Book Image

Penetration Testing with Raspberry PI

Book Image

Penetration Testing with Raspberry PI

Overview of this book

Table of Contents (14 chapters)
Penetration Testing with Raspberry Pi
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Disclaimer
Preface
Index

Wrapping it up with an example


Going back to our example from the beginning of the chapter, let's see how the topics covered in this chapter would apply to the real world. To recap on the situation, we had a customer with multiple international locations requiring on-site penetration testing services at an affordable price. To meet this challenge, we put together a Raspberry Pi hosting Kali Linux kit that cost us under a hundred dollars to construct per location. We sent a kit to each location and had a local person connect the Raspberry Pi to the local network. The method of connection and the tools that we ran will be covered in the next chapter.

Each local site was not aware of our service engagement, so we had to work around existing security such as firewalls configured to block outbound connections. To do this, we set up stunnel over a mail port and accessed all Raspberry Pi kits from a MacBook running Kali Linux. This gave us a centralized command and control point for each Raspberry...