10.09.2016 Views

Hacking_and_Penetration_Testing_with_Low_Power_Devices

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CHAPTER<br />

Keeping your army secret<br />

8<br />

INFORMATIONINTHISCHAPTER:<br />

• Hiding devices in natural objects<br />

• Hiding devices in <strong>and</strong> around structures<br />

• Using toys <strong>and</strong> trinkets to your advantage<br />

• Planting devices<br />

• Maintaining devices<br />

• Removing devices<br />

INTRODUCTION<br />

Having someone discover one of your hacking drones can lead to an unplanned <strong>and</strong><br />

early end to a penetration test. This can really ruin your day <strong>and</strong> possibly your reputation<br />

as a penetration tester. <strong>Devices</strong> must be initially placed, maintained, <strong>and</strong> ideally<br />

removed <strong>with</strong>out alerting anyone at the target organization. This chapter will<br />

discuss several techniques that should lessen the chances of discovery during a<br />

penetration test.<br />

There are a few general principles that apply to avoiding detection. Naturally, you<br />

need to avoid drawing attention to yourself or your equipment. The LEDs on the BeagleBone<br />

Black are very bright. Even if you install a BeagleBone Black inside something,<br />

the light might be visible. Recall from a previous chapter that these LEDs can<br />

be disabled <strong>with</strong> the following script:<br />

#!/bin/bash<br />

# simple script to turn off all user LEDs<br />

echo none > /sys/class/leds/beaglebone\:green\:usr0/trigger<br />

echo none > /sys/class/leds/beaglebone\:green\:usr1/trigger<br />

echo none > /sys/class/leds/beaglebone\:green\:usr2/trigger<br />

echo none > /sys/class/leds/beaglebone\:green\:usr3/trigger<br />

Another general principle is that you need to blend in when operating in the vicinity<br />

of your target. This means that nothing should draw attention to you <strong>and</strong> your<br />

activities. You should dress similar to those around you. Your vehicle should blend<br />

in. At all times, you must act as though you belong wherever you are.<br />

<strong>Hacking</strong> <strong>and</strong> <strong>Penetration</strong> <strong>Testing</strong> <strong>with</strong> <strong>Low</strong> <strong>Power</strong> <strong>Devices</strong><br />

© 2015 Elsevier Inc. All rights reserved.<br />

205

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!