Book Image

Penetration Testing with Raspberry Pi. - Second Edition

By : Michael McPhee, Jason Beltrame
Book Image

Penetration Testing with Raspberry Pi. - Second Edition

By: Michael McPhee, Jason Beltrame

Overview of this book

This book will show you how to utilize the latest credit card sized Raspberry Pi 3 and create a portable, low-cost hacking tool using Kali Linux 2. You’ll begin by installing and tuning Kali Linux 2 on Raspberry Pi 3 and then get started with penetration testing. You will be exposed to various network security scenarios such as wireless security, scanning network packets in order to detect any issues in the network, and capturing sensitive data. You will also learn how to plan and perform various attacks such as man-in-the-middle, password cracking, bypassing SSL encryption, compromising systems using various toolkits, and many more. Finally, you’ll see how to bypass security defenses and avoid detection, turn your Pi 3 into a honeypot, and develop a command and control system to manage a remotely-placed Raspberry Pi 3. By the end of this book you will be able to turn Raspberry Pi 3 into a hacking arsenal to leverage the most popular open source toolkit, Kali Linux 2.0.
Table of Contents (13 chapters)
Penetration Testing with Raspberry Pi - Second Edition
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Preface

Chapter 5.  Taking Action - Intrude and Exploit

Now that we have found our way into the target environment and begun to collect information in Chapter 4, Explore the Target - Recon and Weaponize we'll certainly have some attack vectors to try as we progress further along the Penetration Testing Kill Chain. Preparation in the Recon and Weaponize phases provides us with a detailed footprint of the environment, its users, and the applications running within the network. In Sun Tzu's book The Art of War , he wisely states:

"So in war, the way is to avoid what is strong, and strike at what is weak."

More often than not, our targets will all but announce their weaknesses to us in recon activities. These soft points are what we need to now probe and exploit. We should also take note of the stronger segments and characteristics of the environment. More experienced attackers will avoid these perceived strengths, and we should encourage our customers to avoid them as well and focus on the weaknesses...