万本电子书0元读

万本电子书0元读

顶部广告

Raspberry Pi for Secret Agents - Third Edition电子书

售       价:¥

1人正在读 | 0人评论 9.8

作       者:Matthew Poole

出  版  社:Packt Publishing

出版时间:2016-07-01

字       数:261.2万

所属分类: 进口书 > 外文原版书 > 电脑/网络

温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印

为你推荐

  • 读书简介
  • 目录
  • 累计评论(0条)
  • 读书简介
  • 目录
  • 累计评论(0条)
Turn your Raspberry Pi into a secret agent toolbox with this set of exciting projects About This Book Turn your Raspberry Pi into a multi-purpose secret agent gadget for audio and video surveillance, Wi-Fi exploration, or playing pranks on your friends Detect an intruder on camera or with sensors and set off an alarm or receive messages to your phone Find out what the other computers on your network are up to and make yourself anonymous on the Internet This book has been updated for new additions to your toolkit featuring the tiny, recently released Raspberry Pi Zero board Who This Book Is For This book is for those who are new to the Raspberry Pi Zero ,Raspberry Pi 2 or Raspberry Pi 3 and have some experience with the original Raspberry Pi models, and even for those budding secret agents who would like to use Pi Zero as a secret agent toolbox. No programming experience is assumed. Suitable for the novice and expert alike, each topic provides a fast and easy way to get started with exciting applications, with practical examples in every chapter. What You Will Learn Install and configure the Raspbian Jessie operating system for maximum mischief Detect an intruder with motion detection or a laser trip wire and set off an alarm Listen in to conversations from a distance over Bluetooth Distort your voice in weird and wonderful ways Track the Pi's whereabouts using GPS Connect your Pi to the mobile Internet using a 3G dongle and make yourself anonymous on the net Display secret messages and codes to fellow agents on a LED display In Detail This book is for all mischievous Raspberry Pi owners who’d like to see their computer transform into a neat spy gadget to be used in a series of practical pranks and projects. No previous skills are required to follow along, and if you’re completely new to Linux, you’ll pick up much of the basics for free. We’ll help you set up your Raspberry Pi Zero , Raspberry Pi 2 and Raspberry Pi 3 and guide you through a number of pranks and secret agent techniques that are so inconspicuous yet high on mischief. You’ll learn how to configure your operating system for maximum mischief and start exploring audio, video, or Wi-Fi techniques. We’ll show you how to record, listen, or talk to people from a distance and how to set up your own phone network. Then, you’ll plug in your webcam and set up a motion detector with an alarm and find out what the other computers on your Wi-Fi network are up to. Once you've mastered the techniques, we’ll combine them with a battery pack and GPS for the ultimate off-road spy kit. Style and Approach This easy-to-follow guide is for budding secret agents who want to create tools for mischief, stealth, and reconnaissance. It’s full of fun, practical examples and easy-to-follow recipes, guaranteeing maximum mischief for all skill levels.
目录展开

Raspberry Pi for Secret Agents - Third Edition

Raspberry Pi for Secret Agents - Third Edition

Credits

About the Author

About the Reviewer

www.PacktPub.com

Why subscribe?

Free access for Packt account holders

Preface

What this book covers

What you need for this book

Who this book is for

Conventions

Reader feedback

Customer support

Downloading the example code

Downloading the color images of this book

Errata

Piracy

Questions

1. Getting up to No Good

A brief history lesson on the Pi

Raspberry Pi Model A

Raspberry Pi Model B

Raspberry Pi Model B+

Raspberry Pi Model 2

Raspberry Pi Zero

Raspberry Pi 3

So, which Pi for us spies?

Where to buy a Pi

The ins and outs of the Raspberry Pi

GPIO headers

Audio/Video jack

Status LEDs

USB

Ethernet port

CSI camera connector

Display Serial Interface

HDMI

Power

MicroSD card

Preparing the SD card

Download the Raspbian image

Using Microsoft Windows

Using Linux

Boot up your Pi

Expand the filesystem

Goodbye GUI

Using the raspi-config utility

Setting up your Pi

The importance of a sneaky headless setup

Keeping your system up to date

Backing up your SD card

Complete SD card backup in Windows

Complete SD card backup in MAC OS X

Complete SD card backup in Linux

Summary

2. Audio Antics

Configuring your audio gadgets

Sound variations

Introducing the ALSA sound system

Controlling the volume

Switching between HDMI and analog audio output

Testing the speakers

Preparing to record

Testing the microphone

Clipping, feedback distortion, and improving sound quality

Recording conversations for later retrieval

Writing to a WAV file

Writing to an MP3 or OGG file

Creating command shortcuts with aliases

Keep your recordings running safely with tmux

Making a covert wearable recorder with Pi Zero

Listening in on conversations from a distance

Listening in Windows

Listening in Mac OS X or Linux

Listening in over Bluetooth

Introducing Bluetooth audio

Setting up Bluetooth on the Pi

Installing PulseAudio

Connect to your Bluetooth headset or speaker

Bluetooth by default

Talking to people from a distance

Talking in Windows

Talking in Mac OS X or Linux

Attention Mac users

Talking in Bluetooth

Distorting your voice in weird and wonderful ways

Make your computer do the talking

Scheduling your audio actions

Start on power up

Scheduled start

Controlling recording length

Start recording with noise detection

Calling your fellow agents

Setting up SIP Witch

Connecting the softphones

Windows (MicroSIP)

Configuring the MicroSIP softphone for Windows

Mac OS X (Telephone)

Linux (Ring)

Android (CSipSimple)

iPhone/iPad (Linphone)

Running a softphone on the Pi

Encrypting SIP Witch passwords

Setting up Linphone

Playing files with Linphone

Using your voice to control things

Give your Pi some ears

Bonus one-line sampler

Summary

3. Webcam and Video Wizardry

Meet the USB Video Class drivers and Video4Linux

Raspberry Pi Camera Module

Connecting the camera module

Setting up the camera module

Using USB cameras

Connecting the webcam

Finding out your webcam's capabilities

Capturing your target on film

Viewing your camera in VLC media player

Viewing in Windows

Viewing in Mac OS X

Viewing in Linux

Recording the video stream

Recording in Windows

Recording in Mac OS X

Recording in Linux

Detecting an intruder and setting off an alarm

Creating a motion detection configuration

Trying out Motion

Collecting the evidence

Viewing and e-mailing the evidence

Hooking up more cameras

Preparing a webcam stream in Windows

Preparing a webcam stream in Mac OS X

Configuring MotionEye for multiple input streams

Watching your camera over the Internet

The link between the Pi and the broadcasting service

Night vision

Make a covert wearable recorder with Pi Zero

Turning your TV on or off using the Pi

Scheduling a playback scare

Summary

4. Wi-Fi Pranks – Exploring Your Network

Getting an overview of all the computers on your network

Monitoring Wi-Fi airspace with Kismet

Preparing Kismet for launch

First Kismet session

Adding sound and speech

Enabling rogue access point detection

Mapping out your network with Nmap

Finding out what the other computers are up to

How encryption changes the game

Traffic logging

Shoulder surfing in Elinks

Pushing unexpected images to browser windows

Knocking all visitors off your network

Protecting your network against Ettercap

Analyzing packet dumps with Wireshark

Running Wireshark in Windows

Running Wireshark in Mac OS X

Running Wireshark in Linux

Exploring dynamic DNS, port forwarding, and tunneling

Dynamic DNS

Choosing your domain name

Verifying your domain name

Updating your domain name

Port forwarding

Adding the forwarding rule

Verifying your port forwarding

Port forwarding security

Connected at last

Tunneling

Port tunneling in Windows

Port tunneling in Linux or Mac OS X

Creating a diversion using a chat bot

Introducing XMPP

Useful Profanity

Connecting to Google chat

Connecting to XMPP servers

Getting around Profanity

Project AgentBot

Awakening the bot

Keeping your conversations secret with encryption

Summary

5. Taking Your Pi Off-Road

Keeping the Pi dry and running with housing and batteries

Setting up point-to-point networking

Creating a direct wired connection

Static IP assignment in Windows

Static IP assignment in Mac OS X

Static IP assignment in Linux

Turning the Pi into a Wi-Fi hotspot

Connecting the Pi to the mobile Internet

Multiple personalities

Switching modes

Automatic mode-switching

Be anonymous on the Internet

Know your onions

Setting up the Wi-Fi access point

Installing and setting up a DHCP server

Set up the routing tables

Installing and setting up Tor

Test your anonymity

Tracking the Pi's whereabouts using GPS

Tracking the GPS position on Google Earth

Preparing a GPS beacon on the Pi

Setting up Google Earth

Setting up a GPS waypoint logger

Mapping GPS data from Kismet

Using GPS as a time source

Setting up GPS on boot

Controlling the Pi with your smartphone

Android (Raspi SSH)

iPhone/iPad (SSH Remote)

Common remote control commands

Receiving status updates from the Pi

Tagging tweets with GPS coordinates

Sending e-mail updates

Installing and setting up the SMTP client

Sending attachments

Scheduling regular updates

Accessing your files from anywhere with Dropbox

Keeping your data secret with encryption

Erasing the Pi should it fall into the wrong hands

Encrypting your home with eCryptfs

Rigging the self-destruct mechanism

Jam the airwaves with a Pi Zero

Installing PiFm

Broadcasting to the airwaves

Summary

6. Detecting and Protecting Against Your Enemies

Say hello to the GPIO

Power connections

Building a laser trip wire

How it works

Wiring it up

Writing the detection script

Protecting an entire area

Wiring it up

Implementing the detection script

Sending alerts to your phone using SMS

SMS gateway

Sending messages through the API

Use your phone as an access control device

Probe Requests

Scanning with tshark

Displaying secret codes and messages

Enabling the serial port

Connecting the Pi-Lite

Encoding our messages

Writing the encoder script

Sending our text to the display

Better security with a true random number generator

Kernel entropy pool

Setting up our hardware RNG

Enabling the hardware RNG in Raspbian Wheezy

Enabling the hardware RNG in Raspbian Jessie

Testing the hardware RNG

Using the HWRNG for our entropy pool

Exporting the HWRNG data to another Linux server

Connecting the UART pins

Transferring entropy to the serial port

Receiving entropy on the server

Summary

Graduation

累计评论(0条) 0个书友正在讨论这本书 发表评论

发表评论

发表评论,分享你的想法吧!

买过这本书的人还买过

读了这本书的人还在读

回顶部