Meet the deck -- Meet the Beagles -- Installing a base operating system -- Filling the toolbox -- Powering the deck -- Input and output devices -- Building an army of devices -- Keeping your army secret -- Adding air support -- Future directions.
Hacking and Penetration Testing with Low Power Devices
โ Scribed by Philip Polstra
- Publisher
- Syngress
- Year
- 2014
- Tongue
- English
- Leaves
- 260
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of devices, costing less than you might spend on a laptop, from distances of a mile or more. Hacking and Penetration Testing with Low Power Devices shows how to use devices running a version of The Deck, a full-featured penetration testing and forensics Linux distribution, and can run for days or weeks on batteries due to their low power consumption. Author Philip Polstra shows how to use various configurations, including a device the size of a deck of cards that can easily be attached to the back of a computer. While each device running The Deck is a full-featured pen-testing platform, connecting systems together via 802.15.3 networking gives you even more power and flexibility. This reference teaches you how to construct and power these devices, install operating systems, and fill out your toolbox of small low-power devices with hundreds of tools and scripts from the bookโs companion website. Hacking and Pen Testing with Low Power Devices puts all these tools into your hands and will help keep you at the top of your game performing cutting-edge pen tests from anywhere in the world! Understand how to plan and execute an effective penetration test using an army of low-power devices Learn how to configure and use open-source tools and easy-to-construct low-power devices Leverage IEEE 802.15.4 networking to perform penetration tests from up to a mile away, or use 802.15.4 gateways to perform pen tests from anywhere in the world Access penetration testing operating systems with hundreds of tools and scripts on the bookโs companion web site
๐ SIMILAR VOLUMES
<p><i>Hacking and Penetration Testing with Low Power Devices</i> shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of devices, costing less than you might spend on a laptop, from distances of a m
<p><P>Power-Aware Testing and Test Strategies for Low-Power Devices </P><P>Edited by: </P><P>Patrick Girard, Research Director, CNRS / LIRMM, France </P><P>Nicola Nicolici, Associate Professor, McMaster University, Canada </P><P>Xiaoqing Wen, Professor, Kyushu Institute of Technology, Japan </P><P>M
<p><P>Power-Aware Testing and Test Strategies for Low-Power Devices </P><P>Edited by: </P><P>Patrick Girard, Research Director, CNRS / LIRMM, France </P><P>Nicola Nicolici, Associate Professor, McMaster University, Canada </P><P>Xiaoqing Wen, Professor, Kyushu Institute of Technology, Japan </P><P>M
Do You Want To Learn How To Hack? Have you always wanted to hack? Do you want to learn more about hacking? Are you interested in the basics of hacking and successful at it? . This easy guide will help transform and increase your hacking skill set. You'll be excited to see your skills improve drastic
<h1><b>Do You Want To Learn How To Hack?</b></h1> <br /><h2>โโ โ Read this book for FREE on Kindle Unlimited ~ Bonus Right After The Conclusion Act Now Before Gone! โโ โ</h2> <br /><b>Have you always wanted to hack? Do you want to learn more about hacking? Are you interested in the basics of hacking