10.09.2016 Views

Hacking_and_Penetration_Testing_with_Low_Power_Devices

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CHAPTER<br />

Input <strong>and</strong> output devices<br />

6<br />

INFORMATIONINTHISCHAPTER:<br />

• Display options<br />

• Keyboards<br />

• Mice<br />

• IEEE 802.11 wireless<br />

• IEEE 802.15.4 wireless<br />

• Network hubs <strong>and</strong> switches<br />

• BeagleBone capes<br />

• <strong>Penetration</strong> testing <strong>with</strong> a single remote hacking drone<br />

INTRODUCTION<br />

In this chapter, we will discuss several st<strong>and</strong>ard input <strong>and</strong> output devices, which may<br />

prove useful when connected to our Beagles. We will begin <strong>with</strong> a discussion of st<strong>and</strong>ard<br />

items such as displays, keyboards, <strong>and</strong> mice. From there, we will move on to<br />

wireless <strong>and</strong> wired networking devices. BeagleBone expansion boards, known as<br />

capes, will also be discussed. In anticipation of our discussion of using multiple Beagles<br />

for a penetration test in the next chapter, we will finish up by rehashing our test<br />

from the previous chapter using only methods that are appropriate for remote hacking<br />

drones.<br />

DISPLAY OPTIONS<br />

It is difficult to know what a computer is doing <strong>with</strong>out some sort of display. Remote<br />

drones <strong>and</strong> dropboxes don’t require displays. Unless you are remotely logging in to<br />

your Beagle via SSH or something similar, you will likely want a display if you<br />

require any interactivity.<br />

TRADITIONAL MONITORS<br />

The BeagleBoard-xM <strong>and</strong> BeagleBone Black both feature connectors for digital computer<br />

monitors or televisions. The BeagleBoard-xM sports a full-size HDMI connector.<br />

This board supports the Digital Video Interface-Digital only (DVI-D) protocol.<br />

<strong>Hacking</strong> <strong>and</strong> <strong>Penetration</strong> <strong>Testing</strong> <strong>with</strong> <strong>Low</strong> <strong>Power</strong> <strong>Devices</strong><br />

© 2015 Elsevier Inc. All rights reserved.<br />

123

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!