
Hacking and Penetration Testing with Low Power Devices
Description
Key Features
- Understand how to plan and execute an effective penetration test using an army of low-power devices
- Learn how to configure and use open-source tools and easy-to-construct low-power devices
- Leverage IEEE 802.15.4 networking to perform penetration tests from up to a mile away, or use 802.15.4 gateways to perform pen tests from anywhere in the world
- Access penetration testing operating systems with hundreds of tools and scripts on the book's companion web site
Readership
Table of Contents
Chapter 1: Meet the deck
- Abstract
- Introduction
- The Deck
- Summary
Chapter 2: Meet the beagles
- Abstract
- Introduction
- Texas Instruments Devices
- Summary
Chapter 3: Installing a base operating system
- Abstract
- Introduction
- Desired Attributes for Penetration Testing Linux Distribution
- Ubuntu Options
- Creating a microSD Card
- Summary
- Chapter 3 Appendix: Digging Deeper into the Setup Script
Chapter 4: Filling the toolbox
- Abstract
- Introduction
- Adding a Graphical Environment
- Adding Tools the Easy Way
- Adding Tools the Hard Way
- Starter Set of Tools
- Summary
Chapter 5: Powering The Deck
- Abstract
- Introduction
- Power Requirements
- Power Sources
- Reducing Power Consumption
- Penetration Testing With a Single Beagle
- Summary
Chapter 6: Input and output devices
- Abstract
- Introduction
- Display Options
- Keyboards and Mice
- IEEE 802.11 Wireless
- IEEE 802.15.4 Wireless
- Network Hubs and Switches
- BeagleBone Capes
- Penetration Testing With a Single Remote Drone
- Summary
Chapter 7: Building an army of devices
- Abstract
- Introduction
- Using IEEE 802.15.4 Networking
- Configuring IEEE 802.15.4 Modems
- Remote Control the Easy Way
- Remote Control via Python
- Saving Power
- Adding Security
- Expanding Your Reach
- Penetration Testing With Multiple Drones
- Summary
Chapter 8: Keeping your army secret
- Abstract
- Introduction
- Hiding Devices
- Installing Devices
- Summary
Chapter 9: Adding air support
- Abstract
- Introduction
- Building the AirDeck
- Using Your Aerial Drone
- Alternative Aircraft
- Summary
Chapter 10: Future directions
- Abstract
- Introduction
- Current Happenings with The Deck
- Cape Contemplations
- Ports of The Deck
- Ultralow Power with Microcontrollers
- Closing Thoughts
Product details
- No. of pages: 260
- Language: English
- Copyright: © Syngress 2014
- Published: August 29, 2014
- Imprint: Syngress
- Paperback ISBN: 9780128007518
- eBook ISBN: 9780128008249
About the Author
Philip Polstra
Dr. Polstra has developed degree programs in digital forensics and ethical hacking while serving as a professor and Hacker in Residence at a private university in the Midwestern United States. He currently teaches computer science and digital forensics at Bloomsburg University of Pennsylvania. In addition to teaching, he provides training and performs penetration tests on a consulting basis. When not working, he has been known to fly, build aircraft, and tinker with electronics. His latest happenings can be found on his blog: http://polstra.org. You can also follow him at @ppolstra on Twitter.
Affiliations and Expertise
Ratings and Reviews
There are currently no reviews for "Hacking and Penetration Testing with Low Power Devices"