Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover image
Title page
Table of Contents
Copyright
Dedication
Foreword
Author Biography
Acknowledgments
Chapter 1: Meet the deck
Abstract
Introduction
The Deck
Summary
Chapter 2: Meet the beagles
Abstract
Introduction
Texas Instruments Devices
Summary
Chapter 3: Installing a base operating system
Abstract
Introduction
Desired Attributes for Penetration Testing Linux Distribution
Ubuntu Options
Creating a microSD Card
Summary
Chapter 3 Appendix: Digging Deeper into the Setup Script
Chapter 4: Filling the toolbox
Abstract
Introduction
Adding a Graphical Environment
Adding Tools the Easy Way
Adding Tools the Hard Way
Starter Set of Tools
Summary
Chapter 5: Powering The Deck
Abstract
Introduction
Power Requirements
Power Sources
Reducing Power Consumption
Penetration Testing With a Single Beagle
Summary
Chapter 6: Input and output devices
Abstract
Introduction
Display Options
Keyboards and Mice
IEEE 802.11 Wireless
IEEE 802.15.4 Wireless
Network Hubs and Switches
BeagleBone Capes
Penetration Testing With a Single Remote Drone
Summary
Chapter 7: Building an army of devices
Abstract
Introduction
Using IEEE 802.15.4 Networking
Configuring IEEE 802.15.4 Modems
Remote Control the Easy Way
Remote Control via Python
Saving Power
Adding Security
Expanding Your Reach
Penetration Testing With Multiple Drones
Summary
Chapter 8: Keeping your army secret
Abstract
Introduction
Hiding Devices
Installing Devices
Summary
Chapter 9: Adding air support
Abstract
Introduction
Building the AirDeck
Using Your Aerial Drone
Alternative Aircraft
Summary
Chapter 10: Future directions
Abstract
Introduction
Current Happenings with The Deck
Cape Contemplations
Ports of The Deck
Ultralow Power with Microcontrollers
Closing Thoughts
Index
← Prev
Back
Next →
← Prev
Back
Next →