What this book covers
Chapter 1, Raspberry Pi and Kali Linux Basics, gives you an overview of purchasing a Raspberry Pi, installing Kali Linux, accessing Kali Linux for the first time, and troubleshooting common problems.
Chapter 2, Preparing the Raspberry Pi, gives you an overview of the Kali Linux ARM image, optimizing your environment, and preparing for local and remote penetration testing with a Raspberry Pi.
Chapter 3, Penetration Testing, helps you to understand network scanning, wireless hacking, man-in-the-middle attacks, and breaking encrypted communications.
Chapter 4, Raspberry Pi Attacks, gives you an overview of methods used to exploit targets using attack tools, social engineering, phishing, and rogue access honeypots.
Chapter 5, Ending the Penetration Test, helps you to capture results for reporting and covering your tracks after a penetration test.
Chapter 6, Other Raspberry Pi Projects, gives you an overview of other penetration testing arsenal, defense tools, and additional Raspberry Pi use cases.