You are previewing Hacking and Penetration Testing with Low Power Devices.
O'Reilly logo
Hacking and Penetration Testing with Low Power Devices

Book Description

Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of devices, costing less than you might spend on a laptop, from distances of a mile or more.

Table of Contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. Dedication
  6. Foreword
  7. Author Biography
  8. Acknowledgments
  9. Chapter 1: Meet the deck
    1. Abstract
    2. Introduction
    3. The Deck
    4. Summary
  10. Chapter 2: Meet the beagles
    1. Abstract
    2. Introduction
    3. Texas Instruments Devices
    4. Summary
  11. Chapter 3: Installing a base operating system
    1. Abstract
    2. Introduction
    3. Desired Attributes for Penetration Testing Linux Distribution
    4. Ubuntu Options
    5. Creating a microSD Card
    6. Summary
    7. Chapter 3 Appendix: Digging Deeper into the Setup Script
  12. Chapter 4: Filling the toolbox
    1. Abstract
    2. Introduction
    3. Adding a Graphical Environment
    4. Adding Tools the Easy Way
    5. Adding Tools the Hard Way
    6. Starter Set of Tools
    7. Summary
  13. Chapter 5: Powering The Deck
    1. Abstract
    2. Introduction
    3. Power Requirements
    4. Power Sources
    5. Reducing Power Consumption
    6. Penetration Testing With a Single Beagle
    7. Summary
  14. Chapter 6: Input and output devices
    1. Abstract
    2. Introduction
    3. Display Options
    4. Keyboards and Mice
    5. IEEE 802.11 Wireless
    6. IEEE 802.15.4 Wireless
    7. Network Hubs and Switches
    8. BeagleBone Capes
    9. Penetration Testing With a Single Remote Drone
    10. Summary
  15. Chapter 7: Building an army of devices
    1. Abstract
    2. Introduction
    3. Using IEEE 802.15.4 Networking
    4. Configuring IEEE 802.15.4 Modems
    5. Remote Control the Easy Way
    6. Remote Control via Python
    7. Saving Power
    8. Adding Security
    9. Expanding Your Reach
    10. Penetration Testing With Multiple Drones
    11. Summary
  16. Chapter 8: Keeping your army secret
    1. Abstract
    2. Introduction
    3. Hiding Devices
    4. Installing Devices
    5. Summary
  17. Chapter 9: Adding air support
    1. Abstract
    2. Introduction
    3. Building the AirDeck
    4. Using Your Aerial Drone
    5. Alternative Aircraft
    6. Summary
  18. Chapter 10: Future directions
    1. Abstract
    2. Introduction
    3. Current Happenings with The Deck
    4. Cape Contemplations
    5. Ports of The Deck
    6. Ultralow Power with Microcontrollers
    7. Closing Thoughts
  19. Index