Book description
Turn your Raspberry Pi into a secret agent toolbox with this set of exciting projects
About This Book
- Turn your Raspberry Pi into a multi-purpose secret agent gadget for audio and video surveillance, Wi-Fi exploration, or playing pranks on your friends
- Detect an intruder on camera or with sensors and set off an alarm or receive messages to your phone
- Find out what the other computers on your network are up to and make yourself anonymous on the Internet
- This book has been updated for new additions to your toolkit featuring the tiny, recently released Raspberry Pi Zero board
Who This Book Is For
This book is for those who are new to the Raspberry Pi Zero ,Raspberry Pi 2 or Raspberry Pi 3 and have some experience with the original Raspberry Pi models, and even for those budding secret agents who would like to use Pi Zero as a secret agent toolbox. No programming experience is assumed. Suitable for the novice and expert alike, each topic provides a fast and easy way to get started with exciting applications, with practical examples in every chapter.
What You Will Learn
- Install and configure the Raspbian Jessie operating system for maximum mischief
- Detect an intruder with motion detection or a laser trip wire and set off an alarm
- Listen in to conversations from a distance over Bluetooth
- Distort your voice in weird and wonderful ways
- Track the Pi's whereabouts using GPS
- Connect your Pi to the mobile Internet using a 3G dongle and make yourself anonymous on the net
- Display secret messages and codes to fellow agents on a LED display
In Detail
This book is for all mischievous Raspberry Pi owners who'd like to see their computer transform into a neat spy gadget to be used in a series of practical pranks and projects. No previous skills are required to follow along, and if you're completely new to Linux, you'll pick up much of the basics for free.
We'll help you set up your Raspberry Pi Zero , Raspberry Pi 2 and Raspberry Pi 3 and guide you through a number of pranks and secret agent techniques that are so inconspicuous yet high on mischief. You'll learn how to configure your operating system for maximum mischief and start exploring audio, video, or Wi-Fi techniques. We'll show you how to record, listen, or talk to people from a distance and how to set up your own phone network. Then, you'll plug in your webcam and set up a motion detector with an alarm and find out what the other computers on your Wi-Fi network are up to. Once you've mastered the techniques, we'll combine them with a battery pack and GPS for the ultimate off-road spy kit.
Style and Approach
This easy-to-follow guide is for budding secret agents who want to create tools for mischief, stealth, and reconnaissance. It's full of fun, practical examples and easy-to-follow recipes, guaranteeing maximum mischief for all skill levels.
Publisher resources
Table of contents
-
Raspberry Pi for Secret Agents - Third Edition
- Raspberry Pi for Secret Agents - Third Edition
- Credits
- About the Author
- About the Reviewer
- www.PacktPub.com
- Preface
- 1. Getting up to No Good
-
2. Audio Antics
- Configuring your audio gadgets
- Recording conversations for later retrieval
- Making a covert wearable recorder with Pi Zero
- Listening in on conversations from a distance
- Listening in over Bluetooth
- Talking to people from a distance
- Distorting your voice in weird and wonderful ways
- Make your computer do the talking
- Scheduling your audio actions
- Calling your fellow agents
- Using your voice to control things
- Bonus one-line sampler
- Summary
-
3. Webcam and Video Wizardry
- Meet the USB Video Class drivers and Video4Linux
-
Raspberry Pi Camera Module
- Connecting the camera module
- Setting up the camera module
- Using USB cameras
- Connecting the webcam
- Finding out your webcam's capabilities
- Capturing your target on film
- Viewing your camera in VLC media player
- Detecting an intruder and setting off an alarm
- Hooking up more cameras
- Watching your camera over the Internet
- Night vision
- Make a covert wearable recorder with Pi Zero
- Turning your TV on or off using the Pi
- Summary
-
4. Wi-Fi Pranks – Exploring Your Network
- Getting an overview of all the computers on your network
- Finding out what the other computers are up to
- Pushing unexpected images to browser windows
- Knocking all visitors off your network
- Protecting your network against Ettercap
- Analyzing packet dumps with Wireshark
- Creating a diversion using a chat bot
- Keeping your conversations secret with encryption
- Summary
-
5. Taking Your Pi Off-Road
- Keeping the Pi dry and running with housing and batteries
- Setting up point-to-point networking
- Turning the Pi into a Wi-Fi hotspot
- Connecting the Pi to the mobile Internet
- Be anonymous on the Internet
- Tracking the Pi's whereabouts using GPS
- Controlling the Pi with your smartphone
- Receiving status updates from the Pi
- Accessing your files from anywhere with Dropbox
- Keeping your data secret with encryption
- Erasing the Pi should it fall into the wrong hands
- Jam the airwaves with a Pi Zero
- Summary
-
6. Detecting and Protecting Against Your Enemies
- Say hello to the GPIO
- Building a laser trip wire
- Sending alerts to your phone using SMS
- Use your phone as an access control device
- Displaying secret codes and messages
- Better security with a true random number generator
- Summary
- Graduation
Product information
- Title: Raspberry Pi for Secret Agents - Third Edition
- Author(s):
- Release date: July 2016
- Publisher(s): Packt Publishing
- ISBN: 9781786463548
You might also like
book
Python Crash Course, 2nd Edition
This is the second edition of the best selling Python book in the world. Python Crash …
video
Python Fundamentals
45+ hours of video instruction. Overview The professional programmer’s Deitel® video guide to Python development with …
video
Learn Python and Ethical Hacking from Scratch
Start from scratch and progress to mastering Python and ethical hacking simultaneously by writing 20+ hacking …
book
Ethical Hacking
A crash course in modern hacking techniques, Ethical Hacking is already being used to prepare the …