Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Penetration Testing with Raspberry Pi
Table of Contents Penetration Testing with Raspberry Pi Credits About the Authors About the Reviewers www.PacktPub.com
Support files, eBooks, discount offers, and more
Why subscribe? Free access for Packt account holders
Disclaimer Preface
What this book covers What you need for this book Who this book is for Conventions Reader feedback Customer support
Downloading the color images of this book Errata Piracy Questions
1. Raspberry Pi and Kali Linux Basics
Purchasing a Raspberry Pi Assembling a Raspberry Pi
Preparing a microSD card
Installing Kali Linux Combining Kali Linux and Raspberry Pi
Pros and cons of the Raspberry Pi Raspberry Pi penetration testing use cases
Cloning the Raspberry Pi SD card Avoiding common problems Summary
2. Preparing the Raspberry Pi
Raspberry Pi use cases The Command and Control server Preparing for a penetration test Overclocking Setting up wireless cards Setting up a 3G USB modem with Kali Linux Setting up the SSH service SSH default keys and management Reverse shell through SSH Stunnel Installing a Stunnel client Wrapping it up with an example Summary
3. Penetration Testing
Network scanning
Nmap Wireless security
Cracking WPA/WPA2
Creating wordlists Capturing traffic on the network Tcpdump Man-in-the-middle attacks
Getting data to the Pi
ARP spoofing Ettercap Ettercap command line
Driftnet Tuning your network capture Scripting tcpdump for future access
Wireshark Capturing a WordPress password example TShark
Beating HTTPS with SSLstrip
Launching an SSLstrip attack
Summary
4. Raspberry Pi Attacks
Exploiting a target Metasploit
Creating your own payloads with Metasploit Wrapping payloads
Social engineering
The Social-Engineer Toolkit
Phishing with BeEF Rogue access honeypots
Easy-creds
Summary
5. Ending the Penetration Test
Covering your tracks
Wiping logs
Masking your network footprint
Proxychains Resetting the Raspberry Pi to factory settings
Remotely corrupting Kali Linux
Developing reports
Creating screenshots
ImageMagick Shutter
Compressing files
Zip/Unzip File Roller Split
Summary
6. Other Raspberry Pi Projects
PwnPi Raspberry Pwn PwnBerry Pi Defending your network
Intrusion detection and prevention
Snort
Content filter
KidSafe
Remote access with OpenVPN Tor relays and routers
Raspberry Tor Tor router
Running Raspberry Pi on your PC with QEMU emulator Other Raspberry Pi uses
Flight tracking using PiAware PiPlay PrivateEyePi
More uses Summary
Index
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion