DMCA. Copyrighted Work that you can Claim.
Base have 820 524 books.
Search: 


📙 Hacking and penetration testing with low power devices by Philip Polstra — download pdf


Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of devices, costing less than you might spend on a laptop, from distances of a mile or more.

Hacking and Penetration Testing with Low Power Devices shows how to use devices running a version of The Deck, a full-featured penetration testing and forensics Linux distribution, and can run for days or weeks on batteries due to their low power consumption. Author Philip Polstra shows how to use various configurations, including a device the size of a deck of cards that can easily be attached to the back of a computer.

While each device running The Deck is a full-featured pen-testing platform, connecting systems together via 802.15.3 networking gives you even more power and flexibility. This reference teaches you how to construct and power these devices, install operating systems, and fill out your toolbox of small low-power devices with hundreds of tools and scripts from the books companion website. Hacking and Pen Testing with Low Power Devices puts all these tools into your hands and will help keep you at the top of your game performing cutting-edge pen tests from anywhere in the world!



  • Understand how to plan and execute an effective penetration test using an army of low-power devices
  • Learn how to configure and use open-source tools and easy-to-construct low-power devices
  • Leverage IEEE 802.15.4 networking to perform penetration tests from up to a mile away, or use 802.15.4 gateways to perform pen tests from anywhere in the world
  • Access penetration testing operating systems with hundreds of tools and scripts on the books companion web site


About book:

About file:

  • File size: 73 476 944
  • Format: pdf


Security code:
Download button

Similar books results


Power-Aware Testing and Test Strategies for Low Power Devices
Power-Aware Testing and Test Strategies for Low Power Devices free epub by Laung-Terng Wang, Charles E. Stroud (auth.), Patrick Girard, Nicola Nicolici, Xiaoqing Wen (eds.)

Power-Aware Testing and Test Strategies for Low-Power Devices Edited by: Patrick Girard, Research Director, CNRS / LIRMM, France Nicola Nicolici, Associate Professor, McMaster University, Canada Xiaoqing Wen, Professor, Kyushu Institute of Technology, Jap...

Power-Aware Testing and Test Strategies for Low Power Devices
Power-Aware Testing and Test Strategies for Low Power Devices free pdf by Laung-Terng Wang, Charles E. Stroud (auth.), Patrick Girard, Nicola Nicolici, Xiaoqing Wen (eds.)

Power-Aware Testing and Test Strategies for Low-Power Devices Edited by: Patrick Girard, Research Director, CNRS / LIRMM, France Nicola Nicolici, Associate Professor, McMaster University, Canada Xiaoqing Wen, Professor, Kyushu Institute of Technology, Jap...

Penetration Testing with Perl
Penetration Testing with Perl free epub by Douglas Berdeaux

Harness the power of Perl to perform professional penetration testing About This BookWrite your own custom information security tools using Perl and object-oriented Perl modulesApply powerful Perl Regular Expression syntax to finely tune intelligence gath...

Penetration Testing with Perl
Penetration Testing with Perl download pdf by Douglas Berdeaux

Harness the power of Perl to perform professional penetration testing About This BookWrite your own custom information security tools using Perl and object-oriented Perl modulesApply powerful Perl Regular Expression syntax to finely tune intelligence gath...

Web Penetration Testing with Kali Linux
Web Penetration Testing with Kali Linux download pdf by Joseph Muniz, Aamir Lakhani

Kali Linux is built for professional penetration testing and security auditing. It is the next-generation of BackTrack, the most popular open-source penetration toolkit in the world. Readers will learn how to think like real attackers, exploit systems, an...

Web Penetration Testing with Kali Linux: A practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux
Web Penetration Testing with Kali Linux: A practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux download pdf by Joseph Muniz, Aamir Lakhani

Kali Linux is built for professional penetration testing and security auditing. It is the next-generation of BackTrack, the most popular open-source penetration toolkit in the world. Readers will learn how to think like real attackers, exploit systems, an...

Penetration Testing with Raspberry Pi: Construct a hacking arsenal for penetration testers or hacking enthusiasts using Kali Linux on a Raspberry Pi
Penetration Testing with Raspberry Pi: Construct a hacking arsenal for penetration testers or hacking enthusiasts using Kali Linux on a Raspberry Pi free download by Joseph Muniz, Aamir Lakhani

The Raspberry Pi is a low-cost credit-card sized computing system that can be customized for just about anything including penetration testing. Raspberry Pi is the best known platform not because it is cheap but because it is very powerful. Kali is a pent...

Kali Linux Wireless Penetration Testing: Master wireless testing techniques to survey and attack wireless networks with Kali Linux
Kali Linux Wireless Penetration Testing: Master wireless testing techniques to survey and attack wireless networks with Kali Linux free epub by Vivek Ramachandran, Cameron Buchanan

As wireless networks become ubiquitous in our lives, wireless penetration testing has become a key skill in the repertoire of the professional penetration tester. The Kali Linux security distribution comes with a myriad of tools used for networking attack...

Learning Penetration Testing with Python
Learning Penetration Testing with Python download pdf by Christopher Duffy

Utilize Python scripting to execute effective and efficient penetration testsAbout This Book Understand how and where Python scripts meet the need for penetration testing Familiarise yourself with the process of highlighting a specific methodology to ...