Chapter 4. Raspberry Pi Attacks

In the previous chapters, we learned how to set up a Raspberry Pi for penetration testing. The steps included installing Kali Linux, establishing access to a target network, and performing basic reconnaissance. In this chapter, we will focus on attacking targets once your Raspberry Pi has established a foothold on a network. The topics include compromising systems, setting up social engineering attacks, exploiting Internet browsers, and developing a rogue access using tools that are available in Kali Linux. Some of the tools that will be covered are preinstalled on the Kali Linux ARM image; however, we recommend that you use the apt-get command to download the newest versions as well as update them regularly.

In ...

Get Penetration Testing with Raspberry Pi now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.