Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Penetration Testing with Raspberry PI

You're reading from  Penetration Testing with Raspberry PI

Product type Book
Published in Jan 2015
Publisher
ISBN-13 9781784396435
Pages 208 pages
Edition 1st Edition
Languages

Summary


This last chapter provided additional tools and use cases for using a Raspberry Pi. We briefly covered some alternative penetration testing arsenals to Kali Linux, but believe Kali Linux should see the most innovation based on its popularity in the IT community. We also touched upon ARM images that can be used for defensive purposes such as firewalls, IPS/IDS, and VPN. We closed with some fun ARM images that are not necessarily security-related, but cool regardless.

This wraps up this book. Hopefully, you enjoyed reading it. We would love to hear from you. Feel free to reach us on our respective blogs and share your thoughts. Aamir Lakhani can be reached at www.drchaos.com and Joseph Muniz can be reached at www.thesecurityblogger.com. We had a ton of fun working through the topics covered and wish you the best with your Raspberry Pi experience. That includes those looking to do good or evil with this new knowledge. Aamir really wanted to close with the Spiderman quote about responsibility...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €14.99/month. Cancel anytime}