About This Book
- Learn how to turn a Raspberry Pi into a Kali Linux hacking toolkit for onsite, physical, and remote penetration testing
- Understand the capabilities, limitations, and features of Kali Linux on Raspberry Pi
- Build and develop methodologies ideal for Raspberry Pi penetration testing using real-world cases
Who This Book Is For
If you are looking for a low budget, small form-factor remotely accessible hacking tool, then the concepts in this book are ideal for you. If you are a penetration tester who wants to save on travel costs by placing a low-cost node on a target network, you will save thousands by using the methods covered in this book. You do not have to be a skilled hacker or programmer to use this book. It will be beneficial to have some networking experience; however, it is not required to follow the concepts covered in this book.
What You Will Learn
- Install and tune Kali Linux on a Raspberry Pi for hacking
- Use a Raspberry Pi for pentests such as breaking wireless security, scanning networks, and capturing sensitive data
- Perform man-in-the-middle attacks and bypass SSL encryption
- Compromise systems using various exploits and toolkits
- Bypass security defenses and remove data off a target network
- Develop a command and control system to manage remotely placed Raspberry Pis
- Turn a Raspberry Pi into a honeypot to capture sensitive information
- Grasp professional penetration testing through proper documentation
Download Link
Post a Comment