It shows how to use an army of devices, costing less than you might spend on a laptop, from distances of a mile or more. Hacking and Penetration Testing with Low Power Devices shows how to use devices running a version of The Deck, a full-featured penetration testing and forensics Linux distribution, and can run for days or weeks on batteries due to their low power consumption.
Thanks for helping keep SourceForge clean.
Author Philip Polstra shows how to use various configurations, including a device the size of a deck of cards that can easily be attached to the back of a computer. While each device running The Deck is a full-featured pen-testing platform, connecting systems together via This reference teaches you how to construct and power these devices, install operating systems, and fill out your toolbox of small low-power devices with hundreds of tools and scripts from the book's companion website.
Hacking and Pen Testing with Low Power Devices puts all these tools into your hands and will help keep you at the top of your game performing cutting-edge pen tests from anywhere in the world! Here at Walmart. Your email address will never be sold or distributed to a third party for any reason.
Due to the high volume of feedback, we are unable to respond to individual comments.
USB Forensics and Pentesting
Sorry, but we can't respond to individual comments. Recent searches Clear All. Update Location.
If you want NextDay, we can save the other items for later. Yes—Save my other items for later.
Here are some of the best Android hacking apps you can try. Originally designed to work only with Google Nexus devices, the popular hacking and penetration-testing Kali Nethunter can actually be used on more recent devices with a bit of tweaking. Kali Nethunter essentially installs an OS overlay on your Android device, turning your device into a pentesting tool at relatively low memory usage. It also allows WiFi frame injection, keyboard-hijacking and man-in-the-middle attacks, making it great for testing a wide variety of hacking methods.
With a single tap, zANTI can gather a boatload of information about any connected network or device.
ISBN 13: 9780128007518
The gathered information can be used to find if the device or network is susceptible to any known vulnerabilities and perform MITM Man in the Middle attacks. If needed, you can configure zANTI to send email reports of all the devices and data it collects at regular intervals.
Since the app comes bundled with the Metasploit framework, you can find security vulnerabilities of the network or connected devices, create shell consoles, and adjust exploit settings for better control. Though not as powerful as zANTI or cSploit, Hackode is a pretty good app that lets you gather information about other devices.
About This Item
Using Hackode, you can scan and find device or network vulnerabilities. It gets the job done if you only have basic needs. Network Mapper is a powerful tool that makes use of the widely-used Nmap scanner in the background to map and scan the connected networks. Hacking and Pen Testing with Low Power Devices puts all these tools into your hands and will help keep you at the top of your game performing cutting-edge pen tests from anywhere in the world!
Why should you use Wordery Specialist
Understand how to plan and execute an effective penetration test using an army of low-power devicesLearn how to configure and use open-source tools and easy-to-construct low-power devicesLeverage IEEE Wordery is one of the UK's largest online booksellers. With millions of satisfied customers who enjoy low prices on a huge range of books, we offer a reliable and trusted service and consistently receive excellent feedback. We offer a huge range of over 8 million books; bestsellers, children's books, cheap paperbacks, baby books, special edition hardbacks, and textbooks.
All our books are dispatched from the UK. Wordery offers Free Delivery on all UK orders, and competitively priced international delivery. We find rare books for you These take a little longer to source.