Syngress.Hacking.And.Penetration.Testing.With.Low.Power.Devices
Total Page:16
File Type:pdf, Size:1020Kb
Hacking and Penetration Testing with Low Power Devices This page intentionally left blank Hacking and Penetration Testing with Low Power Devices Philip Polstra Technical Editor: Vivek Ramachandran AMSTERDAM • BOSTON • HEIDELBERG • LONDON NEW YORK • OXFORD • PARIS • SAN DIEGO SAN FRANCISCO • SYDNEY • TOKYO Syngress is an Imprint of Elsevier Acquiring Editor: Chris Katsaropoulos Editorial Project Manager: Benjamin Rearick Project Manager: Priya Kumaraguruparan Designer: Mark Rogers Syngress is an imprint of Elsevier 225 Wyman Street, Waltham, MA 02451, USA Copyright # 2015 Elsevier Inc. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publisher’s permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions. This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein). Notices Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods, professional practices, or medical treatment may become necessary. Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information, methods, compounds, or experiments described herein. In using such information or methods they should be mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility. To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in the material herein. Library of Congress Cataloging-in-Publication Data Polstra, Philip, author. Hacking and penetration testing with low power devices / Philip Polstra, associate professor, Bloomsburg University, Bloomsburg, PA ; technical editor, Vivek Ramachandran. pages cm ISBN 978-0-12-800751-8 1. Penetration testing (Computer security)–Equipment and supplies. 2. BeagleBone (Computer) I. Ramachandran, Vivek, editor. II. Title. QA76.9.A25P5965 2015 005.8–dc23 2014027430 British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library ISBN: 978-0-12-800751-8 For information on all Syngress publications, visit our website at store.elsevier.com/syngress This book has been manufactured using Print On Demand technology. Each copy is produced to order and is limited to black ink. The online version of this book will show color figures where appropriate. Dedicated to my favorite wife, my favorite daughter, and my favorite son. This page intentionally left blank Contents Foreword...................................................................................................................xi Author Biography .................................................................................................. xiii Acknowledgments ...................................................................................................xv CHAPTER 1 Meet the Deck ....................................................... 1 Introduction.....................................................................................1 Fear Not ..................................................................................... 1 The Deck.........................................................................................2 Devices Running The Deck ...................................................... 2 Penetration Testing Tools.......................................................... 3 Modes of Operation................................................................... 7 Summary.......................................................................................11 CHAPTER 2 Meet the Beagles ................................................. 13 Introduction...................................................................................13 Texas Instruments Devices...........................................................14 BeagleBoard-xM...................................................................... 14 BeagleBone.............................................................................. 18 BeagleBone Black ................................................................... 21 Summary.......................................................................................26 CHAPTER 3 Installing a Base Operating System ....................... 27 Introduction...................................................................................27 Non-Linux Options.................................................................. 27 Linux Options .......................................................................... 31 Desired Attributes for Penetration Testing Linux Distribution...42 Ubuntu Options.............................................................................43 Ubuntu Variants....................................................................... 44 Kernel Choices ........................................................................ 44 Creating a microSD Card .............................................................45 Summary.......................................................................................46 Chapter 3 Appendix: Digging Deeper into the Setup Script.......46 CHAPTER 4 Filling the Toolbox ............................................... 55 Introduction...................................................................................55 Adding a Graphical Environment ................................................55 Adding Tools the Easy Way ........................................................62 Using Repositories................................................................... 62 Using Packages........................................................................ 65 vii viii Contents Adding Tools the Hard Way ........................................................69 Native Compilation.................................................................. 70 Simple Cross compilation ....................................................... 70 Cross compiling Using Eclipse ............................................... 71 Automating Source Builds ...................................................... 79 Installing Python Tools ........................................................... 85 Installing Ruby ........................................................................ 86 Starter Set of Tools.......................................................................86 Wireless Cracking.................................................................... 86 Password Cracking .................................................................. 88 Scanners ................................................................................... 89 Python Tools............................................................................ 90 Metasploit ................................................................................ 90 Summary.......................................................................................92 CHAPTER 5 Powering The Deck .............................................. 93 Introduction...................................................................................93 Power Requirements.....................................................................94 Power Sources ..............................................................................96 Wall Power .............................................................................. 97 USB Power .............................................................................. 97 Battery Power .......................................................................... 98 Solar Power............................................................................ 102 Reducing Power Consumption...................................................103 Penetration Testing With a Single Beagle.................................105 Getting on the Wireless......................................................... 106 Finding What Is Out There ................................................... 109 Looking for Vulnerabilities................................................... 112 Exploiting Vulnerabilities ..................................................... 114 Attacking Passwords.............................................................. 117 Detecting Other Security Issues ............................................ 120 Summary.....................................................................................121 CHAPTER 6 Input and Output Devices .................................... 123 Introduction.................................................................................123 Display Options ..........................................................................123 Traditional Monitors.............................................................. 123 Directly Attached Devices..................................................... 124