-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating
Penetration Testing with Raspberry PI
The Secure Shell (SSH) gives us full access to the Kali Linux operating system on a Raspberry Pi from a remote location. It is the most common and secure way to manage Linux systems using a command line. Since the Kali Linux GUI is not needed for most penetration testing exercises, we recommend using SSH or command-line utilities whenever possible. We found some installations of Kali Linux have SSH enabled while others may need us to install the OpenSSH server:
We need to verify whether the SSH service is installed. We can do so by typing in the service --status-all command to check whether the SSH service is running. If we see +, as shown in the following screenshot, we are good to go. If we see a - sign, then we will need to install the OpenSSH server.
To install OpenSSH, we type apt-get install openssh-server:

Once the installation is complete, we can then ensure that it will be a persistent process, meaning that it will be enabled with all reboots. We do this...
Change the font size
Change margin width
Change background colour