Book Image

Penetration Testing with Raspberry PI

Book Image

Penetration Testing with Raspberry PI

Overview of this book

Table of Contents (14 chapters)
Penetration Testing with Raspberry Pi
About the Authors
About the Reviewers

Chapter 4. Raspberry Pi Attacks

In the previous chapters, we learned how to set up a Raspberry Pi for penetration testing. The steps included installing Kali Linux, establishing access to a target network, and performing basic reconnaissance. In this chapter, we will focus on attacking targets once your Raspberry Pi has established a foothold on a network. The topics include compromising systems, setting up social engineering attacks, exploiting Internet browsers, and developing a rogue access using tools that are available in Kali Linux. Some of the tools that will be covered are preinstalled on the Kali Linux ARM image; however, we recommend that you use the apt-get command to download the newest versions as well as update them regularly.

In this chapter, we will cover the following topics:

  • Exploiting a target

  • Metasploit

  • Social engineering

  • The Social-Engineer Toolkit

  • Phishing with BeEF

  • Rogue access honeypots

  • Easy-creds


The Raspberry Pi has limited performance capabilities due to its size and...