售 价:¥
温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印
为你推荐
Raspberry Pi for Secret Agents - Third Edition
Raspberry Pi for Secret Agents - Third Edition
Credits
About the Author
About the Reviewer
www.PacktPub.com
Why subscribe?
Free access for Packt account holders
Preface
What this book covers
What you need for this book
Who this book is for
Conventions
Reader feedback
Customer support
Downloading the example code
Downloading the color images of this book
Errata
Piracy
Questions
1. Getting up to No Good
A brief history lesson on the Pi
Raspberry Pi Model A
Raspberry Pi Model B
Raspberry Pi Model B+
Raspberry Pi Model 2
Raspberry Pi Zero
Raspberry Pi 3
So, which Pi for us spies?
Where to buy a Pi
The ins and outs of the Raspberry Pi
GPIO headers
Audio/Video jack
Status LEDs
USB
Ethernet port
CSI camera connector
Display Serial Interface
HDMI
Power
MicroSD card
Preparing the SD card
Download the Raspbian image
Using Microsoft Windows
Using Linux
Boot up your Pi
Expand the filesystem
Goodbye GUI
Using the raspi-config utility
Setting up your Pi
The importance of a sneaky headless setup
Keeping your system up to date
Backing up your SD card
Complete SD card backup in Windows
Complete SD card backup in MAC OS X
Complete SD card backup in Linux
Summary
2. Audio Antics
Configuring your audio gadgets
Sound variations
Introducing the ALSA sound system
Controlling the volume
Switching between HDMI and analog audio output
Testing the speakers
Preparing to record
Testing the microphone
Clipping, feedback distortion, and improving sound quality
Recording conversations for later retrieval
Writing to a WAV file
Writing to an MP3 or OGG file
Creating command shortcuts with aliases
Keep your recordings running safely with tmux
Making a covert wearable recorder with Pi Zero
Listening in on conversations from a distance
Listening in Windows
Listening in Mac OS X or Linux
Listening in over Bluetooth
Introducing Bluetooth audio
Setting up Bluetooth on the Pi
Installing PulseAudio
Connect to your Bluetooth headset or speaker
Bluetooth by default
Talking to people from a distance
Talking in Windows
Talking in Mac OS X or Linux
Attention Mac users
Talking in Bluetooth
Distorting your voice in weird and wonderful ways
Make your computer do the talking
Scheduling your audio actions
Start on power up
Scheduled start
Controlling recording length
Start recording with noise detection
Calling your fellow agents
Setting up SIP Witch
Connecting the softphones
Windows (MicroSIP)
Configuring the MicroSIP softphone for Windows
Mac OS X (Telephone)
Linux (Ring)
Android (CSipSimple)
iPhone/iPad (Linphone)
Running a softphone on the Pi
Encrypting SIP Witch passwords
Setting up Linphone
Playing files with Linphone
Using your voice to control things
Give your Pi some ears
Bonus one-line sampler
Summary
3. Webcam and Video Wizardry
Meet the USB Video Class drivers and Video4Linux
Raspberry Pi Camera Module
Connecting the camera module
Setting up the camera module
Using USB cameras
Connecting the webcam
Finding out your webcam's capabilities
Capturing your target on film
Viewing your camera in VLC media player
Viewing in Windows
Viewing in Mac OS X
Viewing in Linux
Recording the video stream
Recording in Windows
Recording in Mac OS X
Recording in Linux
Detecting an intruder and setting off an alarm
Creating a motion detection configuration
Trying out Motion
Collecting the evidence
Viewing and e-mailing the evidence
Hooking up more cameras
Preparing a webcam stream in Windows
Preparing a webcam stream in Mac OS X
Configuring MotionEye for multiple input streams
Watching your camera over the Internet
The link between the Pi and the broadcasting service
Night vision
Make a covert wearable recorder with Pi Zero
Turning your TV on or off using the Pi
Scheduling a playback scare
Summary
4. Wi-Fi Pranks – Exploring Your Network
Getting an overview of all the computers on your network
Monitoring Wi-Fi airspace with Kismet
Preparing Kismet for launch
First Kismet session
Adding sound and speech
Enabling rogue access point detection
Mapping out your network with Nmap
Finding out what the other computers are up to
How encryption changes the game
Traffic logging
Shoulder surfing in Elinks
Pushing unexpected images to browser windows
Knocking all visitors off your network
Protecting your network against Ettercap
Analyzing packet dumps with Wireshark
Running Wireshark in Windows
Running Wireshark in Mac OS X
Running Wireshark in Linux
Exploring dynamic DNS, port forwarding, and tunneling
Dynamic DNS
Choosing your domain name
Verifying your domain name
Updating your domain name
Port forwarding
Adding the forwarding rule
Verifying your port forwarding
Port forwarding security
Connected at last
Tunneling
Port tunneling in Windows
Port tunneling in Linux or Mac OS X
Creating a diversion using a chat bot
Introducing XMPP
Useful Profanity
Connecting to Google chat
Connecting to XMPP servers
Getting around Profanity
Project AgentBot
Awakening the bot
Keeping your conversations secret with encryption
Summary
5. Taking Your Pi Off-Road
Keeping the Pi dry and running with housing and batteries
Setting up point-to-point networking
Creating a direct wired connection
Static IP assignment in Windows
Static IP assignment in Mac OS X
Static IP assignment in Linux
Turning the Pi into a Wi-Fi hotspot
Connecting the Pi to the mobile Internet
Multiple personalities
Switching modes
Automatic mode-switching
Be anonymous on the Internet
Know your onions
Setting up the Wi-Fi access point
Installing and setting up a DHCP server
Set up the routing tables
Installing and setting up Tor
Test your anonymity
Tracking the Pi's whereabouts using GPS
Tracking the GPS position on Google Earth
Preparing a GPS beacon on the Pi
Setting up Google Earth
Setting up a GPS waypoint logger
Mapping GPS data from Kismet
Using GPS as a time source
Setting up GPS on boot
Controlling the Pi with your smartphone
Android (Raspi SSH)
iPhone/iPad (SSH Remote)
Common remote control commands
Receiving status updates from the Pi
Tagging tweets with GPS coordinates
Sending e-mail updates
Installing and setting up the SMTP client
Sending attachments
Scheduling regular updates
Accessing your files from anywhere with Dropbox
Keeping your data secret with encryption
Erasing the Pi should it fall into the wrong hands
Encrypting your home with eCryptfs
Rigging the self-destruct mechanism
Jam the airwaves with a Pi Zero
Installing PiFm
Broadcasting to the airwaves
Summary
6. Detecting and Protecting Against Your Enemies
Say hello to the GPIO
Power connections
Building a laser trip wire
How it works
Wiring it up
Writing the detection script
Protecting an entire area
Wiring it up
Implementing the detection script
Sending alerts to your phone using SMS
SMS gateway
Sending messages through the API
Use your phone as an access control device
Probe Requests
Scanning with tshark
Displaying secret codes and messages
Enabling the serial port
Connecting the Pi-Lite
Encoding our messages
Writing the encoder script
Sending our text to the display
Better security with a true random number generator
Kernel entropy pool
Setting up our hardware RNG
Enabling the hardware RNG in Raspbian Wheezy
Enabling the hardware RNG in Raspbian Jessie
Testing the hardware RNG
Using the HWRNG for our entropy pool
Exporting the HWRNG data to another Linux server
Connecting the UART pins
Transferring entropy to the serial port
Receiving entropy on the server
Summary
Graduation
买过这本书的人还买过
读了这本书的人还在读
同类图书排行榜