Difference between revisions of "Security Testing with Raspberry Pi"
Stuffsyncbot (talk | contribs) (Automatic literature update) Tag: Manual revert |
Stuffsyncbot (talk | contribs) (Automatic literature update) Tags: Manual revert Reverted |
||
Line 1: | Line 1: | ||
{{Literature|device_name=Security Testing with Raspberry Pi|image_link=https://stuff.elvis.science/uploads/accessories/accessory-image- | {{Literature|device_name=Security Testing with Raspberry Pi|image_link=https://stuff.elvis.science/uploads/accessories/accessory-image-4zAEA2Juix.jpeg|type=Book|author=Daniel W Dieterle|language=English|isbn=978-1072017677|publisher=2019|pages=195|references=Description: "Want to know how to run Kali Linux on a Raspberry Pi? Trying to learn Ethical Hacking on a budget? Want to learn how to make cheap drop boxes? Or how to use a Raspberry Pi as a HiD attack device or for Physical Security? Look no further, this book is for you!|description="Want to know how to run Kali Linux on a Raspberry Pi? Trying to learn Ethical Hacking on a budget? Want to learn how to make cheap drop boxes? Or how to use a Raspberry Pi as a HiD attack device or for Physical Security? Look no further, this book is for you! | ||
Topics Include: | Topics Include: | ||
<ul> | |||
<li>Using Kali Linux and Kali-Pi on an RPi</li> | |||
<li>Using Ethical Hacking tools in Raspbian</li> | |||
<li>Using Raspberry Pi as a target in a Pentest lab</li> | |||
<li>Using RPi as a USB HiD attack device</li> | |||
<li>Using cameras on a RPi to create physical security devices</li> | |||
</ul> | |||
And much, much more! "}} |
Revision as of 13:20, 14 December 2023
Type | Book |
Author | Daniel W Dieterle |
Language | English |
Publisher | 2019 |
ISBN | 978-1072017677 |
Pages | 195 |
Book Description
"Want to know how to run Kali Linux on a Raspberry Pi? Trying to learn Ethical Hacking on a budget? Want to learn how to make cheap drop boxes? Or how to use a Raspberry Pi as a HiD attack device or for Physical Security? Look no further, this book is for you!
Topics Include: <ul> <li>Using Kali Linux and Kali-Pi on an RPi</li> <li>Using Ethical Hacking tools in Raspbian</li> <li>Using Raspberry Pi as a target in a Pentest lab</li> <li>Using RPi as a USB HiD attack device</li> <li>Using cameras on a RPi to create physical security devices</li> </ul> And much, much more! "
References
Description: "Want to know how to run Kali Linux on a Raspberry Pi? Trying to learn Ethical Hacking on a budget? Want to learn how to make cheap drop boxes? Or how to use a Raspberry Pi as a HiD attack device or for Physical Security? Look no further, this book is for you!