Book Image

Penetration Testing with Raspberry PI

Book Image

Penetration Testing with Raspberry PI

Overview of this book

Table of Contents (14 chapters)
Penetration Testing with Raspberry Pi
About the Authors
About the Reviewers

Chapter 3. Penetration Testing

Until this point, we have covered how to build a Raspberry Pi, install Kali Linux, and prepare your Raspberry Pi for a penetration test through various forms of remote access techniques. Now you are ready to learn how to use the Raspberry Pi to capture data on a target network. This chapter will provide you with various LAN- and wireless-based attack scenarios, using tools found in Kali Linux that are optimized for a Raspberry Pi or tools that you can download using the apt-get command. There are other tools that are available in Kali Linux as well as online; however, we will focus on applications that we have found to function properly on a Raspberry Pi.

The following topics will be covered in this chapter:

  • Network scanning

  • Nmap

  • Wireless security

  • Cracking WPA/WPA2

  • Creating wordlists

  • Capturing traffic on the network

  • Getting data to the Pi

  • Tuning your network capture

  • Scripting tcpdump for future access

  • Wireshark and TShark

  • Beating HTTPS with SSLstrip


The Raspberry Pi...