Index
A
- Access Point (AP) / Easy-creds
- Access Point Name (APN)
- Address Resolution Protocol (ARP)
- about / Getting data to the Pi
- Aircrack
- used, for cracking WPA/WPA2 / Cracking WPA/WPA2
- about / Cracking WPA/WPA2
- ARP spoofing
- about / ARP spoofing
- Automatic Dependent Surveillance-Broadcast (ADS-B) system
- about / Flight tracking using PiAware
B
- BeEF
- about / Phishing with BeEF
- phishing with / Phishing with BeEF
- black-box testing
- about / Raspberry Pi use cases
- blacklists
- URL / KidSafe
- bleeding-edge repos
- about / The Social-Engineer Toolkit
C
- CanaKit Wi-Fi adapter
- about / Purchasing a Raspberry Pi
- Certificate Authority (CA) certificate
- building / Remote access with OpenVPN
- Certificate Signing Request (CSR)
- about / Remote access with OpenVPN
- clearev / Wiping logs
- ClearLogs
- download link / Wiping logs
- Command and Control (C&C) server
- about / The Command and Control server
- command line, Ettercap
- used, for capturing data / Ettercap command line
- content filter
- about / Content filter
- KidSafe / KidSafe
- Custom Wordlist Generator (CeWL)
- about / Creating wordlists
D
- data
- capturing, to Raspberry Pi / Getting data to the Pi
- capturing, with ARP spoofing / ARP spoofing
- capturing, with Ettercap / Ettercap
- capturing, Ettercap command line used / Ettercap command line
- database / Metasploit
- Data Loss Prevention (DLP) technology / Compressing files
- Debian distribution
- URL, for downloading / PwnBerry Pi
- Demilitarized Zone (DMZ)
- about / Raspberry Tor
- Denial of Service (DoS)
- about / Remote access with OpenVPN
- DHCP snooping
- about / Ettercap
- Driftnet
- about / Driftnet
- Dynamic ARP Inspection
- about / Ettercap
- Dynamic Host Configuration Protocol (DHCP)
- about / KidSafe
- Dynamic Host Configuration Protocol (DHCP) spoofing / Easy-creds
E
- easy-creds
- about / Easy-creds
- download link / Easy-creds
- installing / Easy-creds
- Ettercap
- about / Ettercap
- used, for capturing data / Ettercap
- URL / Ettercap
- command line, used for capturing data / Ettercap command line
- exploits / Metasploit
- active exploits / Metasploit
- passive exploits / Metasploit
F
- File Roller
- about / File Roller
- FlightAware
- FTP server
- URL, for setting up / Cracking WPA/WPA2
G
- 3G USB modem
- setting up, with Kali Linux / Setting up a 3G USB modem with Kali Linux
- General-purpose input/output (GPIO)
- about / Purchasing a Raspberry Pi
- Graphical User Interface (GUI)
- about / Installing Kali Linux
H
- Hash-based Message Authentication Code (HMAC)
- about / Remote access with OpenVPN
- Home Monitor system
- about / PrivateEyePi
- alarm, triggering / PrivateEyePi
- honeypot
- about / Rogue access honeypots
- production honeypot / Rogue access honeypots
- monitoring honeypot / Rogue access honeypots
- hostapt.conf file
- about / Tor router
- URL / Tor router
- hostport
- about / Reverse shell through SSH
- HTTPS
- defeating, with SSLstrip / Beating HTTPS with SSLstrip
- HTTP Strict Transport Security (HSTS)
- about / Beating HTTPS with SSLstrip
I
- ifconfig wlan0 command
- about / Setting up wireless cards
- ImageMagick
- about / ImageMagick
- installation, Kali Linux / Installing Kali Linux
- installation, KidSafe
- about / KidSafe
- installation, OpenSSH server
- about / Setting up the SSH service
- installation, OpenVPN
- about / Remote access with OpenVPN
- installation, PiPlay
- about / PiPlay
- installation, PwnBerry Pi
- about / PwnBerry Pi
- installation, PwnPi
- about / PwnPi
- installation, Raspberry Pwn
- about / Raspberry Pwn
- installation, Snort
- about / Snort
- installation, stunnel client
- about / Installing a Stunnel client
- Internet Control Message Protocol (ICMP)
- about / Tuning your network capture
- Internet Protocol Secutiry (IPsec)
- intrusion detection/prevention
- about / Intrusion detection and prevention
- Snort / Snort
- Intrusion Prevention System (IPS) / Reverse shell through SSH
- iptable rules
- adding / Tor router
- about / Tor router
- iwconfig command
- about / Setting up wireless cards
- iwlist wlan0 scanning command
- about / Setting up wireless cards
J
- John the Ripper
- about / Cracking WPA/WPA2
K
- Kali Linux
- installing / Installing Kali Linux
- combining, with Raspberry Pi / Combining Kali Linux and Raspberry Pi
- 3G USB modem, setting / Setting up a 3G USB modem with Kali Linux
- Kali Linux Custom ARM Images / Installing Kali Linux
- K Desktop Environment (KDE)
- about / Raspberry Pwn
- Keka
- about / Installing Kali Linux
- KidSafe
L
- LHOST option
- configuring / Metasploit
- Linux QEMU kernel file
- URL, for downloading / Running Raspberry Pi on your PC with QEMU emulator
- Live Host Identification tools
M
- macchanger
- about / Cracking WPA/WPA2
- man-in-the-middle attacks
- about / Man-in-the-middle attacks
- Metasploit
- about / Metasploit, PwnBerry Pi
- Msfcli / Metasploit
- Msfconsole / Metasploit
- exploits / Metasploit
- payloads / Metasploit
- database / Metasploit
- Meterpreter / Metasploit
- local system, exploiting / Metasploit
- using / Metasploit
- launching / Metasploit
- custom payloads, creating with / Creating your own payloads with Metasploit
- payloads, wrapping / Wrapping payloads
- Meterpreter / Metasploit
- microSD card
- preparing / Preparing a microSD card
- downloading / Preparing a microSD card
- URL, for downloading / Preparing a microSD card
- Mobile Wi-Fi (MiFi)
- Msfcli
- about / Metasploit
- Msfconsole
- about / Metasploit
N
- network
- scanning / Network scanning
- scanning, Nmap used / Nmap
- scanning, for wireless security / Wireless security
- traffic, capturing / Capturing traffic on the network
- traffic capturing, tcpdump used / Tuning your network capture
- defending / Defending your network
- Network Address Translate (NAT)
- about / Raspberry Tor
- network defense
- intrusion detection/prevention / Intrusion detection and prevention
- content filter / Content filter
- remote access, with OpenVPN / Remote access with OpenVPN
- Tor relay / Tor relays and routers
- Tor router / Tor relays and routers
- network footprint
- masking / Masking your network footprint
- proxychains / Proxychains
- Raspberry Pi, resetting to factory settings / Resetting the Raspberry Pi to factory settings
- Kali Linux, corrupting remotely / Remotely corrupting Kali Linux
- New Out of the Box Software (NOOBS)
- about / Cloning the Raspberry Pi SD card
- URL, for downloading / Cloning the Raspberry Pi SD card
- Nmap
- no-operation (NOP) / Metasploit
- about / Metasploit
O
- Open Embedded Linux Entertainment Center (OpenELEC) / More uses
- OpenSSH server
- installing / Setting up the SSH service
- OpenVPN
- about / Remote access with OpenVPN
- used, for remote access / Remote access with OpenVPN
- installing / Remote access with OpenVPN
- overclocking
- about / Overclocking
P
- Packet Capture (pcap) file
- about / Wireshark
- payloads / Metasploit
- penetration test
- preparing for / Preparing for a penetration test
- example / Wrapping it up with an example
- tracks, covering / Covering your tracks
- logs, wiping / Wiping logs
- network footprint, masking / Masking your network footprint
- proxychains / Proxychains
- penetration testing, Raspberry Pi
- use cases / Raspberry Pi penetration testing use cases
- Phishing attack
- about / The Command and Control server
- PiAware
- used, for flight tracking / Flight tracking using PiAware
- about / Flight tracking using PiAware
- URL / Flight tracking using PiAware
- PiPlay
- PrivateEyePi
- about / PrivateEyePi
- proxychains
- about / Proxychains
- PwnBerry Pi
- about / PwnBerry Pi
- installing / PwnBerry Pi
- PWNIE Express
- PwnPi
Q
- QEMU Emulator
- Raspberry Pi, executing / Running Raspberry Pi on your PC with QEMU emulator
- QEMU emulator
- URL, for downloading / Running Raspberry Pi on your PC with QEMU emulator
R
- Raspberry Pi
- purchasing / Purchasing a Raspberry Pi
- assembling / Assembling a Raspberry Pi
- microSD card, preparing / Preparing a microSD card
- combining, with Kali Linux / Combining Kali Linux and Raspberry Pi
- pros / Pros and cons of the Raspberry Pi
- cons / Pros and cons of the Raspberry Pi
- use cases / Raspberry Pi use cases, Other Raspberry Pi uses, More uses
- data, capturing / Getting data to the Pi
- configuring, into Tor router / Tor router
- URL, for downloading / Tor router, Running Raspberry Pi on your PC with QEMU emulator
- executing, with QEMU Emulator / Running Raspberry Pi on your PC with QEMU emulator
- URL / Other Raspberry Pi uses
- Raspberry Pi, common problems
- avoiding / Avoiding common problems
- power issues / Avoiding common problems
- microSD card reading issues / Avoiding common problems
- permission denied / Avoiding common problems
- blank screen after startx / Avoiding common problems
- blank screen with working mouse after startx / Avoiding common problems
- Kali Linux programs not found in GUI / Avoiding common problems
- Raspberry Pi attacks
- target, exploiting / Exploiting a target
- social engineering attacks / Social engineering
- Raspberry Pi firmware
- URL, for downloading / PwnPi
- Raspberry Pi Model B+
- about / Purchasing a Raspberry Pi
- versus Raspberry Pi Model B / Purchasing a Raspberry Pi
- benefits / Purchasing a Raspberry Pi
- Raspberry Pi Ultimate Kit
- about / Purchasing a Raspberry Pi
- Raspberry Pwn
- about / Raspberry Pwn
- installing / Raspberry Pwn
- Raspberry Tor
- used, for converting Raspberry Pi to Tor node / Raspberry Tor
- raspi-config application
- URL, for downloading / Overclocking
- reports, developing
- about / Developing reports
- screenshots, creating / Creating screenshots
- files, compressing / Compressing files
- reserve shell / Metasploit
- reverse shell tunneling
- about / Reverse shell through SSH
- rogue access honeypot
- about / Rogue access honeypots
- ROM
- adding / PiPlay
S
- SD card
- formatting / Installing Kali Linux
- cloning / Cloning the Raspberry Pi SD card
- Secure Shell (SSH) service
- setting up / Setting up the SSH service
- default keys / SSH default keys and management
- used, for remote management / SSH default keys and management
- reverse shell tunneling / Reverse shell through SSH
- Service Set Identifier (SSID)
- about / Wireless security
- service ssh restart command
- about / SSH default keys and management
- service ssh start command
- about / Setting up the SSH service
- SHA1SUM / Installing Kali Linux
- Shutter
- about / Shutter
- Snort
- Social-Engineer Toolkit
- executing / PwnPi
- Social Engineering Toolkit (SET)
- about / The Social-Engineer Toolkit
- launching / The Social-Engineer Toolkit
- split
- about / Split
- SSH/Secure File Transfer Protocol (SFTP)
- SSLstrip
- used, for defeating HTTPS / Beating HTTPS with SSLstrip
- SSLstrip attack
- launching / Launching an SSLstrip attack
- stunnel
- about / Stunnel
- stunnel client
- installing / Installing a Stunnel client
- URL, for downloading / Installing a Stunnel client
- Super Nintendo Entertainment System (SNES)
- about / PiPlay
- Switch Port Analyzer (SPAN) / Exploiting a target
T
- target
- exploiting / Exploiting a target
- tcpdump
- about / Tcpdump
- using / Tcpdump
- used, for capturing network traffic / Tuning your network capture
- scripting / Scripting tcpdump for future access
- Wireshark, using / Wireshark
- WordPress password, capturing / Capturing a WordPress password example
- TShark, using / TShark
- Tor
- about / Tor relays and routers
- URL / Tor relays and routers
- Tor relay
- about / Tor relays and routers
- reference link / Raspberry Tor
- Tor router
- about / Tor relays and routers
- Raspberry Pi, configuring / Tor router
- Transmission Control Protocol (TCP)
- about / Tuning your network capture
- troubleshooting, Raspberry Pi
- reference link / Avoiding common problems
- TShark
U
- Unarchiver
- about / Installing Kali Linux
- Unzip / Zip/Unzip
- update-rc.d -f ssh defaults command
- about / Setting up the SSH service
- update-rc.d -f ssh remove command
- about / Setting up the SSH service
- use cases, Raspberry Pi
- about / Raspberry Pi use cases
- flight tracking, with PiAware / Flight tracking using PiAware
- PiPlay / PiPlay
- PrivateEyePi / PrivateEyePi
- User Datagram Protocol (UDP)
- about / Tuning your network capture
V
- Viscosity
- VPN
- about / Remote access with OpenVPN
W
- white-box assessment
- about / Reverse shell through SSH
- Wi-Fi adapters
- reference link / Setting up wireless cards
- Wi-Fi Protected Access (WPA)
- about / Cracking WPA/WPA2
- Win32 Disk Imager
- using / Installing Kali Linux
- URL, for downloading / Installing Kali Linux
- about / Installing Kali Linux
- Wired Equivalent Privacy (WEP)
- about / Cracking WPA/WPA2
- wireless cards
- setting up / Setting up wireless cards
- wireless security
- about / Wireless security
- Wireshark
- wordlists
- creating / Creating wordlists
- example sources / Creating wordlists
- WPA/WPA2
- cracking, with Aircrack / Cracking WPA/WPA2
- wordlists, creating / Creating wordlists
- network traffic, capturing / Capturing traffic on the network
- Tcpdump, using / Tcpdump
- man-in-the-middle attacks / Man-in-the-middle attacks