Discover millions of ebooks, audiobooks, and so much more with a free trial

Only $11.99/month after trial. Cancel anytime.

Hacking and Penetration Testing with Low Power Devices
Hacking and Penetration Testing with Low Power Devices
Hacking and Penetration Testing with Low Power Devices
Ebook474 pages106 hours

Hacking and Penetration Testing with Low Power Devices

Rating: 2 out of 5 stars

2/5

()

Read preview

About this ebook

Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of devices, costing less than you might spend on a laptop, from distances of a mile or more.

Hacking and Penetration Testing with Low Power Devices shows how to use devices running a version of The Deck, a full-featured penetration testing and forensics Linux distribution, and can run for days or weeks on batteries due to their low power consumption. Author Philip Polstra shows how to use various configurations, including a device the size of a deck of cards that can easily be attached to the back of a computer.

While each device running The Deck is a full-featured pen-testing platform, connecting systems together via 802.15.3 networking gives you even more power and flexibility. This reference teaches you how to construct and power these devices, install operating systems, and fill out your toolbox of small low-power devices with hundreds of tools and scripts from the book's companion website. Hacking and Pen Testing with Low Power Devices puts all these tools into your hands and will help keep you at the top of your game performing cutting-edge pen tests from anywhere in the world!

  • Understand how to plan and execute an effective penetration test using an army of low-power devices
  • Learn how to configure and use open-source tools and easy-to-construct low-power devices
  • Leverage IEEE 802.15.4 networking to perform penetration tests from up to a mile away, or use 802.15.4 gateways to perform pen tests from anywhere in the world
  • Access penetration testing operating systems with hundreds of tools and scripts on the book's companion web site
LanguageEnglish
Release dateSep 2, 2014
ISBN9780128008249
Hacking and Penetration Testing with Low Power Devices
Author

Philip Polstra

Dr. Philip Polstra (known to his friends as Dr. Phil) is an internationally recognized hardware hacker. His work has been presented at numerous conferences around the globe including repeat performances at DEFCON, BlackHat, 44CON, GrrCON, MakerFaire, ForenSecure, and other top conferences. Dr. Polstra is a well-known expert on USB forensics and has published several articles on this topic. Dr. Polstra has developed degree programs in digital forensics and ethical hacking while serving as a professor and Hacker in Residence at a private university in the Midwestern United States. He currently teaches computer science and digital forensics at Bloomsburg University of Pennsylvania. In addition to teaching, he provides training and performs penetration tests on a consulting basis. When not working, he has been known to fly, build aircraft, and tinker with electronics. His latest happenings can be found on his blog: http://polstra.org. You can also follow him at @ppolstra on Twitter.

Related to Hacking and Penetration Testing with Low Power Devices

Related ebooks

Enterprise Applications For You

View More

Related articles

Reviews for Hacking and Penetration Testing with Low Power Devices

Rating: 2 out of 5 stars
2/5

1 rating0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    Hacking and Penetration Testing with Low Power Devices - Philip Polstra

    CT_book_preview_excerpt.html[r}Grw\,[J]ɲ]%n5_,u"OGOrfCRvRIh4Oƾ_pan^\/_6U~jc5 O7kMq&sO6׮` >_,:ì[`~Ü1X/y Ui6ÇEWf i2 qv6e/Y;S oYuGA}$) 22UrgjU`:]gW:lSl]DAV]U+_j״COZVuaaLt{¹5-h*l$ \' bTŗ?ei+e[Mj*i7s 36ynIdKTz ǵJ93X\nfܘsjGWΟhk[5|S,+@s MUȑےoYcsn.n vn`U%ur"\)9¾Mn26/N3?ے©%gM:EcͲ -4{ĥũM\UR:WFg1e:E;|Z KB|]leaxM;7ov~K+;ӕ@ύ {K_u5l .6U"6TNF.`-cۍ[ZbR$l1n]۝9vnZa[g07S&sIdejhC޴Ʈ4"W- $&U|}eTtEU!PʣvSYms!y8|}ڮTĕM 蟺/V>wbrlȆ%OEcLWyawNhN#7tY6U;}wq~xL#L>X)Wˆw [z!q5̶`p'!7Ƚb|#Q'^:5+0t5NGp_߽o=9>%@g:n9YVl"H*&Σ~-q5[! OEӕ'6QG\\c 6КBW䘢VmH8hƷ1h 5c@ZUa zr]k1򠢋ia;u$;4`[FGtn;_B Jf`#G#*ͺx 56l[D*oյq0w58DĄEr쮬 Sm 7ckXqC.6΃+QDږEYvM\C[nf ] rEsw ]XqO6`gpO^c݃'pS|SL+IupRU;0GX_bߧi02 HLW^͈+Al 53"]$qJ3>wDbQV?~l\hz7uPtL|4+^u%޲aGnm,w`jv!޾L+$Eqsyj>fTR?8Z3>'1S׷E_w..>FGSar/ͻ 8^4-U($}` KfW<0םLqq-%շ3jZo,KN\ Nv(Zs@L@>`yC=ePVyP:v#"l,>*6=U1($O"c^BR= OvFe'"$j^ܣu]ξIV;,OFNd=*cПvQF>|Y-ۯ淃a<KaG6)9V9x[dLؙw 5*&aE6a%uy `M>rn_>uMIvjp[6|q:-fP 3>*Mxڰ"p]wy+Xy)Ipٜ{aZ2? @1W8m@2T<˔ FsSS*ilSGkW9^i-%1a{腍2 yeҖ{A%ӗWVv4#yiC4b*^jYn|'%IyHuzqь|S/'O|z=xnT>rh6|RYkHԔ+8Q )z'ޚdXzjGʒJ$+ro`hMJ a biy~h+-fD|}cMוtN sdl+*>MٛD } =d<࡫ a_ P\/Rr^P[1L(W:V |X.vMȫm9CTĚ^P"=58|?U"
    Enjoying the preview?
    Page 1 of 1