10.09.2016 Views

Hacking_and_Penetration_Testing_with_Low_Power_Devices

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CHAPTER<br />

Future directions<br />

10<br />

INFORMATIONINTHISCHAPTER:<br />

• Current extensions to The Deck running on Beagles<br />

• Cape ideas<br />

• Ports to other platforms<br />

• Fun <strong>with</strong> microcontrollers<br />

INTRODUCTION<br />

We have covered quite a bit of ground in this book. Work on The Deck <strong>and</strong> hacking<br />

<strong>with</strong> the Beagles is ongoing, however. Several extensions <strong>and</strong> new capes are in the<br />

works. A number of ports of The Deck to other platforms are in progress. Even lowerpower<br />

devices based on microcontrollers can be utilized in penetration tests in addition<br />

to using the Beagles. This book might be finished, but hopefully, your adventure<br />

into a new way of penetration testing is just beginning.<br />

CURRENT HAPPENINGS WITH THE DECK<br />

As new hacking tools emerge, they are being added to The Deck where appropriate.<br />

More powerful <strong>and</strong> efficient versions of st<strong>and</strong>ard hacking tools have also been<br />

known to come out from time to time. As a result, The Deck is constantly being<br />

updated.<br />

While we have discussed ways of using the Beagles in this book, we have not<br />

come close to exploiting all the functionality of these incredible devices. In particular,<br />

the ability to use the BeagleBone as a USB device has not been addressed.<br />

The BeagleBone can be used to emulate a number of USB devices such as a human<br />

interface device (HID) <strong>and</strong>/or mass storage device.<br />

By emulating a USB HID, the BeagleBone can become a pocket-sized hacker that<br />

can type even faster than in the movies. Other researchers have done work on USB<br />

HIDs based on the Teensy Arduino-compatible microcontroller boards. The Beagle-<br />

Bone is considerably more powerful than the Teensy (which has an 8-bit processor<br />

operating at a pedestrian 16 MHz).<br />

If the BeagleBone presents itself as a USB mass storage device, it can be used to<br />

extract data from a target machine. In cases where only certain devices may be<br />

<strong>Hacking</strong> <strong>and</strong> <strong>Penetration</strong> <strong>Testing</strong> <strong>with</strong> <strong>Low</strong> <strong>Power</strong> <strong>Devices</strong><br />

© 2015 Elsevier Inc. All rights reserved.<br />

235

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!