Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Penetration Testing with Raspberry PI

You're reading from  Penetration Testing with Raspberry PI

Product type Book
Published in Jan 2015
Publisher
ISBN-13 9781784396435
Pages 208 pages
Edition 1st Edition
Languages

Tuning your network capture


During real penetration testing exercises, we found that running raw tcpdump captures or using tools such as Wireshark consume a lot of processing power and sometimes crash the Raspberry Pi or render it useless. For this reason, the best practice is to avoid using such tools in real environments unless you tune what is captured to reduce the overhead on the Raspberry Pi. Here are some steps to capture network traffic using tcpdump in a controlled manner.

Tcpdump is a very useful tool and knowing what you are doing with the utility will help you to get the most out of the tool on the Raspberry Pi. The following section will provide a few tuning pointers but it is not intended to be a tcpdump tutorial.

The first thing to consider is how to narrow down what tcpdump is looking for. You can do this in a few ways. The first way is to specify the host keyword. The host keyword will look for traffic specified by a hostname or IP address. It can be done in the following...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €14.99/month. Cancel anytime}