Penetration Testing with Raspberry Pi

[desc]Ny soi
cs al
silt A <1)
4 pe bb
LAS
ho ‘NS VE Ks A gm
be. FP Ne ES
Te ea Ki} y ss
= a 3
a
Ae
ws

Penetration Testing with
Raspberry Pi

Construct a hacking arsenal for penetration testers or hacking
enthusiasts using Kali Linux on a Raspberry Pi

PACKT[/desc][img]72640-1784396435%20%7BB472383F%7D%20Penetration%20Testing%20with%20Raspberry%20Pi%20%5BMuniz%20%26%20Lakhani%202015-01-20%5D.webp[/img][bookmark]{"51": [3,"Capturing a WordPress password example",94],"14": [2,"Combining Kali Linux and Raspberry Pi",32],"71": [3,"Proxychains",139],"103": [1,"Index",200],"24": [2,"Overclocking",47],"35": [2,"Network scanning",65],"45": [3,"Ettercap",80],"25": [2,"Setting up wireless cards",50],"40": [3,"Capturing traffic on the network",73],"36": [3,"Nmap",65],"101": [2,"More uses",199],"80": [4,"File Roller",145],"87": [2,"Defending your network",156],"10": [2,"Purchasing a Raspberry Pi",19],"29": [2,"Reverse shell through SSH",55],"78": [3,"Compressing files",144],"42": [3,"Man-in-the-middle attacks",75],"60": [3,"Wrapping payloads",110],"41": [3,"Tcpdump",74],"33": [2,"Summary",63],"6": [1,"Disclaimer",9],"100": [3,"PrivateEyePi",197],"0": [1,"Coverr",1],"98": [3,"Flight tracking using PiAware",192],"13": [2,"Installing Kali Linux",27],"54": [3,"Launching a SSLstrip attack",98],"84": [2,"PwnPi",149],"20": [1,"Chapter 2: Preparing the Raspberry Pi",44],"16": [3,"Raspberry Pi penetration testing use cases",36],"68": [2,"Covering your tracks",133],"73": [4,"Remotely corrupting Kali Linux",141],"9": [1,"Chapter 1: Raspberry Pi and rKali Linux Basics",18],"27": [2,"Setting up the SSH service",53],"75": [3,"Creating screenshots",142],"32": [2,"Wrapping it up with an example",62],"76": [4,"ImageMagick",142],"48": [2,"Tuning your network capture",88],"44": [3,"ARP spoofing",78],"93": [3,"Tor relays and routers",178],"94": [4,"Raspberry Tor",179],"28": [2,"SSH default keys and management",55],"96": [2,"Running Raspberry Pi on your PC with QEMU Emulator",188],"4": [1,"About the Reviewers",6],"77": [4,"Shutter",143],"67": [1,"Chapter 5: Ending the Penetration Test",132],"56": [1,"Chapter 4: Raspberry Pi Attacks",102],"15": [3,"Pros and cons of the Raspberry Pi",34],"5": [1,"www.PacktPub.com",8],"49": [2,"Scripting tcpdump for future access",90],"47": [2,"Driftnet",87],"66": [2,"Summary",130],"92": [3,"Remote access with OpenVPN",168],"26": [2,"Setting up a 3G USB modem with nKali Linux",52],"79": [4,"Zip/Unzip",145],"55": [2,"Summary",101],"90": [3,"Content filter",162],"38": [2,"Cracking WPA/WPA2",68],"12": [3,"Preparing a microSD card",24],"50": [3,"Wireshark",91],"82": [2,"Summary",147],"46": [3,"Ettercap command line",85],"59": [3,"Creating your own payloads with Metasploit",108],"23": [2,"Preparing for a penetration test",46],"97": [2,"Other Raspberry Pi uses",192],"89": [4,"Snort",158],"17": [2,"Cloning the Raspberry Pi SD card",37],"22": [2,"The Command and Control server",46],"37": [3,"Wireless security",67],"58": [2,"Metasploit",103],"64": [2,"Rogue access honeypots",123],"102": [2,"Summary",199],"21": [2,"Raspberry Pi use cases",45],"65": [3,"Easy-creds",124],"86": [2,"PwnBerry Pi",154],"52": [3,"TShark",96],"34": [1,"Chapter 3: Penetration Testing",64],"19": [2,"Summary",42],"95": [4,"Tor router",183],"53": [2,"Beating HTTPS with SSLstrip",97],"99": [3,"PiPlay",194],"39": [3,"Creating wordlists",73],"85": [2,"Raspberry Pwn",152],"7": [1,"Table of Contents",10],"74": [2,"Developing reports",141],"3": [1,"About the Authors",5],"69": [3,"Wiping logs",134],"72": [3,"Resetting the Raspberry Pi to factory settings",140],"43": [2,"Getting data to the Pi",75],"31": [2,"Installing a Stunnel client",60],"70": [2,"Masking your network footprint",138],"81": [4,"Split",146],"88": [3,"Intrusion detection and prevention",157],"1": [1,"Copyright",3],"62": [3,"The Social Engineering Toolkit",112],"18": [2,"Avoiding common problems",39],"61": [2,"Social engineering",111],"11": [2,"Assembling a Raspberry Pi",23],"8": [1,"Preface",14],"2": [1,"Credits",4],"63": [2,"Phishing with BeEF",117],"83": [1,"Chapter 6: Other Raspberry Pi Projects",148],"57": [2,"Exploiting a target",103],"30": [2,"Stunnel",59],"91": [4,"KidSafe",162]
}[/bookmark]

Related