Raspberry Pi for Secret Agents -E-book




E-Book description:

The Raspberry Pi was developed with the intention of promoting basic computer
science in schools, but the Pi also represents a welcome return to simple, fun, and
open computing. Using gadgets for purposes other than those intended, especially for mischief and pranks, has always been an important part of adopting a new technology and making it your own. With a $25 Raspberry Pi computer and a few common USB gadgets, anyone can afford to become a secret agent.

E-Book Author:

Stefan Sjogelidraspberry pi secret agents.jpg

E-Book Table of Contents:

Preface…..1
Chapter 1: Getting Up to No Good…..7
A brief history lesson on the Pi…..7
The ins and outs of the Raspberry Pi…..8
GPIO…..8
RCA video…..9
Audio…..9
LEDs…..9
USB…..9
LAN…..9
HDMI…..10
Power…..10
SD card…..11
Writing Raspbian OS to the SD card…..11
Getting Raspbian…..11
SD card image writing in Windows…..12
SD card image writing in Mac OS X or Linux…..12
Booting up and configuring Raspbian…..13
Basic commands to explore your Pi…..16
Accessing the Pi over the network using SSH…..16
Wired network setup…..16
Wi-Fi network setup…..17
Connecting to the Pi from Windows…..18
Connecting to the Pi from Mac OS X or Linux…..19
The importance of a sneaky headless setup…..19
Keeping your system up-to-date…..20
Summary…..21
Chapter 2: Audio Antics…..23
Configuring your audio gadgets…..23
Introducing the ALSA sound system…..23
Controlling the volume…..24
Switching between HDMI and analog audio output…..26
Testing the speakers…..26
Preparing to record…..27
Testing the microphone…..28
Clipping, feedback distortion, and improving sound quality…..29
Recording conversations for later retrieval…..30
Writing to a WAV file…..31
Writing to an MP3 or OGG file…..31
Creating command shortcuts with aliases…..32
Keep your recordings running safely with tmux…..34
Listening in on conversations from a distance…..35
Listening on Windows…..36
Listening on Mac OS X or Linux…..38
Talking to people from a distance…..39
Talking on Windows…..39
Talking on Mac OS X or Linux…..40
Distorting your voice in weird and wonderful ways…..41
Make your computer do the talking…..43
Scheduling your audio actions…..43
Start on power up…..43
Start in a couple of minutes from now…..46
Controlling recording length…..48
Bonus one line sampler…..48
Summary…..49
Chapter 3: Webcam and Video Wizardry…..51
Setting up your camera…..51
Meet the USB Video Class drivers and Video4Linux…..51
Finding out your webcam’s capabilities…..52
Capturing your target on film…..54
Viewing your webcam in VLC media player…..58
Viewing in Windows…..58
Viewing in Mac OS X…..58
Viewing on Linux…..59
Recording the video stream…..59
Recording in Windows…..60
Recording in Mac OS X…..60
Recording in Linux…..61
Detecting an intruder and setting off an alarm…..61
Creating an initial Motion configuration…..62
Trying out Motion…..64
Collecting the evidence…..66
Viewing the evidence…..68
Hooking up more cameras…..68
Preparing a webcam stream in Windows…..68
Preparing a webcam stream in Mac OS X…..69
Configuring Motion for multiple input streams…..70
Building a security monitoring wall…..71
Turning your TV on or off using the Pi…..73
Scheduling video recording or staging a playback scare…..74
Summary…..77
Chapter 4: Wi-Fi Pranks – Exploring your Network…..79
Getting an overview of all the computers on your network…..79
Monitoring Wi-Fi airspace with Kismet…..80
Preparing Kismet for launch…..81
First Kismet session…..82
Adding sound and speech…..85
Enabling rouge access point detection…..85
Mapping out your network with Nmap…..86
Finding out what the other computers are up to…..89
How encryption changes the game…..92
Traffic logging…..93
Shoulder surfing in Elinks…..93
Pushing unexpected images into browser windows…..94
Knocking all visitors off your network…..96
Protecting your network against Ettercap…..96
Analyzing packet dumps with Wireshark…..98
Running Wireshark on Windows…..100
Running Wireshark on Mac OS X…..100
Running Wireshark on Linux…..101
Summary…..102
Chapter 5: Taking your Pi Off-road…..103
Keeping the Pi dry and running with housing and batteries…..103
Setting up point-to-point networking…..104
Creating a direct wired connection…..104
Static IP assignment on Windows…..105
Static IP assignment on Mac OS X…..106
Static IP assignment on Linux…..106
Creating an ad hoc Wi-Fi network…..106
Connecting to an ad hoc Wi-Fi network on Windows…..108
Connecting to an ad hoc Wi-Fi network on Mac OS X…..109
Tracking the Pi’s whereabouts using GPS…..110
Tracking the GPS position on Google Earth…..112
Preparing a GPS beacon on the Pi…..112
Setting up Google Earth…..112
Setting up a GPS waypoint logger…..113
Mapping GPS data from Kismet…..113
Using the GPS as a time source…..115
Setting up the GPS on boot…..116
Controlling the Pi with your smartphone…..117
Receiving status updates from the Pi…..119
Tagging tweets with GPS coordinates…..122
Scheduling regular updates…..124
Keeping your data secret with encryption…..124
Creating a vault inside a file…..125
Summary…..127
Graduation…..127
Index

Link to Purchase E-Book:

Raspberry Pi for Secret Agents -E-book




© 2015 Powered By Engineering Projects Team, Raspberry Pi Projects

Scroll to top