Penetration Testing with Raspberry Pi 2nd Edition by Michael Mcphee,Jason Beltrame – Ebook PDF Instant Download/Delivery:9781787126138,1787126137
Full download Penetration Testing with Raspberry Pi 2nd Edition after payment
Product details:
ISBN 10:1787126137
ISBN 13:9781787126138
Author:Michael Mcphee,Jason Beltrame
About This Book
- Quickly turn your Raspberry Pi 3 into a low-cost hacking tool using Kali Linux 2
- Protect your confidential data by deftly preventing various network security attacks
- Use Raspberry Pi 3 as honeypots to warn you that hackers are on your wire
Who This Book Is For
If you are a computer enthusiast who wants to learn advanced hacking techniques using the Raspberry Pi 3 as your pentesting toolbox, then this book is for you. Prior knowledge of networking and Linux would be an advantage.
What You Will Learn
- Install and tune Kali Linux 2 on a Raspberry Pi 3 for hacking
- Learn how to store and offload pentest data from the Raspberry Pi 3
- Plan and perform man-in-the-middle attacks and bypass advanced encryption techniques
- Compromise systems using various exploits and tools using Kali Linux 2
- Bypass security defenses and remove data off a target network
- Develop a command and control system to manage remotely placed Raspberry Pis
- Turn a Raspberry Pi 3 into a honeypot to capture sensitive information
In Detail
This book will show you how to utilize the latest credit card sized Raspberry Pi 3 and create a portable, low-cost hacking tool using Kali Linux 2.
You’ll begin by installing and tuning Kali Linux 2 on Raspberry Pi 3 and then get started with penetration testing. You will be exposed to various network security scenarios such as wireless security, scanning network packets in order to detect any issues in the network, and capturing sensitive data. You will also learn how to plan and perform various attacks such as man-in-the-middle, password cracking, bypassing SSL encryption, compromising systems using various toolkits, and many more. Finally, you’ll see how to bypass security defenses and avoid detection, turn your Pi 3 into a honeypot, and develop a command and control system to manage a remotely-placed Raspberry Pi 3.
By the end of this book you will be able to turn Raspberry Pi 3 into a hacking arsenal to leverage the most popular open source toolkit, Kali Linux 2.0.
Penetration Testing with Raspberry Pi 2nd Table of contents:
1. Choosing a Pen Test Platform
Hardware options and why the Pi
Software option and why Kali
Purchasing a Raspberry Pi
Assembling a Raspberry Pi
Installing Kali Linux
Combining Kali Linux and the Raspberry Pi
Cloning the Raspberry Pi SD card
Avoiding common problems
Summary
2. Preparing for Battle
The Command and Control server
Preparing for a penetration test
Setting up the SSH service
SSH default keys and management
Reverse shell through SSH
SSL tunnelling
stunnel
Server
Client
ncat
ptunnel and other techniques
Using the GUI
Transporting X via SSH
VNC and RDP
Overclocking
Setting up the wireless interface
Setting up the Bluetooth interface
Setting up a 3G or 4G modem
Wrapping it up with an example
3. Planning the Attack
Understanding the Cyber or Intrusion Kill Chain
Reconnaissance
Weaponization
Delivery
Exploitation
Installation
Command and Control
Actions
Preparing for the penetration test
Common tools for web, wired, and wireless attacks
Mapping our tools to the Penetration test Kill Chain
Addition of non-standard tools to arsenal
Positioning the Pi
Summary
4. Explore the Target – Recon and Weaponize
Prospecting the target
Network scanning
Seeing and cracking Wi-Fi
Obtaining the key
Cracking the key
Capturing and cracking passwords
Online cracking
Offline cracking
Getting data to the Pi
Physically inline option
Software based approach
arpspoof (Part of dsniff)
Ettercap
Wireshark
dsniff
Firewalk
Tuning our network capture
Scripting tcpdump for future access
Web application hacks
DotDotPwn
Driftnet
W3af
Summary
5. Taking Action – Intrude and Exploit
Using the Metasploit framework to exploit targets
Getting Recon data into Metasploit
Scoping vectors and launching attacks
Rolling our own exploits
Wrapping payloads
Social engineering
The Social-Engineer Toolkit
Phishing with BeEF
Executing man-in-the-middle attacks
SSLstrip
parasite6
Manipulating data
Sniffing the network in Scapy
Writing/reading PCAP files
Creating/sending/receiving of packets
Creating and sending malformed packets
TCP SYN scan
Rogue Access honeypot (revising and re-shooting)
Easy-creds
Bluetooth testing
Bluelog
Blueranger
Btscanner
Connecting to Bluetooth device using bluetoothctl
Summary
6. Finishing the Attack – Report and Withdraw
Covering our tracks
Wiping logs
Masking our network footprint
Using ProxyChains
Clearing the data off the Raspberry Pi
Developing reports
Collecting and correlating testing data
Creating screenshots
Using ImageMagick
GIMP, Screenshot, and Shutter
Moving data
Compressing files with Zip/Unzip
Using File Roller
Using split
Summary
7. Alternative Pi Projects
Diving into PwnPi
Discovering Raspberry Pwn
Investigating PwnBerry Pi
Defending your network
Intrusion detection and prevention
Exploring Snort
Content filtering
GateSentry as a content filtering option
Remote access with OpenVPN
Server installation
Server Certificate Authority setup
Server configuration and startup
Client-Configuration and Startup
Tor networking
Raspberry Tor
Tor Exit node or router
Running Raspberry Pi on your PC with QEMU emulator
Running Windows 10 on Raspberry Pi 3
Other popular use cases for the Raspberry Pi
Raspberry Weather
PiAware
PiPlay
PrivateEyePi
People also search for Penetration Testing with Raspberry Pi 2nd:
penetration testing with raspberry pi 2nd edition pdf
a penetration tester is testing a network’s vulnerability
a penetration tester is experimenting with network mapper
pentesting with raspberry pi
using raspberry pi for penetration testing
Tags:
Michael Mcphee,Jason Beltrame,Testing,Raspberry,Penetration