Hacking and Penetration Testing with Low Power Devices

Hacking and Penetration Testing with Low Power Devices
Author :
Publisher : Syngress
Total Pages : 260
Release :
ISBN-10 : 9780128008249
ISBN-13 : 0128008245
Rating : 4/5 (245 Downloads)

Book Synopsis Hacking and Penetration Testing with Low Power Devices by : Philip Polstra

Download or read book Hacking and Penetration Testing with Low Power Devices written by Philip Polstra and published by Syngress. This book was released on 2014-09-02 with total page 260 pages. Available in PDF, EPUB and Kindle. Book excerpt: Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of devices, costing less than you might spend on a laptop, from distances of a mile or more. Hacking and Penetration Testing with Low Power Devices shows how to use devices running a version of The Deck, a full-featured penetration testing and forensics Linux distribution, and can run for days or weeks on batteries due to their low power consumption. Author Philip Polstra shows how to use various configurations, including a device the size of a deck of cards that can easily be attached to the back of a computer. While each device running The Deck is a full-featured pen-testing platform, connecting systems together via 802.15.3 networking gives you even more power and flexibility. This reference teaches you how to construct and power these devices, install operating systems, and fill out your toolbox of small low-power devices with hundreds of tools and scripts from the book's companion website. Hacking and Pen Testing with Low Power Devices puts all these tools into your hands and will help keep you at the top of your game performing cutting-edge pen tests from anywhere in the world! - Understand how to plan and execute an effective penetration test using an army of low-power devices - Learn how to configure and use open-source tools and easy-to-construct low-power devices - Leverage IEEE 802.15.4 networking to perform penetration tests from up to a mile away, or use 802.15.4 gateways to perform pen tests from anywhere in the world - Access penetration testing operating systems with hundreds of tools and scripts on the book's companion web site


Hacking and Penetration Testing with Low Power Devices Related Books

Hacking and Penetration Testing with Low Power Devices
Language: en
Pages: 260
Authors: Philip Polstra
Categories: Computers
Type: BOOK - Published: 2014-09-02 - Publisher: Syngress

DOWNLOAD EBOOK

Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small, low-powered devices that are easily hidden and ma
Getting Started with Electronic Projects
Language: en
Pages: 176
Authors: Bill Pretty
Categories: Computers
Type: BOOK - Published: 2015-01-13 - Publisher: Packt Publishing Ltd

DOWNLOAD EBOOK

This book is aimed at hobbyists with basic knowledge of electronics circuits. Whether you are a novice electronics project builder, a ham radio enthusiast, or a
BeagleBone for Secret Agents
Language: en
Pages: 254
Authors: Josh Datko
Categories: Computers
Type: BOOK - Published: 2014-09-23 - Publisher: Packt Publishing Ltd

DOWNLOAD EBOOK

If you have some experience with the BeagleBone or similar embedded systems and want to learn more about security and privacy, this book is for you. Alternative
Counterterrorism and Cybersecurity
Language: en
Pages: 488
Authors: Newton Lee
Categories: Computers
Type: BOOK - Published: 2015-04-07 - Publisher: Springer

DOWNLOAD EBOOK

From 9/11 to Charlie Hebdo along with Sony-pocalypse and DARPA's $2 million Cyber Grand Challenge, this book examines counterterrorism and cyber security histor
The Basics of Hacking and Penetration Testing
Language: en
Pages: 223
Authors: Patrick Engebretson
Categories: Computers
Type: BOOK - Published: 2013-06-24 - Publisher: Elsevier

DOWNLOAD EBOOK

The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethi