Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletter Hub
Free Learning
Arrow right icon
timer SALE ENDS IN
0 Days
:
00 Hours
:
00 Minutes
:
00 Seconds
Penetration Testing with Raspberry Pi
Penetration Testing with Raspberry Pi

Penetration Testing with Raspberry Pi: A portable hacking station for effective pentesting , Second Edition

eBook
$32.39 $35.99
Paperback
$43.99
Subscription
Free Trial
Renews at $19.99p/m

What do you get with Print?

Product feature icon Instant access to your digital copy whilst your Print order is Shipped
Product feature icon Paperback book shipped to your preferred address
Product feature icon Redeem a companion digital copy on all Print orders
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
OR
Modal Close icon
Payment Processing...
tick Completed

Shipping Address

Billing Address

Shipping Methods
Table of content icon View table of contents Preview book icon Preview Book

Penetration Testing with Raspberry Pi

Chapter 2.  Preparing for Battle

Despite the massive improvements the Raspberry Pi 3 makes over its predecessors, it should still be considered an underpowered platform for security assessments. That being said, it is designed as a low-cost, ultra-portable computer primarily targeting educators and hobbyists. That gives it an advantage in covert, on-site penetration testing and other discreet engagements. Our focus for this chapter will be on how to prepare a Raspberry Pi (or other platforms) running Kali Linux for the management access and connectivity it will need during all phases of a penetration test.

We'll cover the following topics in this chapter:

  • Using a Command and Control server
  • Preparing for a penetration test
  • Setting up the SSH service
  • SSH default keys and management
  • Reverse shell through SSH
  • Using stunnel and other tunneling protocols
  • Setting up Remote GUI Access
  • Overclocking
  • Setting up the wireless interface
  • Setting up the Bluetooth interface
  • Setting up a 3G USB modem...

The Command and Control server

In the first edition of the book, the Raspberry Pi B+ was used, constrained by a single core and running at much lower speeds, even with overclocking. With the Raspberry Pi 3 used in this book, we now have four cores running over 1 GHz and four times more RAM to work with, so the Pi itself can certainly handle more tools and workload. That being said, it is still advisable that we budget our resources and leverage offline computing wherever possible, as more involved penetration testing can benefit from multiple sensors (Pis) and higher powered computing to correlate data effectively. We will cover tuning filtering captured data in Chapter 5, Taking Action – Intrude and Exploit.

When planning to remotely access multiple Raspberry Pi systems, we recommend setting up a central (C&C or C2Command and Control (C&C or C2) server rather than accessing each box individually. The C&C server will probably be a more powerful system so it can focus...

Preparing for a penetration test

The Kali Linux ARM image we covered in Chapter 1, Choosing a Pen Test Platform, has already been optimized for a Raspberry Pi 2 or 3. We found however that it is recommended to perform a few additional steps to ensure we are using Kali Linux in the most stable mode to avoid crashing the Raspberry Pi. The steps are as follows:

  1. We first recommended performing the OS updates as described in detail in Chapter 1, Choosing a Pen Test Platform. We won't repeat the steps here, so if we have not updated our OS, please go back to Chapter 1, Choosing a Pen Test Platform and follow the instructions.
  2. The next step we should perform is to properly identify our Raspberry Pi. The Kali Linux image ships with a generic hostname. To change the hostname, we'll use the Linux editor of our choice (seriously, any one will do; even if we are a fan of nano - this is a judgement-free zone) to edit /etc/hostname. The only thing in this file should be our hostname. We...

Setting up the SSH service

The Secure Shell (SSH) gives us full access to the Kali Linux operating system on a Raspberry Pi from a remote location. It is the most common and secure way to manage Linux systems using a command line. Since the Kali Linux GUI is not needed for most penetration testing exercises, we recommend using SSH or command-line utilities whenever possible. We found some installations of Kali Linux have SSH enabled while others may need us to install the OpenSSH server:

  1. We need to verify whether the SSH service is installed. We can do so by typing in the service --status-all command to check whether the SSH service is running. If we see +, as shown in the following screenshot, we are good to go. If we see a - sign, then we will need to install the OpenSSH server.
  2. To install OpenSSH, we type apt-get install openssh-server:

    Setting up the SSH service

  3. Once the installation is complete, we can then ensure that it will be a persistent process, meaning that it will be enabled with all reboots. We do this...

SSH default keys and management

A major security flaw in how systems are deployed is presented by the use of default or factory-installed keys and certificates. While these sorts of flaw are a boon for us as penetration testers, we need to ensure we do not fall victim to the same exploits that our targets may fall victim to by our hand. Linux distributions (as well as most any manufactured device) use factory keys by default. We must change our own key to ensure we do not become the prey to any investigator or adversary with forensics knowledge can and will access our data to determine who planted the Raspberry Pi. Let's not make it easy for them. We can do this by backing up the old keys and then establishing new ones as follows:

  1. We'll make a new directory and then move the old keys to it for storage:
    cd /etc/ssh
    mkdir backup_keys
    mv ssh_host_* backup_keys
    
  2. Then we can generate new keys for SSH and all dependent services by typing dpkg-reconfigure openssh-server, as seen in the...

The Command and Control server


In the first edition of the book, the Raspberry Pi B+ was used, constrained by a single core and running at much lower speeds, even with overclocking. With the Raspberry Pi 3 used in this book, we now have four cores running over 1 GHz and four times more RAM to work with, so the Pi itself can certainly handle more tools and workload. That being said, it is still advisable that we budget our resources and leverage offline computing wherever possible, as more involved penetration testing can benefit from multiple sensors (Pis) and higher powered computing to correlate data effectively. We will cover tuning filtering captured data in Chapter 5, Taking Action – Intrude and Exploit.

When planning to remotely access multiple Raspberry Pi systems, we recommend setting up a central (C&C or C2Command and Control (C&C or C2) server rather than accessing each box individually. The C&C server will probably be a more powerful system so it can focus on CPU-intensive...

Preparing for a penetration test


The Kali Linux ARM image we covered in Chapter 1, Choosing a Pen Test Platform, has already been optimized for a Raspberry Pi 2 or 3. We found however that it is recommended to perform a few additional steps to ensure we are using Kali Linux in the most stable mode to avoid crashing the Raspberry Pi. The steps are as follows:

  1. We first recommended performing the OS updates as described in detail in Chapter 1, Choosing a Pen Test Platform. We won't repeat the steps here, so if we have not updated our OS, please go back to Chapter 1, Choosing a Pen Test Platform and follow the instructions.

  2. The next step we should perform is to properly identify our Raspberry Pi. The Kali Linux image ships with a generic hostname. To change the hostname, we'll use the Linux editor of our choice (seriously, any one will do; even if we are a fan of nano - this is a judgement-free zone) to edit /etc/hostname. The only thing in this file should be our hostname. We can see in our example...

Setting up the SSH service


The Secure Shell (SSH) gives us full access to the Kali Linux operating system on a Raspberry Pi from a remote location. It is the most common and secure way to manage Linux systems using a command line. Since the Kali Linux GUI is not needed for most penetration testing exercises, we recommend using SSH or command-line utilities whenever possible. We found some installations of Kali Linux have SSH enabled while others may need us to install the OpenSSH server:

  1. We need to verify whether the SSH service is installed. We can do so by typing in the service --status-all command to check whether the SSH service is running. If we see +, as shown in the following screenshot, we are good to go. If we see a - sign, then we will need to install the OpenSSH server.

  2. To install OpenSSH, we type apt-get install openssh-server:

  3. Once the installation is complete, we can then ensure that it will be a persistent process, meaning that it will be enabled with all reboots. We do this...

SSH default keys and management


A major security flaw in how systems are deployed is presented by the use of default or factory-installed keys and certificates. While these sorts of flaw are a boon for us as penetration testers, we need to ensure we do not fall victim to the same exploits that our targets may fall victim to by our hand. Linux distributions (as well as most any manufactured device) use factory keys by default. We must change our own key to ensure we do not become the prey to any investigator or adversary with forensics knowledge can and will access our data to determine who planted the Raspberry Pi. Let's not make it easy for them. We can do this by backing up the old keys and then establishing new ones as follows:

  1. We'll make a new directory and then move the old keys to it for storage:

    cd /etc/ssh
    mkdir backup_keys
    mv ssh_host_* backup_keys
    
  2. Then we can generate new keys for SSH and all dependent services by typing dpkg-reconfigure openssh-server, as seen in the following...

Reverse shell through SSH


The small form factor of the Raspberry Pi makes it an awesome platform for concealed or otherwise inconspicuous deployment inside the customer's environment. Many organizations have security measures in place to block incoming connections with the goal of preventing backdoors into their network. In a white-box assessment, we may be explicitly able to open up a Firewall to permit SSH to our Raspberry Pi, as shown in the following image. The bad news is even if this is possible from a policy standpoint, it may be difficult to achieve when dealing with multiple sites under multiple administrative controls. Either way, breaking through perimeter defenses as step 1 of a penetration test, however, makes a lot of noise and will leave us either frustrated or looking for work. So how do we, out here in the wild, communicate with our Raspberry Pi 3 on the inside?

We can take advantage of the fact that most organizations do not restrict outbound traffic by default on their...

SSL tunnelling


Many administrators will have detection technologies such as IDS/IPS to detect and prevent open VPN connections. One method we can employ to get around this is levering an SSL tunneling package or proxy. While stunnel was used in the first edition of this book, we evaluated several alternatives, such as sslh, ncat, cryptcat, hitch, ptunnel, and nginx, should stunnel fail to meet our needs. While each of these grew out of different use cases (that is, server load balancing with HAProxy), with some effort all of them can create secure communication between a TCP client and server by hiding our covert payload inside another SSL (or other benign protocol's) envelope. Each package does so by using industry-standard crypto libraries such as OpenSSL or ping. What makes these tools useful to us is that they add varying levels of privacy and functionality to commonly used daemons and services without any changes in the program's code, giving us a lot of potential applications to hide...

Using the GUI


While penetration testing can be completed through exclusive use of the CLI, the added power of the Pi 3 allows us to entertain using the X11 Windows capabilities of Kali remotely. We recommend limiting this to training and initial system configuration so as to limit the traffic to and from the Pi and avoid triggering suspicion.

With that in mind, we have two basic methods we'll cover here:

  • Our primary (and most useful method for this book) is to transport of our X-Windows sessions via SSH to our laptop/desktop from which we are commanding our attack. In using this approach, we are able to protect the session using SSH, as well as use less bandwidth because the X-windows sessions only transport the application of interest for the time needed.

  • Our secondary method is to port the entire desktop via RDP or VNC. This approach, while more welcoming to Linux learners, consumes more bandwidth and relies on the implementer (the users) to ensure security is considered.

We'll walk through...

Overclocking


Overclocking the Raspberry Pi can improve the performance, but we risk greatly reducing the life of the hardware and will certainly void any warranties we may have through our kit provider. Given that the Raspberry Pi 3 is a much more powerful platform with a 1 GHz+ quad-core processor, there is likely little reason to overclock our Raspberry Pi 3 for use in penetration testing. If we find we need more processing horsepower, we are in most cases better off using higher-powered platforms for the workload and leveraging the Raspberry Pi 3 for remote sensing and collection. Either way, we should be fully aware of this risk before proceeding.

Note that the Raspberry Pi 3 still is not officially supported for overclocking, third-party tools and procedures (search engines can be a huge help here) such as those provided at http://www.jackenhack.com/raspberry-pi-3-overclocking/ will be needed to run at higher clock speeds.

Note

Overclocking will require more power from the Raspberry Pi...

Left arrow icon Right arrow icon

Key benefits

  • Quickly turn your Raspberry Pi 3 into a low-cost hacking tool using Kali Linux 2
  • Protect your confidential data by deftly preventing various network security attacks
  • Use Raspberry Pi 3 as honeypots to warn you that hackers are on your wire

Description

This book will show you how to utilize the latest credit card sized Raspberry Pi 3 and create a portable, low-cost hacking tool using Kali Linux 2. You’ll begin by installing and tuning Kali Linux 2 on Raspberry Pi 3 and then get started with penetration testing. You will be exposed to various network security scenarios such as wireless security, scanning network packets in order to detect any issues in the network, and capturing sensitive data. You will also learn how to plan and perform various attacks such as man-in-the-middle, password cracking, bypassing SSL encryption, compromising systems using various toolkits, and many more. Finally, you’ll see how to bypass security defenses and avoid detection, turn your Pi 3 into a honeypot, and develop a command and control system to manage a remotely-placed Raspberry Pi 3. By the end of this book you will be able to turn Raspberry Pi 3 into a hacking arsenal to leverage the most popular open source toolkit, Kali Linux 2.0.

Who is this book for?

If you are a computer enthusiast who wants to learn advanced hacking techniques using the Raspberry Pi 3 as your pentesting toolbox, then this book is for you. Prior knowledge of networking and Linux would be an advantage.

What you will learn

  • * Install and tune Kali Linux 2 on a Raspberry Pi 3 for hacking
  • * Learn how to store and offload pentest data from the Raspberry Pi 3
  • * Plan and perform man-in-the-middle attacks and bypass advanced encryption techniques
  • * Compromise systems using various exploits and tools using Kali Linux 2
  • * Bypass security defenses and remove data off a target network
  • * Develop a command and control system to manage remotely placed Raspberry Pis
  • * Turn a Raspberry Pi 3 into a honeypot to capture sensitive information
Estimated delivery fee Deliver to United States

Economy delivery 10 - 13 business days

Free $6.95

Premium delivery 6 - 9 business days

$21.95
(Includes tracking information)

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : Nov 30, 2016
Length: 316 pages
Edition : 2nd
Language : English
ISBN-13 : 9781787126138
Category :
Tools :

What do you get with Print?

Product feature icon Instant access to your digital copy whilst your Print order is Shipped
Product feature icon Paperback book shipped to your preferred address
Product feature icon Redeem a companion digital copy on all Print orders
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
OR
Modal Close icon
Payment Processing...
tick Completed

Shipping Address

Billing Address

Shipping Methods
Estimated delivery fee Deliver to United States

Economy delivery 10 - 13 business days

Free $6.95

Premium delivery 6 - 9 business days

$21.95
(Includes tracking information)

Product Details

Publication date : Nov 30, 2016
Length: 316 pages
Edition : 2nd
Language : English
ISBN-13 : 9781787126138
Category :
Tools :

Packt Subscriptions

See our plans and pricing
Modal Close icon
$19.99 billed monthly
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
$199.99 billed annually
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just $5 each
Feature tick icon Exclusive print discounts
$279.99 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just $5 each
Feature tick icon Exclusive print discounts

Frequently bought together


Stars icon
Total $ 141.97
Applied Network Security
$48.99
Penetration Testing with Raspberry Pi
$43.99
Kali Linux Intrusion and Exploitation Cookbook
$48.99
Total $ 141.97 Stars icon

Table of Contents

7 Chapters
1. Choosing a Pen Test Platform Chevron down icon Chevron up icon
2. Preparing for Battle Chevron down icon Chevron up icon
3. Planning the Attack Chevron down icon Chevron up icon
4. Explore the Target - Recon and Weaponize Chevron down icon Chevron up icon
5. Taking Action - Intrude and Exploit Chevron down icon Chevron up icon
6. Finishing the Attack - Report and Withdraw Chevron down icon Chevron up icon
7. Alternative Pi Projects Chevron down icon Chevron up icon

Customer reviews

Rating distribution
Full star icon Full star icon Full star icon Full star icon Half star icon 4.3
(4 Ratings)
5 star 50%
4 star 25%
3 star 25%
2 star 0%
1 star 0%
Berlinerk Apr 11, 2019
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Lots of great information about more ways to use the pi!!!!!
Amazon Verified review Amazon
Amazon Customer Nov 30, 2017
Full star icon Full star icon Full star icon Full star icon Full star icon 5
I'm a network geek who does routing and large scale design. Security is not a strong suit for me, and certainly not a detailed topic like pen testing. I thoroughly enjoyed reading this book and following along. I really like the discussion around kill chains and the theory behind how real-life security is supposed to work. The book is best used as a "follow along" guide with your own kit; the authors make no assumptions about the reader's ability to assemble a kit, so they provide many cost-effective options for getting started. In a world of faux security blogs and cookie cutter "experts", it is very refreshing to get practical, relevant, and modern tips from two strong players.
Amazon Verified review Amazon
JJ May 29, 2017
Full star icon Full star icon Full star icon Full star icon Empty star icon 4
OK
Amazon Verified review Amazon
Peter Sep 17, 2020
Full star icon Full star icon Full star icon Empty star icon Empty star icon 3
Complete noob to kali <me> - I have enjoyed the book thus far. I did have a few challenges with it because of outdated software. Following the book is fairly easy but frustrating when you're trying to enter commands that have been changed or replaced somehow. That's ok though, little leg work never hurt anybody. I guess it's expected at the rate tech evolves.For the most part there is alot of useful knowledge to be learned from the book and not a bad place to start for a noob.
Amazon Verified review Amazon
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

What is the digital copy I get with my Print order? Chevron down icon Chevron up icon

When you buy any Print edition of our Books, you can redeem (for free) the eBook edition of the Print Book you’ve purchased. This gives you instant access to your book when you make an order via PDF, EPUB or our online Reader experience.

What is the delivery time and cost of print book? Chevron down icon Chevron up icon

Shipping Details

USA:

'

Economy: Delivery to most addresses in the US within 10-15 business days

Premium: Trackable Delivery to most addresses in the US within 3-8 business days

UK:

Economy: Delivery to most addresses in the U.K. within 7-9 business days.
Shipments are not trackable

Premium: Trackable delivery to most addresses in the U.K. within 3-4 business days!
Add one extra business day for deliveries to Northern Ireland and Scottish Highlands and islands

EU:

Premium: Trackable delivery to most EU destinations within 4-9 business days.

Australia:

Economy: Can deliver to P. O. Boxes and private residences.
Trackable service with delivery to addresses in Australia only.
Delivery time ranges from 7-9 business days for VIC and 8-10 business days for Interstate metro
Delivery time is up to 15 business days for remote areas of WA, NT & QLD.

Premium: Delivery to addresses in Australia only
Trackable delivery to most P. O. Boxes and private residences in Australia within 4-5 days based on the distance to a destination following dispatch.

India:

Premium: Delivery to most Indian addresses within 5-6 business days

Rest of the World:

Premium: Countries in the American continent: Trackable delivery to most countries within 4-7 business days

Asia:

Premium: Delivery to most Asian addresses within 5-9 business days

Disclaimer:
All orders received before 5 PM U.K time would start printing from the next business day. So the estimated delivery times start from the next day as well. Orders received after 5 PM U.K time (in our internal systems) on a business day or anytime on the weekend will begin printing the second to next business day. For example, an order placed at 11 AM today will begin printing tomorrow, whereas an order placed at 9 PM tonight will begin printing the day after tomorrow.


Unfortunately, due to several restrictions, we are unable to ship to the following countries:

  1. Afghanistan
  2. American Samoa
  3. Belarus
  4. Brunei Darussalam
  5. Central African Republic
  6. The Democratic Republic of Congo
  7. Eritrea
  8. Guinea-bissau
  9. Iran
  10. Lebanon
  11. Libiya Arab Jamahriya
  12. Somalia
  13. Sudan
  14. Russian Federation
  15. Syrian Arab Republic
  16. Ukraine
  17. Venezuela
What is custom duty/charge? Chevron down icon Chevron up icon

Customs duty are charges levied on goods when they cross international borders. It is a tax that is imposed on imported goods. These duties are charged by special authorities and bodies created by local governments and are meant to protect local industries, economies, and businesses.

Do I have to pay customs charges for the print book order? Chevron down icon Chevron up icon

The orders shipped to the countries that are listed under EU27 will not bear custom charges. They are paid by Packt as part of the order.

List of EU27 countries: www.gov.uk/eu-eea:

A custom duty or localized taxes may be applicable on the shipment and would be charged by the recipient country outside of the EU27 which should be paid by the customer and these duties are not included in the shipping charges been charged on the order.

How do I know my custom duty charges? Chevron down icon Chevron up icon

The amount of duty payable varies greatly depending on the imported goods, the country of origin and several other factors like the total invoice amount or dimensions like weight, and other such criteria applicable in your country.

For example:

  • If you live in Mexico, and the declared value of your ordered items is over $ 50, for you to receive a package, you will have to pay additional import tax of 19% which will be $ 9.50 to the courier service.
  • Whereas if you live in Turkey, and the declared value of your ordered items is over € 22, for you to receive a package, you will have to pay additional import tax of 18% which will be € 3.96 to the courier service.
How can I cancel my order? Chevron down icon Chevron up icon

Cancellation Policy for Published Printed Books:

You can cancel any order within 1 hour of placing the order. Simply contact customercare@packt.com with your order details or payment transaction id. If your order has already started the shipment process, we will do our best to stop it. However, if it is already on the way to you then when you receive it, you can contact us at customercare@packt.com using the returns and refund process.

Please understand that Packt Publishing cannot provide refunds or cancel any order except for the cases described in our Return Policy (i.e. Packt Publishing agrees to replace your printed book because it arrives damaged or material defect in book), Packt Publishing will not accept returns.

What is your returns and refunds policy? Chevron down icon Chevron up icon

Return Policy:

We want you to be happy with your purchase from Packtpub.com. We will not hassle you with returning print books to us. If the print book you receive from us is incorrect, damaged, doesn't work or is unacceptably late, please contact Customer Relations Team on customercare@packt.com with the order number and issue details as explained below:

  1. If you ordered (eBook, Video or Print Book) incorrectly or accidentally, please contact Customer Relations Team on customercare@packt.com within one hour of placing the order and we will replace/refund you the item cost.
  2. Sadly, if your eBook or Video file is faulty or a fault occurs during the eBook or Video being made available to you, i.e. during download then you should contact Customer Relations Team within 14 days of purchase on customercare@packt.com who will be able to resolve this issue for you.
  3. You will have a choice of replacement or refund of the problem items.(damaged, defective or incorrect)
  4. Once Customer Care Team confirms that you will be refunded, you should receive the refund within 10 to 12 working days.
  5. If you are only requesting a refund of one book from a multiple order, then we will refund you the appropriate single item.
  6. Where the items were shipped under a free shipping offer, there will be no shipping costs to refund.

On the off chance your printed book arrives damaged, with book material defect, contact our Customer Relation Team on customercare@packt.com within 14 days of receipt of the book with appropriate evidence of damage and we will work with you to secure a replacement copy, if necessary. Please note that each printed book you order from us is individually made by Packt's professional book-printing partner which is on a print-on-demand basis.

What tax is charged? Chevron down icon Chevron up icon

Currently, no tax is charged on the purchase of any print book (subject to change based on the laws and regulations). A localized VAT fee is charged only to our European and UK customers on eBooks, Video and subscriptions that they buy. GST is charged to Indian customers for eBooks and video purchases.

What payment methods can I use? Chevron down icon Chevron up icon

You can pay with the following card types:

  1. Visa Debit
  2. Visa Credit
  3. MasterCard
  4. PayPal
What is the delivery time and cost of print books? Chevron down icon Chevron up icon

Shipping Details

USA:

'

Economy: Delivery to most addresses in the US within 10-15 business days

Premium: Trackable Delivery to most addresses in the US within 3-8 business days

UK:

Economy: Delivery to most addresses in the U.K. within 7-9 business days.
Shipments are not trackable

Premium: Trackable delivery to most addresses in the U.K. within 3-4 business days!
Add one extra business day for deliveries to Northern Ireland and Scottish Highlands and islands

EU:

Premium: Trackable delivery to most EU destinations within 4-9 business days.

Australia:

Economy: Can deliver to P. O. Boxes and private residences.
Trackable service with delivery to addresses in Australia only.
Delivery time ranges from 7-9 business days for VIC and 8-10 business days for Interstate metro
Delivery time is up to 15 business days for remote areas of WA, NT & QLD.

Premium: Delivery to addresses in Australia only
Trackable delivery to most P. O. Boxes and private residences in Australia within 4-5 days based on the distance to a destination following dispatch.

India:

Premium: Delivery to most Indian addresses within 5-6 business days

Rest of the World:

Premium: Countries in the American continent: Trackable delivery to most countries within 4-7 business days

Asia:

Premium: Delivery to most Asian addresses within 5-9 business days

Disclaimer:
All orders received before 5 PM U.K time would start printing from the next business day. So the estimated delivery times start from the next day as well. Orders received after 5 PM U.K time (in our internal systems) on a business day or anytime on the weekend will begin printing the second to next business day. For example, an order placed at 11 AM today will begin printing tomorrow, whereas an order placed at 9 PM tonight will begin printing the day after tomorrow.


Unfortunately, due to several restrictions, we are unable to ship to the following countries:

  1. Afghanistan
  2. American Samoa
  3. Belarus
  4. Brunei Darussalam
  5. Central African Republic
  6. The Democratic Republic of Congo
  7. Eritrea
  8. Guinea-bissau
  9. Iran
  10. Lebanon
  11. Libiya Arab Jamahriya
  12. Somalia
  13. Sudan
  14. Russian Federation
  15. Syrian Arab Republic
  16. Ukraine
  17. Venezuela
Modal Close icon
Modal Close icon