Book Image

Penetration Testing with Raspberry Pi - Second Edition

By : Michael McPhee, Jason Beltrame
Book Image

Penetration Testing with Raspberry Pi - Second Edition

By: Michael McPhee, Jason Beltrame

Overview of this book

This book will show you how to utilize the latest credit card sized Raspberry Pi 3 and create a portable, low-cost hacking tool using Kali Linux 2. You’ll begin by installing and tuning Kali Linux 2 on Raspberry Pi 3 and then get started with penetration testing. You will be exposed to various network security scenarios such as wireless security, scanning network packets in order to detect any issues in the network, and capturing sensitive data. You will also learn how to plan and perform various attacks such as man-in-the-middle, password cracking, bypassing SSL encryption, compromising systems using various toolkits, and many more. Finally, you’ll see how to bypass security defenses and avoid detection, turn your Pi 3 into a honeypot, and develop a command and control system to manage a remotely-placed Raspberry Pi 3. By the end of this book you will be able to turn Raspberry Pi 3 into a hacking arsenal to leverage the most popular open source toolkit, Kali Linux 2.0.
Table of Contents (13 chapters)
Penetration Testing with Raspberry Pi - Second Edition
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Preface

Network scanning


When we scan a network and its attached hosts, we are typically looking for open doors on the systems and infrastructure devices we happened to notice through predominantly passive scanning tools such as Maltego. Active scanning becomes more focused and is more likely to trip alerts, so we'll need to tread carefully and use the tools with discretion to ensure we do not draw attention. One of the preeminent tools in this realm is nmap, and we'll soon see why its power and myriad of options and tweaks have made it a favorite for cyber security professionals and criminals alike for many years.

Unlike Maltego, this tool makes a lot of sense for use on the Raspberry Pi 3 versus the C&C server, as inside traffic is often under less scrutiny and it is a command-line tool. Companies tend to spend their money and time worrying about their Internet Edge perimeter to limit outside access and neglect the policing of their interior communications, as gaining visibility throughout...