Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of devices, costing less than you might spend on a laptop, from distances of a mile or more. Hacking and Penetration Testing with Low Power Devices shows how to use devices running a version of The Deck, a full-featured penetration testing and forensics Linux distribution, and can run for days or weeks on batteries due to their low power consumption. Author Philip Polstra shows how to use various configurations, including a device the size of a deck of cards that can easily be attached to the back of a computer. While each device running The Deck is a full-featured pen-testing platform, connecting systems together via 802.15.3 networking gives you even more power and flexibility. This reference teaches you how to construct and power these devices, install operating systems, and fill out your toolbox of small low-power devices with hundreds of tools and scripts from the book's companion website.Hacking and Pen Testing with Low Power Devices puts all these tools into your hands and will help keep you at the top of your game performing cutting-edge pen tests from anywhere in the world! * Understand how to plan and execute an effective penetration test using an army of low-power devices* Learn how to configure and use open-source tools and easy-to-construct low-power devices* Leverage IEEE 802.15.4 networking to perform penetration tests from up to a mile away, or use 802.15.4 gateways to perform pen tests from anywhere in the world* Access penetration testing operating systems with hundreds of tools and scripts on the book's companion web site
Foreword xi
Author Biography xiii
Acknowledgments xv
Chapter 1 Meet the Deck 1 (12)
Introduction 1 (1)
Fear Not 1 (1)
The Deck 2 (9)
Devices Running The Deck 2 (1)
Penetration Testing Tools 3 (4)
Modes of Operation 7 (4)
Summary 11 (2)
Chapter 2 Meet the Beagles 13 (14)
Introduction 13 (1)
Texas Instruments Devices 14 (12)
BeagleBoard-xM 14 (4)
BeagleBone 18 (3)
BeagleBone Black 21 (5)
Summary 26 (1)
Chapter 3 Installing a Base Operating System 27 (28)
Introduction 27 (15)
Non-Linux Options 27 (4)
Linux Options 31 (11)
Desired Attributes for Penetration 42 (1)
Testing Linux Distribution
Ubuntu Options 43 (2)
Ubuntu Variants 44 (1)
Kernel Choices 44 (1)
Creating a microSD Card 45 (1)
Summary 46 (9)
Chapter 3 Appendix: Digging Deeper into 46 (9)
the Setup Script
Chapter 4 Filling the Toolbox 55 (38)
Introduction 55 (1)
Adding a Graphical Environment 55 (7)
Adding Tools the Easy Way 62 (7)
Using Repositories 62 (3)
Using Packages 65 (4)
Adding Tools the Hard Way 69 (17)
Native Compilation 70 (1)
Simple Cross compilation 70 (1)
Cross compiling Using Eclipse 71 (8)
Automating Source Builds 79 (6)
Installing Python Tools 85 (1)
Installing Ruby 86 (1)
Starter Set of Tools 86 (6)
Wireless Cracking 86 (2)
Password Cracking 88 (1)
Scanners 89 (1)
Python Tools 90 (1)
Metasploit 90 (2)
Summary 92 (1)
Chapter 5 Powering The Deck 93 (30)
Introduction 93 (1)
Power Requirements 94 (2)
Power Sources 96 (7)
Wall Power 97 (1)
USB Power 97 (1)
Battery Power 98 (4)
Solar Power 102 (1)
Reducing Power Consumption 103 (2)
Penetration Testing With a Single Beagle 105 (16)
Getting on the Wireless 106 (3)
Finding What Is Out There 109 (3)
Looking for Vulnerabilities 112 (2)
Exploiting Vulnerabilities 114 (3)
Attacking Passwords 117 (3)
Detecting Other Security Issues 120 (1)
Summary 121 (2)
Chapter 6 Input and Output Devices 123 (32)
Introduction 123 (1)
Display Options 123 (3)
Traditional Monitors 123 (1)
Directly Attached Devices 124 (2)
Keyboards and Mice 126 (1)
IEEE 802.11 Wireless 126 (2)
IEEE 802.15.4 Wireless 128 (1)
Network Hubs and Switches 129 (1)
BeagleBone Capes 129 (12)
XBee Mini-cape 131 (4)
XBee Cape 135 (6)
Penetration Testing With a Single Remote 141 (12)
Drone
Getting on the Wireless 142 (6)
Finding What is Out There 148 (2)
Looking for Vulnerabilities 150 (3)
Exploiting Vulnerabilities 153 (1)
Attacking Passwords and Detecting Other 153 (1)
Security Issues
Summary 153 (2)
Chapter 7 Building an Army of Devices 155 (50)
Introduction 155 (1)
Using IEEE 802.15.4 Networking 156 (3)
Point-to-Multipoint Networking 156 (2)
Mesh Networking 158 (1)
Configuring IEEE 802.15.4 Modems 159 (7)
Series 1 Modem Configuration 161 (2)
Series 2 Modem Configuration 163 (3)
Remote Control the Easy Way 166 (2)
Remote Control via Python 168 (16)
Saving Power 184 (2)
Adding Security 186 (2)
Expanding Your Reach 188 (2)
IEEE 802.15.4 Routers 188 (1)
IEEE 802.15.4 Gateways 189 (1)
Penetration Testing With Multiple Drones 190 (13)
Meet Phil's Fun and Edutainment 190 (1)
Planning the Attack 191 (1)
Configuring Devices 192 (1)
Executing the Attack 193 (10)
Summary 203 (2)
Chapter 8 Keeping Your Army Secret 205 (18)
Introduction 205 (1)
Hiding Devices 206 (10)
Hiding Devices in Natural Objects 206 (1)
Hiding Devices in and Around Structures 207 (7)
Using Toys and Trinkets to Hide Devices 214 (2)
Installing Devices 216 (6)
Initial Hiding 220 (2)
Maintaining Devices 222 (1)
Removing Devices 222 (1)
Summary 222 (1)
Chapter 9 Adding Air Support 223 (12)
Introduction 223 (1)
Building the AirDeck 223 (6)
Selecting a Platform 223 (3)
The Router-only Option 226 (1)
A Fully-functional Drone and Router 227 (2)
Using Your Aerial Drone 229 (4)
Router-only Operation 229 (1)
Using the AirDeck 230 (1)
Conserving Power 230 (3)
Alternative Aircraft 233 (1)
Quadcopter 233 (1)
An Improved Flying Wing 233 (1)
Summary 234 (1)
Chapter 10 Future Directions 235 (4)
Introduction 235 (1)
Current Happenings with The Deck 235 (1)
Cape Contemplations 236 (1)
Ports of The Deck 236 (1)
Ultralow Power with Microcontrollers 237 (1)
Closing Thoughts 237 (2)
Index 239