In some cases, while doing pentesting, a client may ask us to do a proper red team attack. In such cases, walking into an office with a laptop in hand may look suspicious, which is why this chapter comes in handy. We can perform red teaming using a small device, such as a cell phone or Raspberry Pi, and carry out a pentest effectively by using them. In this chapter, we will talk about setting up Kali Linux on Raspberry Pi and some compatible cell phones and using it to perform some cool attacks on the network.
In this chapter, we will cover the following recipes:
- Installing Kali on Raspberry Pi
- Installing NetHunter
- Superman typing – human interface device (HID) attacks
- Can I charge my phone?
- Setting up an evil access point