be\/index.php\/2007\/08\/26\/creating-and-installing-lzm-modules-in-backtrack-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.corelan.be\/"},{"@type":"ListItem","position":2,"name":"Creating and installing lzm modules in Backtrack 2"}]},{"@type":"WebSite","@id":"https:\/\/www.corelan.be\/#website","url":"https:\/\/www.corelan.be\/","name":"Corelan CyberSecurity Research","description":"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.","publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.corelan.be\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.corelan.be\/#organization","name":"Corelan CyberSecurity Research","url":"https:\/\/www.corelan.be\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/","url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","contentUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","width":200,"height":200,"caption":"Corelan CyberSecurity Research"},"image":{"@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corelanconsulting","https:\/\/x.com\/corelanc0d3r","https:\/\/x.com\/corelanconsulting","https:\/\/instagram.com\/corelanconsult"]},{"@type":"Person","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f","name":"corelanc0d3r","pronouns":"he\/him","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","url":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","caption":"corelanc0d3r"},"description":"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.","sameAs":["https:\/\/www.corelan-training.com","https:\/\/instagram.com\/corelanc0d3r","https:\/\/www.linkedin.com\/in\/petervaneeckhoutte\/","https:\/\/x.com\/corelanc0d3r"],"url":"https:\/\/www.corelan.be\/index.php\/author\/admin0\/"}]}},"views":6908,"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/110","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/comments?post=110"}],"version-history":[{"count":0,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/110\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/media?parent=110"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/categories?post=110"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/tags?post=110"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}