Summary

In this chapter, we talked about the different phases of a penetration test using the Penetration test Kill Chain model. Using this model, we were also able to map some of the Kali Linux tools we will be using to the appropriate stage in the Penetration test Kill Chain. We also talked about these various security tools, and which ones come with the different types of meta-packages that are available on Kali Linux. Outside of these bundles of tools, we discussed some of the additional security tools/utilities that are not part of these packages that we find to be useful in a wide variety of penetration testing scenarios and were used in this book.

Finally, we looked at not only how to prepare for a penetration test, but also how and where ...

Get Penetration Testing with Raspberry Pi - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.