Book Image

Penetration Testing with Raspberry PI

Book Image

Penetration Testing with Raspberry PI

Overview of this book

Table of Contents (14 chapters)
Penetration Testing with Raspberry Pi
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Disclaimer
Preface
Index

Preparing for a penetration test


The Kali Linux ARM image we covered in Chapter 1, Raspberry Pi and Kali Linux Basics, has already been optimized for a Raspberry Pi. We found however that it is recommended to perform a few additional steps to ensure you are using Kali Linux in the most stable mode to avoid crashing the Raspberry Pi. The steps are as follows:

  1. The first recommended step is to perform the OS updates as described in detail in Chapter 1, Raspberry Pi and Kali Linux Basics. We won't repeat the steps here, so if you have not updated your OS, please go back to Chapter 1, Raspberry Pi and Kali Linux Basics, and follow the instructions.

  2. The next step you should perform is to properly identify your Raspberry Pi. The Kali Linux image ships with a generic hostname. To change the hostname, use the vi editor (although feel free to use any editor of your choice; even if you are a fan of nano, we won't judge you much) with the vi /etc/hostname command as shown in the following screenshot:

    The...