Chapter 2. Preparing for Battle
Despite the massive improvements the Raspberry Pi 3 makes over its predecessors, it should still be considered an underpowered platform for security assessments. That being said, it is designed as a low-cost, ultra-portable computer primarily targeting educators and hobbyists. That gives it an advantage in covert, on-site penetration testing and other discreet engagements. Our focus for this chapter will be on how to prepare a Raspberry Pi (or other platforms) running Kali Linux for the management access and connectivity it will need during all phases of a penetration test.
We'll cover the following topics in this chapter:
- Using a Command and Control server
- Preparing for a penetration test
- Setting up the SSH service ...
Get Penetration Testing with Raspberry Pi - Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.