Chapter 4. Raspberry Pi Attacks
In the previous chapters, we learned how to set up a Raspberry Pi for penetration testing. The steps included installing Kali Linux, establishing access to a target network, and performing basic reconnaissance. In this chapter, we will focus on attacking targets once your Raspberry Pi has established a foothold on a network. The topics include compromising systems, setting up social engineering attacks, exploiting Internet browsers, and developing a rogue access using tools that are available in Kali Linux. Some of the tools that will be covered are preinstalled on the Kali Linux ARM image; however, we recommend that you use the apt-get
command to download the newest versions as well as update them regularly.
In this chapter, we will cover the following topics:
- Exploiting a target
- Metasploit
- Social engineering
- The Social-Engineer Toolkit
- Phishing with BeEF
- Rogue access honeypots
- Easy-creds
Tip
The Raspberry Pi has limited performance capabilities due to its...