售 价:¥
温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印
为你推荐
Raspberry Pi for Secret Agents
Table of Contents
Raspberry Pi for Secret Agents
Credits
About the Author
About the Reviewers
www.PacktPub.com
Support files, eBooks, discount offers and more
Why Subscribe?
Free Access for Packt account holders
Preface
What this book covers
What you need for this book
Who this book is for
Conventions
Reader feedback
Customer support
Downloading the example code
Errata
Piracy
Questions
1. Getting Up to No Good
A brief history lesson on the Pi
The ins and outs of the Raspberry Pi
GPIO
RCA video
Audio
LEDs
USB
LAN
HDMI
Power
SD card
Writing Raspbian OS to the SD card
Getting Raspbian
SD card image writing in Windows
SD card image writing in Mac OS X or Linux
Booting up and configuring Raspbian
Basic commands to explore your Pi
Accessing the Pi over the network using SSH
Wired network setup
Wi-Fi network setup
Connecting to the Pi from Windows
Connecting to the Pi from Mac OS X or Linux
The importance of a sneaky headless setup
Keeping your system up-to-date
Summary
2. Audio Antics
Configuring your audio gadgets
Introducing the ALSA sound system
Controlling the volume
Switching between HDMI and analog audio output
Testing the speakers
Preparing to record
Testing the microphone
Clipping, feedback distortion, and improving sound quality
Recording conversations for later retrieval
Writing to a WAV file
Writing to an MP3 or OGG file
Creating command shortcuts with aliases
Keep your recordings running safely with tmux
Listening in on conversations from a distance
Listening on Windows
Listening on Mac OS X or Linux
Talking to people from a distance
Talking on Windows
Talking on Mac OS X or Linux
Distorting your voice in weird and wonderful ways
Make your computer do the talking
Scheduling your audio actions
Start on power up
Start in a couple of minutes from now
Controlling recording length
Bonus one line sampler
Summary
3. Webcam and Video Wizardry
Setting up your camera
Meet the USB Video Class drivers and Video4Linux
Finding out your webcam's capabilities
Capturing your target on film
Viewing your webcam in VLC media player
Viewing in Windows
Viewing in Mac OS X
Viewing on Linux
Recording the video stream
Recording in Windows
Recording in Mac OS X
Recording in Linux
Detecting an intruder and setting off an alarm
Creating an initial Motion configuration
Trying out Motion
Collecting the evidence
Viewing the evidence
Hooking up more cameras
Preparing a webcam stream in Windows
Preparing a webcam stream in Mac OS X
Configuring Motion for multiple input streams
Building a security monitoring wall
Turning your TV on or off using the Pi
Scheduling video recording or staging a playback scare
Summary
4. Wi-Fi Pranks – Exploring your Network
Getting an overview of all the computers on your network
Monitoring Wi-Fi airspace with Kismet
Preparing Kismet for launch
First Kismet session
Adding sound and speech
Enabling rouge access point detection
Mapping out your network with Nmap
Finding out what the other computers are up to
How encryption changes the game
Traffic logging
Shoulder surfing in Elinks
Pushing unexpected images into browser windows
Knocking all visitors off your network
Protecting your network against Ettercap
Analyzing packet dumps with Wireshark
Running Wireshark on Windows
Running Wireshark on Mac OS X
Running Wireshark on Linux
Summary
5. Taking your Pi Off-road
Keeping the Pi dry and running with housing and batteries
Setting up point-to-point networking
Creating a direct wired connection
Static IP assignment on Windows
Static IP assignment on Mac OS X
Static IP assignment on Linux
Creating an ad hoc Wi-Fi network
Connecting to an ad hoc Wi-Fi network on Windows
Connecting to an ad hoc Wi-Fi network on Mac OS X
Tracking the Pi's whereabouts using GPS
Tracking the GPS position on Google Earth
Preparing a GPS beacon on the Pi
Setting up Google Earth
Setting up a GPS waypoint logger
Mapping GPS data from Kismet
Using the GPS as a time source
Setting up the GPS on boot
Controlling the Pi with your smartphone
Receiving status updates from the Pi
Tagging tweets with GPS coordinates
Scheduling regular updates
Keeping your data secret with encryption
Creating a vault inside a file
Summary
Graduation
Index
买过这本书的人还买过
读了这本书的人还在读
同类图书排行榜