10.09.2016 Views

Hacking_and_Penetration_Testing_with_Low_Power_Devices

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

188 CHAPTER 7 Building an army of devices<br />

FIGURE 7.12<br />

Enabling encryption on a Series 2 router.<br />

additional parameter NK (network encryption key) that can be set. When set to the<br />

default value of zero, a r<strong>and</strong>om network encryption key is used. Alternatively, a key<br />

can be selected <strong>and</strong> entered. Leaving NK at the default value is recommended. Setup<br />

of a coordinator in X-CTU is shown in Figure 7.13.<br />

EXPANDING YOUR REACH<br />

Using nothing but XBee Series 1 adapters, penetration tests can be performed from<br />

up to a mile away under ideal circumstances. Depending on the amount of metal <strong>and</strong><br />

other materials between the comm<strong>and</strong> console <strong>and</strong> hacking drones, the attack range<br />

can be significantly less than a mile. Doing a penetration test poolside at the hotel<br />

down the street from your target is good. Staying at the nicer hotel a few miles away<br />

or performing the test from another city is even better.<br />

IEEE 802.15.4 ROUTERS<br />

Using Series 2 adapters can conserve power by allowing end devices to sleep the<br />

majority of the time. Each end device must have a parent that is either a router or<br />

a coordinator. The coordinator should be attached to the comm<strong>and</strong> console.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!