Get Free Shipping on orders over $79
Penetration Testing with Raspberry PI : Construct a hacking arsenal for penetration testers or hacking enthusiasts using Kali Linux on a Raspberry Pi - Aamir Lakhani Joseph Muniz

Penetration Testing with Raspberry PI

Construct a hacking arsenal for penetration testers or hacking enthusiasts using Kali Linux on a Raspberry Pi

By: Aamir Lakhani Joseph Muniz

eText | 27 January 2015 | Edition Number 1

At a Glance

eText


$40.69

or 4 interest-free payments of $10.17 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

Book Description

If you are looking for a low budget, small form-factor remotely accessible hacking tool, then the concepts in this book are ideal for you. If you are a penetration tester who wants to save on travel costs by placing a low-cost node on a target network, you will save thousands by using the methods covered in this book. You do not have to be a skilled hacker or programmer to use this book. It will be beneficial to have some networking experience; however, it is not required to follow the concepts covered in this book.

What you will learn

  • Install and tune Kali Linux on a Raspberry Pi for hacking
  • Use a Raspberry Pi for pentests such as breaking wireless security, scanning networks, and capturing sensitive data
  • Perform maninthemiddle attacks and bypass SSL encryption
  • Compromise systems using various exploits and toolkits
  • Bypass security defenses and remove data off a target network
  • Develop a command and control system to manage remotely placed Raspberry Pis
  • Turn a Raspberry Pi into a honeypot to capture sensitive information
  • Grasp professional penetration testing through proper documentation

Who this book is for

If you are looking for a low budget, small form-factor remotely accessible hacking tool, then the concepts in this book are ideal for you. If you are a penetration tester who wants to save on travel costs by placing a low-cost node on a target network, you will save thousands by using the methods covered in this book. You do not have to be a skilled hacker or programmer to use this book. It will be beneficial to have some networking experience; however, it is not required to follow the concepts covered in this book.
on
Desktop
Tablet
Mobile

More in Software Testing & Verification

The Debugging Handbook - Johannes Kuhlmann

eBOOK

RRP $67.77

$54.99

19%
OFF
The ASQ Certified Software Quality Engineer Handbook - Linda Vogelsong Westfall

eBOOK

Build. Deliver. Repeat. - Gagan Jain

eBOOK