Construct a hacking arsenal for penetration testers or hacking enthusiasts using Kali Linux on a Raspberry Pi
The Raspberry Pi is a low-cost credit-card sized computing system that can be customized for just about anything including penetration testing. Raspberry Pi is the best known platform not because it is cheap but because it is very powerful. Kali is a pentesting/security auditing Linux distribution. Kali Linux has many penetration-testing programs, including nmap (a port scanner), Wireshark (a packet analyzer), John the Ripper (a password cracker), Aircrack-ng (a software suite for the penetration-testing of wireless LANs), and Burp suite and OWASP ZAP (both web application security scanners).
This book covers how to turn a Raspberry Pi into a hacking arsenal to leverage the most popular open source toolkit, Kali Linux. You will learn how to use various tools to breach networks and steal data.
What You Will Learn
Install and tune Kali Linux on a Raspberry Pi for hacking
Use a Raspberry Pi for pentests such as breaking wireless security, scanning networks, and capturing sensitive data
Perform man-in-the-middle attacks and bypass SSL encryption
Compromise systems using various exploits and toolkits
Bypass security defenses and remove data off a target network
Develop a command and control system to manage remotely placed Raspberry Pis
Turn a Raspberry Pi into a honeypot to capture sensitive information
Grasp professional penetration testing through proper documentation
Downloading the example code for this book. You can download the example code files for all Packt books you have purchased from your account at http://www.PacktPub.com. If you purchased this book elsewhere, you can visit http://www.PacktPub.com/support and register to have the files e-mailed directly to you.