Book Image

Penetration Testing with Raspberry PI

Book Image

Penetration Testing with Raspberry PI

Overview of this book

Table of Contents (14 chapters)
Penetration Testing with Raspberry Pi
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Disclaimer
Preface
Index

Chapter 6. Other Raspberry Pi Projects

The Raspberry Pi was designed to be a system that can be customized for just about anything within the reach of a low budget OS. There are hundreds of documented use cases and many vendors posting ARM images scaled down to be part of the Raspberry Pi community. This includes creators of other penetration arsenals outside of Offensive Security's Kali Linux.

When evaluating other penetration testing ARM images for the Raspberry Pi, we found that most of the distributions were very similar to each other because they are using the same tools, and in many instances, the same builds. This means the upgrade life cycle and path for most applications will also be the same regardless of the ARM image you choose to go with. At the end of the day, you will need to pick a distribution that makes the most sense for you. If you are not sure what that is, then don't worry, it is Kali Linux.

The following topics will be covered in this chapter:

  • PwnPi

  • Raspberry Pwn

  • PwnBerry...