SlideShare a Scribd company logo
Raspberry PI pour les agents secrets
Raspberry PI pour les
agents secrets
15 exemples d’utilisation
Fedir RYKHTIK, @FedirFR
/dev/var/4
Toulon, France
RPi
http://fr.farnell.com/raspberry-pi-accessories
Besoin d’un agent secret
● Communication avec M
● Obtenir l'information secrète
● Défendre ça propre information
● Combattre les ennemies
● Agents de deuxième plan
● Transport (voiture ultra hi-tech)
● Gadgets
Communication avec M
Talking to people from distance
● Microphone USB
● Casque
● SoX
○ sox -d -t sox - | ssh pi@[IP address] sox -q -t sox - -d
Voice transformation
● SoX
○ sox -t alsa plughw:1 -d reverb 99 50 0
■ Alpes : echo 0.8 0.9 1000 0.3
■ Sci-fi robot : flanger 30 10 0 100 10 tri 25 lin
■ Shtrumpf : pitch 500
Obtenir l'information secrète
Audio Recording
● SoX
○ alias record='sox -t alsa plughw:1 -t wav - | lame -'
○ record newrec.mp3
● tmux / screen
○ to not break the session
Audio Transmission
● Remote recording
○ ssh pi@[IP address] sox -t alsa plughw:1 -t wav - >
~/Desktop/myrec.wav
● Speak to people
○ sox -d -t sox - | ssh pi@[IP address] sox -q -t sox - -d
Recording the video stream
● VLC
○ vlc http://[IP address]:8080/?action=stream --
sout='#standard{mux=avi,dst=/home/[username]
/Desktop/myvideo.avi,access=file}'
Viewing Your webcam
● Video
○ vlc http://[IP address]:8080/?action=stream
● Audio
○ ssh pi@[IP-address] sox -t alsa plughw:1 -t sox - |
sox -q -t sox - -d
Monitoring WiFi
● Kismet
○ Wi-Fi spectrum and traffic analyzer
Analyzing packet dumps
● logging
○ sudo ettercap -q -T -i wlan0 -M arp:remote -d -w
mycapture.pcap /[Router IP]/ /[PC IP]/
● Analyzing
○ ssh pi@[IP address] cat /home/pi/kismetlogs/Kismet-
XXXX.pcapdump | wireshark -k -i -
Combattre les ennemies
Detecting an intruder
● Motion
Turning on and off a TV
● cron
● Motion
Staging a playback scare
● Assign to Motion
Traffic remplacement
● etterfilter
Ennemies réels ?
Défendre ça propre information
Protection against Ettercap
● static ARP entries
● ettercap
○ chk_poison plugin
Keeping data secret
● cryptsetup
○ crypted containers
● dosfstools
○ for Win compatibilty
Agents de deuxième plan
Raspberry PI pour les agents secrets
Raspberry PI pour les agents secrets
Transport (voiture ultra hi-tech)
RPi integration
GPS Tracking
● USB GPS receiver (projects verified with
Columbus V-800)
● gpsd
● cgps
Gadgets
Controlling PI with Your smartphone
● NetIO
● SSH client
● Coversal - Linux Remote Control
Connectivité
● Senseurs
○ Lumiere
○ Mouvement
○ Distance
● Triggers
● Relais
Livre à conseiller
Références
● http://www.tuxboard.com/gadgets-des-agents-secrets/
● http://projectsentrygun.rudolphlabs.com/
● http://www.geek.com/news/autonomous-nerf-sentry-gun-picks-its-targets-protects-your-toy-
chest-1561381/
● http://blog.kaazing.com/2013/04/01/remote-controlling-a-car-over-the-web-ingredients-
smartphone-websocket-and-raspberry-pi/
● http://www.raspberrypi.org/raspberry-pi-car-computer/
● http://oversimple.fr/alarme-de-maison-avec-un-raspberry-pi/
● http://fr.farnell.com/raspberry-pi-accessories
● http://korben.info/idees-raspberry-pi.html

More Related Content

PDF
Mikhail Belopuhov: OpenBSD: Where is crypto headed?
PDF
mmsys2019 live streaming at scale
PPTX
Qemu net netdev - nic
PDF
C from FW
PDF
tizen-oshw-tds14sh
PDF
25 Years of Linux in 5 minutes
PPTX
Introduction to Bluetooth Low Energy
Mikhail Belopuhov: OpenBSD: Where is crypto headed?
mmsys2019 live streaming at scale
Qemu net netdev - nic
C from FW
tizen-oshw-tds14sh
25 Years of Linux in 5 minutes
Introduction to Bluetooth Low Energy

Similar to Raspberry PI pour les agents secrets (20)

ODP
Rete di casa e raspberry pi - Home network and Raspberry Pi
ODP
Raspberry Pi and Amateur Radio
PDF
Having fun with Raspberry(s) and Apache projects
PDF
Asterisk WebRTC frontier: realize client SIP Phone with sipML5 and Janus Gateway
PDF
Hacking in shadows By - Raghav Bisht
PDF
Birds of a Feather 2017: 邀請分享 IoT, SDR, and Car Security - Aaron
PDF
Layer 8 and Why People are the Most Important Security Tool
PDF
Velocity 2011 - Our first DDoS attack
PPTX
Raspberry pi jam july
PDF
EBU DRW 2011 - CRC-mmbTools - Software Radio Workshop
PPTX
Incident response: Advanced Network Forensics
PDF
Don't Get Hacked on Hostile WiFi
PDF
Raspberry Pi GPIO Tutorial - Make Your Own Game Console
PDF
Filip palian mateuszkocielski. simplest ownage human observed… routers
PDF
Simplest-Ownage-Human-Observed… - Routers
PDF
LinuxCon North America: SIPPing from the Open Source Well
PDF
Asterisk WebRTC frontier: make client SIP Phone with sipML5 and Janus Gateway
PDF
[CB19] CIRCO: Cisco Implant Raspberry Controlled Operations by Emilio Couto
PDF
Deploy your own P2P network
PDF
May The Data Stay with U! Network Data Exfiltration Techniques - Brucon 2017.
Rete di casa e raspberry pi - Home network and Raspberry Pi
Raspberry Pi and Amateur Radio
Having fun with Raspberry(s) and Apache projects
Asterisk WebRTC frontier: realize client SIP Phone with sipML5 and Janus Gateway
Hacking in shadows By - Raghav Bisht
Birds of a Feather 2017: 邀請分享 IoT, SDR, and Car Security - Aaron
Layer 8 and Why People are the Most Important Security Tool
Velocity 2011 - Our first DDoS attack
Raspberry pi jam july
EBU DRW 2011 - CRC-mmbTools - Software Radio Workshop
Incident response: Advanced Network Forensics
Don't Get Hacked on Hostile WiFi
Raspberry Pi GPIO Tutorial - Make Your Own Game Console
Filip palian mateuszkocielski. simplest ownage human observed… routers
Simplest-Ownage-Human-Observed… - Routers
LinuxCon North America: SIPPing from the Open Source Well
Asterisk WebRTC frontier: make client SIP Phone with sipML5 and Janus Gateway
[CB19] CIRCO: Cisco Implant Raspberry Controlled Operations by Emilio Couto
Deploy your own P2P network
May The Data Stay with U! Network Data Exfiltration Techniques - Brucon 2017.
Ad

More from Fedir RYKHTIK (10)

PDF
DDD17 - Web Applications Automated Security Testing in a Continuous Delivery...
PDF
TYPO3 as Mobile Application Management System
PDF
Intro docker
PDF
Monolithic installs VS single responsibilities networks
PDF
Building websites with TYPO3 Neos
PDF
StealMyData App
PDF
DevOps for TYPO3 Teams and Projects
PDF
Vagrant
PDF
TYPO3 as Things Management System
PDF
Comparision of CMS : Improving TYPO3 functionality
DDD17 - Web Applications Automated Security Testing in a Continuous Delivery...
TYPO3 as Mobile Application Management System
Intro docker
Monolithic installs VS single responsibilities networks
Building websites with TYPO3 Neos
StealMyData App
DevOps for TYPO3 Teams and Projects
Vagrant
TYPO3 as Things Management System
Comparision of CMS : Improving TYPO3 functionality
Ad

Recently uploaded (20)

PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPT
Teaching material agriculture food technology
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
A Presentation on Artificial Intelligence
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
Electronic commerce courselecture one. Pdf
PPTX
Machine Learning_overview_presentation.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Advanced methodologies resolving dimensionality complications for autism neur...
Teaching material agriculture food technology
Programs and apps: productivity, graphics, security and other tools
A comparative analysis of optical character recognition models for extracting...
Per capita expenditure prediction using model stacking based on satellite ima...
A Presentation on Artificial Intelligence
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
20250228 LYD VKU AI Blended-Learning.pptx
cuic standard and advanced reporting.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Machine learning based COVID-19 study performance prediction
Electronic commerce courselecture one. Pdf
Machine Learning_overview_presentation.pptx
Unlocking AI with Model Context Protocol (MCP)
NewMind AI Weekly Chronicles - August'25-Week II
sap open course for s4hana steps from ECC to s4
Spectral efficient network and resource selection model in 5G networks
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows

Raspberry PI pour les agents secrets