Hacking and penetration testing with low power devices

Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of devices, costing less than you might spend on a laptop, from distances of a mile or mo...

Descripción completa

Detalles Bibliográficos
Otros Autores: Polstra, Philip, author (author), Ramachandran, Vivek, editor (editor), Rogers, Mark, designer (designer)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Waltham, Massachusetts : Syngress 2015.
Edición:1st ed
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009629752606719
Tabla de Contenidos:
  • Front Cover; Hacking and Penetration Testing with Low Power Devices; Copyright; Dedication; Contents; Foreword; Author Biography; Acknowledgments; Chapter 1: Meet the deck; Introduction; Fear Not; The Deck; Devices Running The Deck; Penetration Testing Tools; Modes of Operation; The Deck as a desktop system; The Deck as a dropbox; The Deck as a hacking drone; Summary; Chapter 2: Meet the beagles; Introduction; Texas Instruments Devices; BeagleBoard-xM; BeagleBone; BeagleBone Black; Summary; Chapter 3: Installing a base operating system; Introduction; Non-Linux Options; Windows CE; QNX
  • FreeBSDStarterWare; Android; Linux Options; Ångström; Arch Linux; Gentoo; Sabayon; Buildroot; Nerves Project with Erlang/OTP; Fedora; Debian; Ubuntu; Desired Attributes for Penetration Testing Linux Distribution; Ubuntu Options; Ubuntu Variants; Kernel Choices; Device trees; Creating a microSD Card; Summary; Chapter 3 Appendix: Digging Deeper into the Setup Script; Chapter 4: Filling the toolbox; Introduction; Adding a Graphical Environment; Adding Tools the Easy Way; Using Repositories; Using Packages; Adding Tools the Hard Way; Native Compilation; Simple Cross compilation
  • Cross compiling Using EclipseUsing existing make files; Creating new projects; Adding remote debugging; Automating Source Builds; Installing Python Tools; Installing Ruby; Starter Set of Tools; Wireless Cracking; Password Cracking; Scanners; Python Tools; Metasploit; Summary; Chapter 5: Powering The Deck; Introduction; Power Requirements; Power Sources; Wall Power; USB Power; Battery Power; Solar Power; Reducing Power Consumption; Penetration Testing With a Single Beagle; Getting on the Wireless; Finding What Is Out There; Looking for Vulnerabilities; Exploiting Vulnerabilities
  • Attacking PasswordsDetecting Other Security Issues; Summary; Chapter 6: Input and output devices; Introduction; Display Options; Traditional Monitors; Directly Attached Devices; Keyboards and Mice; IEEE 802.11 Wireless; IEEE 802.15.4 Wireless; Network Hubs and Switches; BeagleBone Capes; XBee Mini-Cape; XBee Cape; Single-sided XBee cape; Penetration Testing With a Single Remote Drone; Getting on the Wireless; Finding What is Out There; Looking for Vulnerabilities; Exploiting Vulnerabilities; Attacking Passwords and Detecting Other Security Issues; Summary
  • Chapter 7: Building an army of devicesIntroduction; Using IEEE 802.15.4 Networking; Point-to-Multipoint Networking; Mesh Networking; Configuring IEEE 802.15.4 Modems; Series 1 Modem Configuration; Series 2 Modem Configuration; Remote Control the Easy Way; Remote Control via Python; Saving Power; Adding Security; Expanding Your Reach; IEEE 802.15.4 Routers; IEEE 802.15.4 Gateways; Penetration Testing With Multiple Drones; Meet Phil''s Fun and Edutainment; Planning the Attack; Configuring Devices; Executing the Attack; Summary; Chapter 8: Keeping your army secret; Introduction; Hiding Devices
  • Hiding Devices in Natural Objects