Penetration testing with paspberry Pi construct a hacking arsenal for penetration testers or hacking enthusiasts using Kali Linux on a Raspberry Pi

If you are looking for a low budget, small form-factor remotely accessible hacking tool, then the concepts in this book are ideal for you. If you are a penetration tester who wants to save on travel costs by placing a low-cost node on a target network, you will save thousands by using the methods co...

Descripción completa

Detalles Bibliográficos
Otros Autores: Lakhani, Aamir, author (author), Muniz, Joseph, author
Formato: Libro electrónico
Idioma:Inglés
Publicado: Birmingham, England : Packt Publishing Ltd 2015.
Edición:1st edition
Colección:Community experience distilled.
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009629237106719
Tabla de Contenidos:
  • Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Disclaimer; Table of Contents; Preface; Chapter 1: Raspberry Pi and Kali Linux Basics; Purchasing a Raspberry Pi; Assembling a Raspberry Pi; Preparing a microSD card; Installing Kali Linux; Combining Kali Linux and Raspberry Pi; Pros and cons of the Raspberry Pi; Raspberry Pi penetration testing use cases; Cloning the Raspberry Pi SD card; Avoiding common problems; Summary; Chapter 2: Preparing the Raspberry Pi; Raspberry Pi use cases; The Command and Control server; Preparing for a penetration test
  • OverclockingSetting up wireless cards; Setting up a 3G USB modem with Kali Linux; Setting up the SSH service; SSH default keys and management; Reverse shell through SSH; Stunnel; Installing a Stunnel client; Wrapping it up with an example; Summary; Chapter 3: Penetration Testing; Network scanning; Nmap; Wireless security; Cracking WPA/WPA2; Creating wordlists; Capturing traffic on the network; Tcpdump; Man-in-the-middle attacks; Getting data to the Pi; ARP spoofing; Ettercap; Ettercap command line; Driftnet; Tuning your network capture; Scripting tcpdump for future access; Wireshark
  • Capturing a WordPress password exampleTShark; Beating HTTPS with SSLstrip; Launching a SSLstrip attack; Summary; Chapter 4: Raspberry Pi Attacks; Exploiting a target; Metasploit; Creating your own payloads with Metasploit; Wrapping payloads; Social engineering; The Social Engineering Toolkit; Phishing with BeEF; Rogue access honeypots; Easy-creds; Summary; Chapter 5: Ending the Penetration Test; Covering your tracks; Wiping logs; Masking your network footprint; Proxychains; Resetting the Raspberry Pi to factory settings; Remotely corrupting Kali Linux; Developing reports; Creating screenshots
  • ImageMagickShutter; Compressing files; Zip/Unzip; File Roller; Split; Summary; Chapter 6: Other Raspberry Pi Projects; PwnPi; Raspberry Pwn; PwnBerry Pi; Defending your network; Intrusion detection and prevention; Snort; Content filter; KidSafe; Remote access with OpenVPN; Tor relays and routers; Raspberry Tor; Tor router; Running Raspberry Pi on your PC with QEMU Emulator; Other Raspberry Pi uses; Flight tracking using PiAware; PiPlay; PrivateEyePi; More uses; Summary; Index