Difference between revisions of "Penetration Testing with Raspberry Pi - 2nd Edition"

From Embedded Lab Vienna for IoT & Security
Jump to navigation Jump to search
(Automatic literature update)
(Automatic literature update)
 
Line 1: Line 1:
{{Literature|device_name=Penetration Testing with Raspberry Pi - 2nd Edition|image_link=https://stuff.elvis.science/uploads/accessories/accessory-image-ZbRMl1ojV1.jpg|type=Book|author=Michael McPhee , Jason Beltrame|language=English|isbn=9781787126138|publisher=Packt (2ss16)|pages=316|references=https://www.packtpub.com/product/penetration-testing-with-raspberry-pi-second-edition/9781787126138|description=" This book will show you how to utilize the latest credit card sized Raspberry Pi 3 and create a portable, low-cost hacking tool using Kali Linux 2.
{{Literature|device_name=Penetration Testing with Raspberry Pi - 2nd Edition|image_link=https://stuff.elvis.science/uploads/accessories/accessory-image-ZbRMl1ojV1.jpg|type=Book|author=Michael McPhee , Jason Beltrame|language=English|isbn=9781787126138|publisher=Packt (2ss16)|pages=316|references=https://www.packtpub.com/product/penetration-testing-with-raspberry-pi-second-edition/9781787126138|description= This book will show you how to utilize the latest credit card sized Raspberry Pi 3 and create a portable, low-cost hacking tool using Kali Linux 2.
You'll begin by installing and tuning Kali Linux 2 on Raspberry Pi 3 and then get started with penetration testing. You will be exposed to various network security scenarios such as wireless security, scanning network packets in order to detect any issues in the network, and capturing sensitive data. You will also learn how to plan and perform various attacks such as man-in-the-middle, password cracking, bypassing SSL encryption, compromising systems using various toolkits, and many more. Finally, you'll see how to bypass security defenses and avoid detection, turn your Pi 3 into a honeypot, and develop a command and control system to manage a remotely-placed Raspberry Pi 3.
You'll begin by installing and tuning Kali Linux 2 on Raspberry Pi 3 and then get started with penetration testing. You will be exposed to various network security scenarios such as wireless security, scanning network packets in order to detect any issues in the network, and capturing sensitive data. You will also learn how to plan and perform various attacks such as man-in-the-middle, password cracking, bypassing SSL encryption, compromising systems using various toolkits, and many more. Finally, you'll see how to bypass security defenses and avoid detection, turn your Pi 3 into a honeypot, and develop a command and control system to manage a remotely-placed Raspberry Pi 3.
By the end of this book you will be able to turn Raspberry Pi 3 into a hacking arsenal to leverage the most popular open source toolkit, Kali Linux 2.0."}}
By the end of this book you will be able to turn Raspberry Pi 3 into a hacking arsenal to leverage the most popular open source toolkit, Kali Linux 2.0.}}

Latest revision as of 17:49, 1 February 2024

accessory-image-ZbRMl1ojV1.jpg

Information
Type Book
Author Michael McPhee , Jason Beltrame
Language English
Publisher Packt (2ss16)
ISBN 9781787126138
Pages 316

Book Description

This book will show you how to utilize the latest credit card sized Raspberry Pi 3 and create a portable, low-cost hacking tool using Kali Linux 2. You'll begin by installing and tuning Kali Linux 2 on Raspberry Pi 3 and then get started with penetration testing. You will be exposed to various network security scenarios such as wireless security, scanning network packets in order to detect any issues in the network, and capturing sensitive data. You will also learn how to plan and perform various attacks such as man-in-the-middle, password cracking, bypassing SSL encryption, compromising systems using various toolkits, and many more. Finally, you'll see how to bypass security defenses and avoid detection, turn your Pi 3 into a honeypot, and develop a command and control system to manage a remotely-placed Raspberry Pi 3. By the end of this book you will be able to turn Raspberry Pi 3 into a hacking arsenal to leverage the most popular open source toolkit, Kali Linux 2.0.

References

https://www.packtpub.com/product/penetration-testing-with-raspberry-pi-second-edition/9781787126138