Hacking and Penetration Testing with Low Power Devices

Hacking and Penetration Testing with Low Power Devices Front Cover
Hacking and Penetration Testing with Low Power Devices
by: Philip Polstra
Pages: 260 pages
Edition 版本:‏ 1
Language 语言: English
Publisher finelybook 出版社:‏ Syngress
Released: 2014-09-16
ISBN-10: 0128007516
ISBN-13: 9780128007518

Book Description


Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small,low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of devices,costing less than you might spend on a laptop,from distances of a mile or more.
Hacking and Penetration Testing with Low Power Devices shows how to use devices running a version of The Deck,a full-featured penetration testing and forensics Linux distribution,and can run for days or weeks on batteries due to their low power consumption. Author Philip Polstra shows how to use various configurations,including a device the size of a deck of cards that can easily be attached to the back of a computer.
While each device running The Deck is a full-featured pen-testing platform,connecting systems together via 802.15.3 networking gives you even more power and flexibility. This reference teaches you how to construct and power these devices,install operating systems,and fill out your toolbox of small low-power devices with hundreds of tools and scripts from the book’s companion website. Hacking and Pen Testing with Low Power Devices puts all these tools into your hands and will help keep you at the top of your game performing cutting-edge pen tests from anywhere in the world!
Understand how to plan and execute an effective penetration test using an army of low-power devices
Learn how to configure and use open-source tools and easy-to-construct low-power devices
Leverage IEEE 802.15.4 networking to perform penetration tests from up to a mile away,or use 802.15.4 gateways to perform pen tests from anywhere in the world
Access penetration testing operating systems with hundreds of tools and scripts on the book’s companion web site
Contents
Chapter 1: Meet the deck
Chapter 2: Meet the beagles
Chapter 3: Installing a base operating system
Chapter 4: Filling the toolbox
Chapter 5: Powering The Deck
Chapter 6: Input and output devices
Chapter 7: Building an army of devices
Chapter 8: Keeping your army secret
Chapter 9: Adding air support
Chapter 10: Future directions

打赏
未经允许不得转载:finelybook » Hacking and Penetration Testing with Low Power Devices

评论 抢沙发

觉得文章有用就打赏一下

您的打赏,我们将继续给力更多优质内容

支付宝扫一扫

微信扫一扫