101. Penetration Testing with Raspberry Pi

    Author: Myanmar Ebook Store Genre: »
    Rating

    Chapter 1: Raspberry Pi and Kali Linux Basics
    Purchasing a Raspberry Pi
    Assembling a Raspberry Pi
    Installing Kali Linux
    Combining Kali Linux and Raspberry Pi
    Cloning the Raspberry Pi SD card
    Avoiding common problems
    Summary

    Chapter 2: Preparing the Raspberry Pi
    Raspberry Pi use cases
    The Command and Control server
    Preparing for a penetration test
    Overclocking
    Setting up wireless cards
    Setting up a 3G USB modem with Kali Linux
    Setting up the SSH service
    SSH default keys and management
    Reverse shell through SSH
    Stunnel
    Installing a Stunnel client
    Wrapping it up with an example
    Summary

    Chapter 3: Penetration Testing
    Network scanning
    Cracking WPA/WPA2
    Getting data to the Pi
    Driftnet
    Tuning your network capture
    Scripting tcpdump for future access
    Beating HTTPS with SSLstrip
    Summary

    Chapter 4: Raspberry Pi Attacks
    Exploiting a target
    Metasploit
    Social engineering
    Phishing with BeEF
    Rogue access honeypots
    Summary

    Chapter 5: Ending the Penetration Test
    Covering your tracks
    Masking your network footprint
    Developing reports
    Chapter 6: Other Raspberry Pi Projects
    PwnPi
    Raspberry Pwn
    PwnBerry Pi
    Defending your network
    Running Raspberry Pi on your PC with QEMU emulator
    Other Raspberry Pi uses
    More uses
    Summary

    Index

    Leave a Reply

    Blogger templates

    Blogger news

    Blogroll