Hacking and penetration testing with low power devices / Philip Polstra ; technical editor, Vivek Ramachandran ; designer, Mark Rogers.

Polstra, Philip, author.
Waltham, Massachusetts : Syngress, 2015.
1 online resource (260 p.)
1st ed.

Location Notes Your Loan Policy


Penetration testing (Computer security) -- Equipment and supplies.
BeagleBone (Computer).
Electronic books.
System Details:
text file
Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of devices, costing less than you might spend on a laptop, from distances of a mile or more. Hacking and Penetration Testing with Low Power Devices shows how to use devices running a version of The Deck, a full-featured penetration testing and forensics Linux distribution, and can run for days or weeks on batteries due to their low power consumption. Author Philip Polstra shows how to
Front Cover; Hacking and Penetration Testing with Low Power Devices; Copyright; Dedication; Contents; Foreword; Author Biography; Acknowledgments; Chapter 1: Meet the deck; Introduction; Fear Not; The Deck; Devices Running The Deck; Penetration Testing Tools; Modes of Operation; The Deck as a desktop system; The Deck as a dropbox; The Deck as a hacking drone; Summary; Chapter 2: Meet the beagles; Introduction; Texas Instruments Devices; BeagleBoard-xM; BeagleBone; BeagleBone Black; Summary; Chapter 3: Installing a base operating system; Introduction; Non-Linux Options; Windows CE; QNX
FreeBSDStarterWare; Android; Linux Options; Ångström; Arch Linux; Gentoo; Sabayon; Buildroot; Nerves Project with Erlang/OTP; Fedora; Debian; Ubuntu; Desired Attributes for Penetration Testing Linux Distribution; Ubuntu Options; Ubuntu Variants; Kernel Choices; Device trees; Creating a microSD Card; Summary; Chapter 3 Appendix: Digging Deeper into the Setup Script; Chapter 4: Filling the toolbox; Introduction; Adding a Graphical Environment; Adding Tools the Easy Way; Using Repositories; Using Packages; Adding Tools the Hard Way; Native Compilation; Simple Cross compilation
Cross compiling Using EclipseUsing existing make files; Creating new projects; Adding remote debugging; Automating Source Builds; Installing Python Tools; Installing Ruby; Starter Set of Tools; Wireless Cracking; Password Cracking; Scanners; Python Tools; Metasploit; Summary; Chapter 5: Powering The Deck; Introduction; Power Requirements; Power Sources; Wall Power; USB Power; Battery Power; Solar Power; Reducing Power Consumption; Penetration Testing With a Single Beagle; Getting on the Wireless; Finding What Is Out There; Looking for Vulnerabilities; Exploiting Vulnerabilities
Attacking PasswordsDetecting Other Security Issues; Summary; Chapter 6: Input and output devices; Introduction; Display Options; Traditional Monitors; Directly Attached Devices; Keyboards and Mice; IEEE 802.11 Wireless; IEEE 802.15.4 Wireless; Network Hubs and Switches; BeagleBone Capes; XBee Mini-Cape; XBee Cape; Single-sided XBee cape; Penetration Testing With a Single Remote Drone; Getting on the Wireless; Finding What is Out There; Looking for Vulnerabilities; Exploiting Vulnerabilities; Attacking Passwords and Detecting Other Security Issues; Summary
Chapter 7: Building an army of devicesIntroduction; Using IEEE 802.15.4 Networking; Point-to-Multipoint Networking; Mesh Networking; Configuring IEEE 802.15.4 Modems; Series 1 Modem Configuration; Series 2 Modem Configuration; Remote Control the Easy Way; Remote Control via Python; Saving Power; Adding Security; Expanding Your Reach; IEEE 802.15.4 Routers; IEEE 802.15.4 Gateways; Penetration Testing With Multiple Drones; Meet Phil''s Fun and Edutainment; Planning the Attack; Configuring Devices; Executing the Attack; Summary; Chapter 8: Keeping your army secret; Introduction; Hiding Devices
Hiding Devices in Natural Objects
Includes index.
Description based on print version record.
Ramachandran, Vivek, editor.
Rogers, Mark, designer.