Book description
Construct a hacking arsenal for penetration testers or hacking enthusiasts using Kali Linux on a Raspberry Pi
In Detail
The Raspberry Pi is a low-cost credit-card sized computing system that can be customized for just about anything including penetration testing. Raspberry Pi is the best known platform not because it is cheap but because it is very powerful. Kali is a pentesting/security auditing Linux distribution. Kali Linux has many penetration-testing programs, including nmap (a port scanner), Wireshark (a packet analyzer), John the Ripper (a password cracker), Aircrack-ng (a software suite for the penetration-testing of wireless LANs), and Burp suite and OWASP ZAP (both web application security scanners).
This book covers how to turn a Raspberry Pi into a hacking arsenal to leverage the most popular open source toolkit, Kali Linux. You will learn how to use various tools to breach networks and steal data.
What You Will Learn
Install and tune Kali Linux on a Raspberry Pi for hacking
Use a Raspberry Pi for pentests such as breaking wireless security, scanning networks, and capturing sensitive data
Perform man-in-the-middle attacks and bypass SSL encryption
Compromise systems using various exploits and toolkits
Bypass security defenses and remove data off a target network
Develop a command and control system to manage remotely placed Raspberry Pis
Turn a Raspberry Pi into a honeypot to capture sensitive information
Grasp professional penetration testing through proper documentation
Table of contents
-
Penetration Testing with Raspberry Pi
- Table of Contents
- Penetration Testing with Raspberry Pi
- Credits
- About the Authors
- About the Reviewers
- www.PacktPub.com
- Disclaimer
- Preface
- 1. Raspberry Pi and Kali Linux Basics
-
2. Preparing the Raspberry Pi
- Raspberry Pi use cases
- The Command and Control server
- Preparing for a penetration test
- Overclocking
- Setting up wireless cards
- Setting up a 3G USB modem with Kali Linux
- Setting up the SSH service
- SSH default keys and management
- Reverse shell through SSH
- Stunnel
- Installing a Stunnel client
- Wrapping it up with an example
- Summary
- 3. Penetration Testing
- 4. Raspberry Pi Attacks
- 5. Ending the Penetration Test
- 6. Other Raspberry Pi Projects
- Index
Product information
- Title: Penetration Testing with Raspberry Pi
- Author(s):
- Release date: January 2015
- Publisher(s): Packt Publishing
- ISBN: 9781784396435
You might also like
book
Penetration Testing with Raspberry Pi - Second Edition
Learn the art of building a low-cost, portable hacking arsenal using Raspberry Pi 3 and Kali …
book
Penetration Testing with the Bash shell
Make the most of the Bash shell and Kali Linux's commandlinebased security assessment tools In Detail …
book
Raspberry Pi Zero Cookbook
Over 80 practical and interesting recipes that explore the plethora of functionalities and opportunities available with …
book
Kali Linux Wireless Penetration Testing Beginner's Guide - Third Edition
Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition presents wireless pentesting from the ground up, …