Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.
Please read the tutorial at this link: https://ebookbell.com/faq
We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.
For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.
EbookBell Team
0.0
0 reviewsISBN 10: 1784396435
ISBN 13: 9781784396435
Author: Joseph Muniz, Aamir Lakhani
Book Description
If you are looking for a low budget, small form-factor remotely accessible hacking tool, then the concepts in this book are ideal for you. If you are a penetration tester who wants to save on travel costs by placing a low-cost node on a target network, you will save thousands by using the methods covered in this book. You do not have to be a skilled hacker or programmer to use this book. It will be beneficial to have some networking experience; however, it is not required to follow the concepts covered in this book.
What you will learn
Install and tune Kali Linux on a Raspberry Pi for hacking
Use a Raspberry Pi for pentests such as breaking wireless security, scanning networks, and capturing sensitive data
Perform maninthemiddle attacks and bypass SSL encryption
Compromise systems using various exploits and toolkits
Bypass security defenses and remove data off a target network
Develop a command and control system to manage remotely placed Raspberry Pis
Turn a Raspberry Pi into a honeypot to capture sensitive information
Grasp professional penetration testing through proper documentation
Who this book is for
If you are looking for a low budget, small form-factor remotely accessible hacking tool, then the concepts in this book are ideal for you. If you are a penetration tester who wants to save on travel costs by placing a low-cost node on a target network, you will save thousands by using the methods covered in this book. You do not have to be a skilled hacker or programmer to use this book. It will be beneficial to have some networking experience; however, it is not required to follow the concepts covered in this boo
1. Raspberry Pi and Kali Linux Basics
Purchasing a Raspberry Pi
Assembling a Raspberry Pi
Preparing a microSD card
Installing Kali Linux
Combining Kali Linux and Raspberry Pi
Pros and cons of the Raspberry Pi
Raspberry Pi penetration testing use cases
Cloning the Raspberry Pi SD card
Avoiding common problems
Summary
2. Preparing the Raspberry Pi
Raspberry Pi use cases
The Command and Control server
Preparing for a penetration test
Overclocking
Setting up wireless cards
Setting up a 3G USB modem with Kali Linux
Setting up the SSH service
SSH default keys and management
Reverse shell through SSH
Stunnel
Installing a Stunnel client
Wrapping it up with an example
Summary
3. Penetration Testing
Network scanning
Nmap
Wireless security
Cracking WPA/WPA2
Creating wordlists
Capturing traffic on the network
Tcpdump
Man-in-the-middle attacks
Getting data to the Pi
ARP spoofing
Ettercap
Ettercap command line
Driftnet
Tuning your network capture
Scripting tcpdump for future access
Wireshark
Capturing a WordPress password example
TShark
Beating HTTPS with SSLstrip
Launching an SSLstrip attack
Summary
4. Raspberry Pi Attacks
Exploiting a target
Metasploit
Creating your own payloads with Metasploit
Wrapping payloads
Social engineering
The Social-Engineer Toolkit
Phishing with BeEF
Rogue access honeypots
Easy-creds
Summary
5. Ending the Penetration Test
Covering your tracks
Wiping logs
Masking your network footprint
Proxychains
Resetting the Raspberry Pi to factory settings
Remotely corrupting Kali Linux
Developing reports
Creating screenshots
ImageMagick
Shutter
Compressing files
Zip/Unzip
File Roller
Split
Summary
6. Other Raspberry Pi Projects
PwnPi
Raspberry Pwn
PwnBerry Pi
Defending your network
Intrusion detection and prevention
Snort
Content filter
KidSafe
Remote access with OpenVPN
Tor relays and routers
Raspberry Tor
Tor router
Running Raspberry Pi on your PC with QEMU emulator
Other Raspberry Pi uses
Flight tracking using PiAware
PiPlay
PrivateEyePi
More uses
Summary
Index
penetration testing with raspberry pi
penetration testing with raspberry pi pdf
can penetration testing be automated
fuzz testing vs penetration testing
security testing with raspberry pi
Tags: Joseph Muniz, Aamir Lakhani, Penetration, Raspberry