Book Image

Penetration Testing with Raspberry Pi - Second Edition

By : Michael McPhee, Jason Beltrame
Book Image

Penetration Testing with Raspberry Pi - Second Edition

By: Michael McPhee, Jason Beltrame

Overview of this book

This book will show you how to utilize the latest credit card sized Raspberry Pi 3 and create a portable, low-cost hacking tool using Kali Linux 2. You’ll begin by installing and tuning Kali Linux 2 on Raspberry Pi 3 and then get started with penetration testing. You will be exposed to various network security scenarios such as wireless security, scanning network packets in order to detect any issues in the network, and capturing sensitive data. You will also learn how to plan and perform various attacks such as man-in-the-middle, password cracking, bypassing SSL encryption, compromising systems using various toolkits, and many more. Finally, you’ll see how to bypass security defenses and avoid detection, turn your Pi 3 into a honeypot, and develop a command and control system to manage a remotely-placed Raspberry Pi 3. By the end of this book you will be able to turn Raspberry Pi 3 into a hacking arsenal to leverage the most popular open source toolkit, Kali Linux 2.0.
Table of Contents (13 chapters)
Penetration Testing with Raspberry Pi - Second Edition
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Preface

Setting up the wireless interface


With wireless now supported with the inclusion of an IEEE 802.11n transceiver, we can now take advantage of the inherent support Kali offers for this. Many commercial tools, such as the Pineapple from HACK5®, take advantage of wireless hacks and we will see how many are possible with the Raspberry Pi 3 later in this book. Because Kali Linux supports it out of the box, we should be able to see that it's available without any effort on our part and can check settings and detection using the iwconfig command:

We did not pre-configure anything here. If we wanted to use this as our primary interface for connectivity, we could configure it with all of the default information we'd need to attach to and use a network, or if using the Xfce desktop (logged in locally or via RDP or VNC) we could use the Network Management tool to select a wireless network to attach to.

As we are penetration testing and wireless is a very likely means by which to exploit the target...