Reverse shell through SSH

The small form factor of the Raspberry Pi makes it an awesome platform for concealed or otherwise inconspicuous deployment inside the customer's environment. Many organizations have security measures in place to block incoming connections with the goal of preventing backdoors into their network. In a white-box assessment, we may be explicitly able to open up a Firewall to permit SSH to our Raspberry Pi, as shown in the following image. The bad news is even if this is possible from a policy standpoint, it may be difficult to achieve when dealing with multiple sites under multiple administrative controls. Either way, breaking through perimeter defenses as step 1 of a penetration test, however, makes a lot of noise and will ...

Get Penetration Testing with Raspberry Pi - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.