The Raspberry Pi should be considered an underpowered platform for security assessments. This is because it has been designed as a low-cost, portable computer primarily targeting educationalists and hobbyists. This open platform may be limited in computing power, but it does provide many powerful use cases that security professionals can leverage for penetration testing and other service engagements. The focus of this chapter will be on how to prepare a Raspberry Pi running Kali Linux (or other platforms) for a penetration test.
The following topics will be covered in this chapter:
Raspberry Pi use cases
The Command and Control server
Preparing for a penetration test
Overclocking
Setting up wireless cards
Setting up a 3G USB modem with Kali Linux
Setting up the SSH service
SSH default keys and management
Reverse shell through SSH
Stunnel
Wrapping up with an example