Have a personal or library account? Click to login
Penetration Testing with Raspberry PI Cover

Penetration Testing with Raspberry PI

Construct a hacking arsenal for penetration testers or hacking enthusiasts using Kali Linux on a Raspberry Pi

Paid access
|Feb 2015
Product purchase options

Key Features

    Book Description

    If you are looking for a low budget, small form-factor remotely accessible hacking tool, then the concepts in this book are ideal for you. If you are a penetration tester who wants to save on travel costs by placing a low-cost node on a target network, you will save thousands by using the methods covered in this book. You do not have to be a skilled hacker or programmer to use this book. It will be beneficial to have some networking experience; however, it is not required to follow the concepts covered in this book.

    What you will learn

    • Install and tune Kali Linux on a Raspberry Pi for hacking
    • Use a Raspberry Pi for pentests such as breaking wireless security, scanning networks, and capturing sensitive data
    • Perform maninthemiddle attacks and bypass SSL encryption
    • Compromise systems using various exploits and toolkits
    • Bypass security defenses and remove data off a target network
    • Develop a command and control system to manage remotely placed Raspberry Pis
    • Turn a Raspberry Pi into a honeypot to capture sensitive information
    • Grasp professional penetration testing through proper documentation

    Who this book is for

    If you are looking for a low budget, small form-factor remotely accessible hacking tool, then the concepts in this book are ideal for you. If you are a penetration tester who wants to save on travel costs by placing a low-cost node on a target network, you will save thousands by using the methods covered in this book. You do not have to be a skilled hacker or programmer to use this book. It will be beneficial to have some networking experience; however, it is not required to follow the concepts covered in this book.

    Table of Contents

    1. Raspberry Pi And Kali Linux Basics
    2. Preparing the Raspberry Pi
    3. Penetration testing
    4. Raspberry Pi attacks
    5. Ending the penetration test
    6. Other Raspberry Pi Projects
    PDF ISBN: 978-1-78439-412-7
    Publisher: Packt Publishing Limited
    Copyright owner: © 2015 Packt Publishing Limited
    Publication date: 2015
    Language: English
    Pages: 208