Book Image

Penetration Testing with Raspberry PI

Book Image

Penetration Testing with Raspberry PI

Overview of this book

Table of Contents (14 chapters)
Penetration Testing with Raspberry Pi
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Disclaimer
Preface
Index

Summary


This last chapter provided additional tools and use cases for using a Raspberry Pi. We briefly covered some alternative penetration testing arsenals to Kali Linux, but believe Kali Linux should see the most innovation based on its popularity in the IT community. We also touched upon ARM images that can be used for defensive purposes such as firewalls, IPS/IDS, and VPN. We closed with some fun ARM images that are not necessarily security-related, but cool regardless.

This wraps up this book. Hopefully, you enjoyed reading it. We would love to hear from you. Feel free to reach us on our respective blogs and share your thoughts. Aamir Lakhani can be reached at www.drchaos.com and Joseph Muniz can be reached at www.thesecurityblogger.com. We had a ton of fun working through the topics covered and wish you the best with your Raspberry Pi experience. That includes those looking to do good or evil with this new knowledge. Aamir really wanted to close with the Spiderman quote about responsibility...