Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    almafu_9960073697002883
    Format: 1 online resource (260 p.)
    Edition: 1st ed.
    ISBN: 9780128008249 , 0128008245
    Content: Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of devices, costing less than you might spend on a laptop, from distances of a mile or more. Hacking and Penetration Testing with Low Power Devices shows how to use devices running a version of The Deck, a full-featured penetration testing and forensics Linux distribution, and can run for days or weeks on batteries due to their low power consumption. Author Philip Polstra shows how to
    Note: Includes index. , Front Cover; Hacking and Penetration Testing with Low Power Devices; Copyright; Dedication; Contents; Foreword; Author Biography; Acknowledgments; Chapter 1: Meet the deck; Introduction; Fear Not; The Deck; Devices Running The Deck; Penetration Testing Tools; Modes of Operation; The Deck as a desktop system; The Deck as a dropbox; The Deck as a hacking drone; Summary; Chapter 2: Meet the beagles; Introduction; Texas Instruments Devices; BeagleBoard-xM; BeagleBone; BeagleBone Black; Summary; Chapter 3: Installing a base operating system; Introduction; Non-Linux Options; Windows CE; QNX , FreeBSDStarterWare; Android; Linux Options; Ångström; Arch Linux; Gentoo; Sabayon; Buildroot; Nerves Project with Erlang/OTP; Fedora; Debian; Ubuntu; Desired Attributes for Penetration Testing Linux Distribution; Ubuntu Options; Ubuntu Variants; Kernel Choices; Device trees; Creating a microSD Card; Summary; Chapter 3 Appendix: Digging Deeper into the Setup Script; Chapter 4: Filling the toolbox; Introduction; Adding a Graphical Environment; Adding Tools the Easy Way; Using Repositories; Using Packages; Adding Tools the Hard Way; Native Compilation; Simple Cross compilation , Cross compiling Using EclipseUsing existing make files; Creating new projects; Adding remote debugging; Automating Source Builds; Installing Python Tools; Installing Ruby; Starter Set of Tools; Wireless Cracking; Password Cracking; Scanners; Python Tools; Metasploit; Summary; Chapter 5: Powering The Deck; Introduction; Power Requirements; Power Sources; Wall Power; USB Power; Battery Power; Solar Power; Reducing Power Consumption; Penetration Testing With a Single Beagle; Getting on the Wireless; Finding What Is Out There; Looking for Vulnerabilities; Exploiting Vulnerabilities , Attacking PasswordsDetecting Other Security Issues; Summary; Chapter 6: Input and output devices; Introduction; Display Options; Traditional Monitors; Directly Attached Devices; Keyboards and Mice; IEEE 802.11 Wireless; IEEE 802.15.4 Wireless; Network Hubs and Switches; BeagleBone Capes; XBee Mini-Cape; XBee Cape; Single-sided XBee cape; Penetration Testing With a Single Remote Drone; Getting on the Wireless; Finding What is Out There; Looking for Vulnerabilities; Exploiting Vulnerabilities; Attacking Passwords and Detecting Other Security Issues; Summary , Chapter 7: Building an army of devicesIntroduction; Using IEEE 802.15.4 Networking; Point-to-Multipoint Networking; Mesh Networking; Configuring IEEE 802.15.4 Modems; Series 1 Modem Configuration; Series 2 Modem Configuration; Remote Control the Easy Way; Remote Control via Python; Saving Power; Adding Security; Expanding Your Reach; IEEE 802.15.4 Routers; IEEE 802.15.4 Gateways; Penetration Testing With Multiple Drones; Meet Phil''s Fun and Edutainment; Planning the Attack; Configuring Devices; Executing the Attack; Summary; Chapter 8: Keeping your army secret; Introduction; Hiding Devices , Hiding Devices in Natural Objects , English
    Additional Edition: ISBN 9781322097633
    Additional Edition: ISBN 1322097631
    Additional Edition: ISBN 9780128007518
    Additional Edition: ISBN 0128007516
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages