Penetration Testing with Raspberry Pi - Second Edition

Learn the art of building a low-cost, portable hacking arsenal using Raspberry Pi 3 and Kali Linux 2
Preview in Mapt

Penetration Testing with Raspberry Pi - Second Edition

Michael McPhee, Jason Beltrame

Learn the art of building a low-cost, portable hacking arsenal using Raspberry Pi 3 and Kali Linux 2
Mapt Subscription
FREE
$29.99/m after trial
eBook
$22.40
RRP $31.99
Save 29%
Print + eBook
$39.99
RRP $39.99
What do I get with a Mapt Pro subscription?
  • Unlimited access to all Packt’s 5,000+ eBooks and Videos
  • Early Access content, Progress Tracking, and Assessments
  • 1 Free eBook or Video to download and keep every month after trial
What do I get with an eBook?
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with Print & eBook?
  • Get a paperback copy of the book delivered to you
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with a Video?
  • Download this Video course in MP4 format
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
$0.00
$22.40
$39.99
$29.99 p/m after trial
RRP $31.99
RRP $39.99
Subscription
eBook
Print + eBook
Start 30 Day Trial

Frequently bought together


Penetration Testing with Raspberry Pi - Second Edition Book Cover
Penetration Testing with Raspberry Pi - Second Edition
$ 31.99
$ 22.40
Internet of Things with Raspberry Pi 3 Book Cover
Internet of Things with Raspberry Pi 3
$ 27.99
$ 19.60
Buy 2 for $35.00
Save $24.98
Add to Cart

Book Details

ISBN 139781787126138
Paperback316 pages

Book Description

This book will show you how to utilize the latest credit card sized Raspberry Pi 3 and create a portable, low-cost hacking tool using Kali Linux 2.

You’ll begin by installing and tuning Kali Linux 2 on Raspberry Pi 3 and then get started with penetration testing. You will be exposed to various network security scenarios such as wireless security, scanning network packets in order to detect any issues in the network, and capturing sensitive data. You will also learn how to plan and perform various attacks such as man-in-the-middle, password cracking, bypassing SSL encryption, compromising systems using various toolkits, and many more. Finally, you’ll see how to bypass security defenses and avoid detection, turn your Pi 3 into a honeypot, and develop a command and control system to manage a remotely-placed Raspberry Pi 3.

By the end of this book you will be able to turn Raspberry Pi 3 into a hacking arsenal to leverage the most popular open source toolkit, Kali Linux 2.0.

Table of Contents

Chapter 1: Choosing a Pen Test Platform
Hardware options and why the Pi
Software option and why Kali
Purchasing a Raspberry Pi
Assembling a Raspberry Pi
Installing Kali Linux
Combining Kali Linux and the Raspberry Pi
Cloning the Raspberry Pi SD card
Avoiding common problems
Summary
Chapter 2: Preparing for Battle
The Command and Control server
Preparing for a penetration test
Setting up the SSH service
SSH default keys and management
Reverse shell through SSH
SSL tunnelling
Using the GUI
Overclocking
Setting up the wireless interface
Setting up the Bluetooth interface
Setting up a 3G or 4G modem
Wrapping it up with an example
Chapter 3: Planning the Attack
Understanding the Cyber or Intrusion Kill Chain
Preparing for the penetration test
Common tools for web, wired, and wireless attacks
Mapping our tools to the Penetration test Kill Chain
Summary
Chapter 4: Explore the Target - Recon and Weaponize
Prospecting the target
Network scanning
Seeing and cracking Wi-Fi
Capturing and cracking passwords
Getting data to the Pi
Wireshark
dsniff
Firewalk
Web application hacks
Driftnet
Summary
Chapter 5: Taking Action - Intrude and Exploit
Using the Metasploit framework to exploit targets
Social engineering
Executing man-in-the-middle attacks
Rogue Access honeypot (revising and re-shooting)
Bluetooth testing
Summary
Chapter 6: Finishing the Attack - Report and Withdraw
Covering our tracks
Masking our network footprint
Developing reports
Moving data
Summary
Chapter 7: Alternative Pi Projects
Diving into PwnPi
Discovering Raspberry Pwn
Investigating PwnBerry Pi
Defending your network
Running Raspberry Pi on your PC with QEMU emulator
Running Windows 10 on Raspberry Pi 3
Other popular use cases for the Raspberry Pi
Summary

What You Will Learn

  • Install and tune Kali Linux 2 on a Raspberry Pi 3 for hacking
  • Learn how to store and offload pentest data from the Raspberry Pi 3
  • Plan and perform man-in-the-middle attacks and bypass advanced encryption techniques
  • Compromise systems using various exploits and tools using Kali Linux 2
  • Bypass security defenses and remove data off a target network
  • Develop a command and control system to manage remotely placed Raspberry Pis
  • Turn a Raspberry Pi 3 into a honeypot to capture sensitive information

Authors

Table of Contents

Chapter 1: Choosing a Pen Test Platform
Hardware options and why the Pi
Software option and why Kali
Purchasing a Raspberry Pi
Assembling a Raspberry Pi
Installing Kali Linux
Combining Kali Linux and the Raspberry Pi
Cloning the Raspberry Pi SD card
Avoiding common problems
Summary
Chapter 2: Preparing for Battle
The Command and Control server
Preparing for a penetration test
Setting up the SSH service
SSH default keys and management
Reverse shell through SSH
SSL tunnelling
Using the GUI
Overclocking
Setting up the wireless interface
Setting up the Bluetooth interface
Setting up a 3G or 4G modem
Wrapping it up with an example
Chapter 3: Planning the Attack
Understanding the Cyber or Intrusion Kill Chain
Preparing for the penetration test
Common tools for web, wired, and wireless attacks
Mapping our tools to the Penetration test Kill Chain
Summary
Chapter 4: Explore the Target - Recon and Weaponize
Prospecting the target
Network scanning
Seeing and cracking Wi-Fi
Capturing and cracking passwords
Getting data to the Pi
Wireshark
dsniff
Firewalk
Web application hacks
Driftnet
Summary
Chapter 5: Taking Action - Intrude and Exploit
Using the Metasploit framework to exploit targets
Social engineering
Executing man-in-the-middle attacks
Rogue Access honeypot (revising and re-shooting)
Bluetooth testing
Summary
Chapter 6: Finishing the Attack - Report and Withdraw
Covering our tracks
Masking our network footprint
Developing reports
Moving data
Summary
Chapter 7: Alternative Pi Projects
Diving into PwnPi
Discovering Raspberry Pwn
Investigating PwnBerry Pi
Defending your network
Running Raspberry Pi on your PC with QEMU emulator
Running Windows 10 on Raspberry Pi 3
Other popular use cases for the Raspberry Pi
Summary

Book Details

ISBN 139781787126138
Paperback316 pages
Read More

Read More Reviews

Recommended for You

Kali Linux 2: Windows Penetration Testing Book Cover
Kali Linux 2: Windows Penetration Testing
$ 39.99
$ 28.00
Build Supercomputers with Raspberry Pi 3 Book Cover
Build Supercomputers with Raspberry Pi 3
$ 31.99
$ 22.40
Python: Penetration Testing for Developers Book Cover
Python: Penetration Testing for Developers
$ 67.99
$ 47.60
Raspberry Pi: Amazing Projects from Scratch Book Cover
Raspberry Pi: Amazing Projects from Scratch
$ 59.99
$ 42.00
Linux: Powerful Server Administration Book Cover
Linux: Powerful Server Administration
$ 79.99
$ 56.00
Penetration Testing: A Survival Guide Book Cover
Penetration Testing: A Survival Guide
$ 69.99
$ 49.00