Penetration Testing with Raspberry PiIf you are looking for a low budget, small form-factor remotely accessible hacking tool, then the concepts in this book are ideal for you. If you are a penetration tester who wants to save on travel costs by placing a low-cost node on a target network, you will save thousands by using the methods covered in this book. You do not have to be a skilled hacker or programmer to use this book. It will be beneficial to have some networking experience; however, it is not required to follow the concepts covered in this book. |
Other editions - View all
Common terms and phrases
Aircrack apt-get update apt-get upgrade ARP spoofing BeEF best practice bridge0 browser C&C server captured data chapter client command line configuration connect covered create DHCP easy-creds encryption eth0 Ethernet Ettercap example exploit File Roller firewall folder following command following screenshot shows honeypot host ifconfig interface Internet IP address iptables Kali Linux ARM Kali Linux Basics KidSafe Linux ARM image login look man-in-the-middle attack menu Metasploit microSD card nmap OpenVPN operating system options packets password payload penetration testing Pi and Kali port proxy PwnBerry Pi PwnPi QEMU Raspberry Pi Raspbian reboot recommend remote router running Kali Linux scan script SD card shown shows the launch Snort social engineering SSLstrip startx stunnel sudo sudo apt-get install target tcpdump terminal window Tor network traffic TShark username victim Wi-Fi Wireshark wlan0 wordlist