In the first edition of the book, the Raspberry Pi B+ was used, constrained by a single core and running at much lower speeds, even with overclocking. With the Raspberry Pi 3 used in this book, we now have four cores running over 1 GHz and four times more RAM to work with, so the Pi itself can certainly handle more tools and workload. That being said, it is still advisable that we budget our resources and leverage offline computing wherever possible, as more involved penetration testing can benefit from multiple sensors (Pis) and higher powered computing to correlate data effectively. We will cover tuning filtering captured data in Chapter 5, Taking Action – Intrude and Exploit.
When planning to remotely access multiple Raspberry Pi systems, we recommend setting up a central (C&C or C2Command and Control (C&C or C2) server rather than accessing each box individually. The C&C server will probably be a more powerful system so it can focus on CPU-intensive...