10.09.2016 Views

Hacking_and_Penetration_Testing_with_Low_Power_Devices

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Summary<br />

203<br />

# if IP <strong>and</strong> MAC aren’t specified exit<br />

if (ipaddr ¼¼ None ) & (macaddr ¼¼ None):<br />

print parser.usage<br />

exit(0)<br />

try:<br />

print "Capturing traffic"<br />

sniff(iface¼"mon0", prn¼packet_h<strong>and</strong>ler, filter¼"tcp",\<br />

timeout¼1800)<br />

except KeyboardInterrupt:<br />

pass<br />

pktcap.close()<br />

print "All done"<br />

exit(0)<br />

if __name__ ¼¼ ’__main__’ :<br />

main()<br />

Naturally, the complete penetration test has not been presented here. There could<br />

likely be additional discoveries. Everything must be documented for the client. What<br />

has been discussed in this chapter should provide you <strong>with</strong> a starting point to see what<br />

is possible <strong>with</strong> your own hacking drones, however. All of the scripts used in this<br />

chapter (<strong>and</strong> elsewhere in the book) are available for download from http://<br />

philpolstra.com. You can also check this website for new scripts <strong>and</strong> videos that correspond<br />

to the penetration tests presented in this book.<br />

SUMMARY<br />

We have covered a lot of ground in this chapter. First, we discussed IEEE 802.15.4<br />

<strong>and</strong> ZigBee networking in detail. Second, the details of configuring XBee radios<br />

were presented. Third, we learned how to use Python to wirelessly comm<strong>and</strong> <strong>and</strong><br />

control a penetration testing army. Forth, a number of optimizations <strong>and</strong> advanced<br />

techniques were provided. Finally, we walked through a penetration test using multiple<br />

hacking drones.<br />

In the next chapter, we will discuss various methods of remaining undetected during<br />

a penetration test. Topics covered will include planting, hiding, <strong>and</strong> maintaining<br />

devices <strong>with</strong>out being noticed.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!