Raspberry Pi for Secret Agents - Second Edition
eBook - ePub

Raspberry Pi for Secret Agents - Second Edition

Stefan Sjogelid

Share book
  1. 206 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Raspberry Pi for Secret Agents - Second Edition

Stefan Sjogelid

Book details
Book preview
Table of contents
Citations

Frequently asked questions

How do I cancel my subscription?
Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
Can/how do I download books?
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
What is the difference between the pricing plans?
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
What is Perlego?
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Do you support text-to-speech?
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Is Raspberry Pi for Secret Agents - Second Edition an online PDF/ePUB?
Yes, you can access Raspberry Pi for Secret Agents - Second Edition by Stefan Sjogelid in PDF and/or ePUB format, as well as other popular books in Ciencia de la computación & Sistemas operativos. We have over one million books available in our catalogue for you to explore.

Information

Raspberry Pi for Secret Agents Second Edition


Table of Contents

Raspberry Pi for Secret Agents Second Edition
Credits
About the Author
About the Reviewers
www.PacktPub.com
Support files, eBooks, discount offers, and more
Why subscribe?
Free access for Packt account holders
Preface
What this book covers
What you need for this book
Who this book is for
Conventions
Reader feedback
Customer support
Errata
Piracy
Questions
1. Getting Up to No Good
A brief history lesson on the Pi
The ins and outs of the Raspberry Pi
GPIO headers
The RCA video jack
The Audio jack
Status LEDs
USB
The Ethernet network
The CSI Camera connector
HDMI
Power
SD card
Installing the Raspbian OS on the SD card
Getting NOOBS
Formatting the SD card
Starting NOOBS
Booting up and configuring Raspbian
Basic commands to explore your Pi
Getting help with commands
Accessing the Pi over the network using SSH
Wired network setup
Wi-Fi network setup
Connecting to the Pi from Windows
Connecting to the Pi from Mac OS X or Linux
The importance of a sneaky headless setup
Keeping your system up-to-date
Backing up your SD card
Complete SD card backup in Windows
Complete SD card backup in MAC OS X
Complete SD card backup in Linux
Summary
2. Audio Antics
Configuring your audio gadgets
Introducing the ALSA sound system
Controlling the volume
Switching between HDMI and analog audio output
Testing the speakers
Preparing to record
Testing the microphone
Clipping, feedback distortion, and improving sound quality
Recording conversations for later retrieval
Writing to a WAV file
Writing to an MP3 or OGG file
Creating command shortcuts with aliases
Keep your recordings running safely with tmux
Listening in on conversations from a distance
Listening in Windows
Listening in Mac OS X or Linux
Talking to people from a distance
Talking in Windows
Talking in Mac OS X or Linux
Distorting your voice in weird and wonderful ways
Make your computer do the talking
Scheduling your audio actions
Start on power up
Scheduled start
Controlling recording length
Start recording with noise detection
Calling your fellow agents
Setting up SIP Witch
Connecting the softphones
Windows (MicroSIP)
Mac OS X (Telephone)
Linux (SFLphone)
Android (CSipSimple)
iPhone/iPad (Linphone)
Running a softphone on the Pi
Encrypting SIP Witch passwords
Setting up Linphone
Playing files with Linphone
Bonus one line sampler
Summary
3. Webcam and Video Wizardry
Setting up your camera
Meet the USB Video Class drivers and Video4Linux
Knowing your camera module
Knowing your USB webcam
Finding out your webcam's capabilities
Capturing your target on film
Viewing your camera in VLC media player
Viewing in Windows
Viewing in Mac OS X
Viewing in Linux
Recording the video stream
Recording in Windows
Recording in Mac OS X
Recording in Linux
Detecting an intruder and setting off an alarm
Creating an initial Motion configuration
Trying out Motion
Collecting the evidence
Viewing the evidence
Hooking up more cameras
Preparing a webcam stream in Windows
Preparing a webcam stream in Mac OS X
Configuring Motion for multiple input streams
Building a security monitoring wall
Watching your camera over the Internet
Turning your TV on or off using the Pi
Scheduling video recording or staging a playback scare
Summary
4. Wi-Fi Pranks – Exploring Your Network
Getting an overview of all the computers on your network
Monitoring Wi-Fi airspace with Kismet
Preparing Kismet for launch
First Kismet session
Adding sound and speech
Enabling rouge access point detection
Mapping out your network with Nmap
Finding out what the other computers are up to
How encryption changes the game
Traffic logging
Shoulder surfing in Elinks
Pushing unexpected images to browser windows
Knocking all visitors off your network
Protecting your network against Ettercap
Analyzing packet dumps with Wireshark
Running Wireshark in Windows
Running Wireshark in Mac OS X
Running Wireshark in Linux
Exploring dynamic DNS, port forwarding, and tunneling
Dynamic DNS
Choosing your domain name
Verifying your domain name
Updating your domain name
Port forwarding
Adding the forwarding rule
Verifying your port forwarding
Port forwarding security
Connected at last
Tunneling
Port tunneling in Windows
Port tunneling in Linux or Mac OS X
Creating a diversion using a chat bot
Introducing XMPP
Useful Profanity
Connecting to Facebook chat
Connecting to Google chat
Connecting to XMPP servers
Getting around Profanity
Project AgentBot
Awakening the bot
Keeping your conversations secret with encryption
Summary
5. Taking Your Pi Off-road
Keeping the Pi dry and running with housing and batteries
Setting up point-to-point networking
Creating a direct wired connection
Static IP assignment in Windows
Static IP assignment in Mac OS X
Static IP assignment in Linux
Creating an ad hoc Wi-Fi network
Connecting to an ad hoc Wi-Fi network in Windows
Connecting to an ad hoc Wi-Fi network in Mac OS X
Turning the Pi into a Wi-Fi hotspot
Tracking the ...

Table of contents