Book Image

Penetration Testing with Raspberry Pi - Second Edition

By : Michael McPhee, Jason Beltrame
Book Image

Penetration Testing with Raspberry Pi - Second Edition

By: Michael McPhee, Jason Beltrame

Overview of this book

This book will show you how to utilize the latest credit card sized Raspberry Pi 3 and create a portable, low-cost hacking tool using Kali Linux 2. You’ll begin by installing and tuning Kali Linux 2 on Raspberry Pi 3 and then get started with penetration testing. You will be exposed to various network security scenarios such as wireless security, scanning network packets in order to detect any issues in the network, and capturing sensitive data. You will also learn how to plan and perform various attacks such as man-in-the-middle, password cracking, bypassing SSL encryption, compromising systems using various toolkits, and many more. Finally, you’ll see how to bypass security defenses and avoid detection, turn your Pi 3 into a honeypot, and develop a command and control system to manage a remotely-placed Raspberry Pi 3. By the end of this book you will be able to turn Raspberry Pi 3 into a hacking arsenal to leverage the most popular open source toolkit, Kali Linux 2.0.
Table of Contents (13 chapters)
Penetration Testing with Raspberry Pi - Second Edition
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Preface

Driftnet


One utility that is used to see images captured during a man-in-the-middle attack is a program called Driftnet. There are better ways to find more interesting data; however, Driftnet can be useful if we are focusing on viewing images. Driftnet does not come preinstalled on Kali Linux ARM. We can download it by using the following command:

aptget install driftnet

Once installed, use the driftnet-i eth0 command to run it. This will open up a new terminal window that will be blank. Any images seen by a victim during the MITM attack will start populating in this window.

The following screenshot shows a host accessing www.cisco.com while Driftnet is capturing images:

W3af

The W3af is a web application auditing and attack framework. W3af is designed to identify and exploit any found vulnerabilities for the target host. Some have called this tool the Metaspoit of web applications, which definitely got us curious.

There is a graphical-based tool as well as a CLI-based tool. We had some issues...