Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Penetration Testing with Raspberry PI

You're reading from   Penetration Testing with Raspberry PI Construct a hacking arsenal for penetration testers or hacking enthusiasts using Kali Linux on a Raspberry Pi

Arrow left icon
Product type Paperback
Published in Jan 2015
Publisher
ISBN-13 9781784396435
Length 208 pages
Edition 1st Edition
Arrow right icon
Toc

Chapter 4. Raspberry Pi Attacks

In the previous chapters, we learned how to set up a Raspberry Pi for penetration testing. The steps included installing Kali Linux, establishing access to a target network, and performing basic reconnaissance. In this chapter, we will focus on attacking targets once your Raspberry Pi has established a foothold on a network. The topics include compromising systems, setting up social engineering attacks, exploiting Internet browsers, and developing a rogue access using tools that are available in Kali Linux. Some of the tools that will be covered are preinstalled on the Kali Linux ARM image; however, we recommend that you use the apt-get command to download the newest versions as well as update them regularly.

In this chapter, we will cover the following topics:

  • Exploiting a target
  • Metasploit
  • Social engineering
  • The Social-Engineer Toolkit
  • Phishing with BeEF
  • Rogue access honeypots
  • Easy-creds

Tip

The Raspberry Pi has limited performance capabilities due to its...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €18.99/month. Cancel anytime