10.09.2016 Views

Hacking_and_Penetration_Testing_with_Low_Power_Devices

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Contents<br />

Foreword...................................................................................................................xi<br />

Author Biography .................................................................................................. xiii<br />

Acknowledgments ...................................................................................................xv<br />

CHAPTER 1 Meet the Deck ....................................................... 1<br />

Introduction.....................................................................................1<br />

Fear Not ..................................................................................... 1<br />

The Deck.........................................................................................2<br />

<strong>Devices</strong> Running The Deck ...................................................... 2<br />

<strong>Penetration</strong> <strong>Testing</strong> Tools.......................................................... 3<br />

Modes of Operation................................................................... 7<br />

Summary.......................................................................................11<br />

CHAPTER 2 Meet the Beagles ................................................. 13<br />

Introduction...................................................................................13<br />

Texas Instruments <strong>Devices</strong>...........................................................14<br />

BeagleBoard-xM...................................................................... 14<br />

BeagleBone.............................................................................. 18<br />

BeagleBone Black ................................................................... 21<br />

Summary.......................................................................................26<br />

CHAPTER 3 Installing a Base Operating System ....................... 27<br />

Introduction...................................................................................27<br />

Non-Linux Options.................................................................. 27<br />

Linux Options .......................................................................... 31<br />

Desired Attributes for <strong>Penetration</strong> <strong>Testing</strong> Linux Distribution...42<br />

Ubuntu Options.............................................................................43<br />

Ubuntu Variants....................................................................... 44<br />

Kernel Choices ........................................................................ 44<br />

Creating a microSD Card .............................................................45<br />

Summary.......................................................................................46<br />

Chapter 3 Appendix: Digging Deeper into the Setup Script.......46<br />

CHAPTER 4 Filling the Toolbox ............................................... 55<br />

Introduction...................................................................................55<br />

Adding a Graphical Environment ................................................55<br />

Adding Tools the Easy Way ........................................................62<br />

Using Repositories................................................................... 62<br />

Using Packages........................................................................ 65<br />

vii

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!