Book Image

Penetration Testing with Raspberry PI

Book Image

Penetration Testing with Raspberry PI

Overview of this book

Table of Contents (14 chapters)
Penetration Testing with Raspberry Pi
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Disclaimer
Preface
Index

The Command and Control server


As we have stated in other chapters, the Raspberry Pi is not a powerful machine. To overcome this weakness, it is best practice to capture data in a controlled manner or leverage offline computing when using Kali Linux on a Raspberry Pi. We found that not doing so would either overwhelm the processors when using most of the attack tools or quickly consume the limited local storage space when viewing captured data. We will cover filtering captured data in Chapter 3, Penetration Testing, under the Tuning your network capture section.

When planning to remotely access multiple Raspberry Pi systems, we recommend setting up a central Command and Control (C&C) server rather than accessing each box individually. The C&C server should be a more powerful system such as a traditional server so it can focus on CPU intensive tasks such as breaking passwords through brute force. More importantly, tasks can also include using the C&C server to perform the actual...