Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletter Hub
Free Learning
Arrow right icon
timer SALE ENDS IN
0 Days
:
00 Hours
:
00 Minutes
:
00 Seconds
Arrow up icon
GO TO TOP
Penetration Testing with Raspberry PI

You're reading from   Penetration Testing with Raspberry PI Construct a hacking arsenal for penetration testers or hacking enthusiasts using Kali Linux on a Raspberry Pi

Arrow left icon
Product type Paperback
Published in Jan 2015
Publisher
ISBN-13 9781784396435
Length 208 pages
Edition 1st Edition
Arrow right icon
Toc

Index

A

  • Access Point (AP) / Easy-creds
  • Access Point Name (APN)
    • about / Setting up a 3G USB modem with Kali Linux
  • Address Resolution Protocol (ARP)
    • about / Getting data to the Pi
  • Aircrack
    • used, for cracking WPA/WPA2 / Cracking WPA/WPA2
    • about / Cracking WPA/WPA2
  • ARP spoofing
    • about / ARP spoofing
  • Automatic Dependent Surveillance-Broadcast (ADS-B) system
    • about / Flight tracking using PiAware

B

  • BeEF
    • about / Phishing with BeEF
    • phishing with / Phishing with BeEF
  • black-box testing
    • about / Raspberry Pi use cases
  • blacklists
    • URL / KidSafe
  • bleeding-edge repos
    • about / The Social-Engineer Toolkit

C

  • CanaKit Wi-Fi adapter
    • about / Purchasing a Raspberry Pi
  • Certificate Authority (CA) certificate
    • building / Remote access with OpenVPN
  • Certificate Signing Request (CSR)
    • about / Remote access with OpenVPN
  • clearev / Wiping logs
  • ClearLogs
    • download link / Wiping logs
  • Command and Control (C&C) server
    • about / The Command and Control server
  • command line, Ettercap
    • used, for capturing data / Ettercap command line
  • content filter
    • about / Content filter
    • KidSafe / KidSafe
  • Custom Wordlist Generator (CeWL)
    • about / Creating wordlists

D

  • data
    • capturing, to Raspberry Pi / Getting data to the Pi
    • capturing, with ARP spoofing / ARP spoofing
    • capturing, with Ettercap / Ettercap
    • capturing, Ettercap command line used / Ettercap command line
  • database / Metasploit
  • Data Loss Prevention (DLP) technology / Compressing files
  • Debian distribution
    • URL, for downloading / PwnBerry Pi
  • Demilitarized Zone (DMZ)
    • about / Raspberry Tor
  • Denial of Service (DoS)
    • about / Remote access with OpenVPN
  • DHCP snooping
    • about / Ettercap
  • Driftnet
    • about / Driftnet
  • Dynamic ARP Inspection
    • about / Ettercap
  • Dynamic Host Configuration Protocol (DHCP)
    • about / KidSafe
  • Dynamic Host Configuration Protocol (DHCP) spoofing / Easy-creds

E

  • easy-creds
    • about / Easy-creds
    • download link / Easy-creds
    • installing / Easy-creds
  • Ettercap
    • about / Ettercap
    • used, for capturing data / Ettercap
    • URL / Ettercap
    • command line, used for capturing data / Ettercap command line
  • exploits / Metasploit
    • active exploits / Metasploit
    • passive exploits / Metasploit

F

  • File Roller
    • about / File Roller
  • FlightAware
    • URL / Flight tracking using PiAware
    • about / Flight tracking using PiAware
  • FTP server
    • URL, for setting up / Cracking WPA/WPA2

G

  • 3G USB modem
    • setting up, with Kali Linux / Setting up a 3G USB modem with Kali Linux
  • General-purpose input/output (GPIO)
    • about / Purchasing a Raspberry Pi
  • Graphical User Interface (GUI)
    • about / Installing Kali Linux

H

  • Hash-based Message Authentication Code (HMAC)
    • about / Remote access with OpenVPN
  • Home Monitor system
    • about / PrivateEyePi
    • alarm, triggering / PrivateEyePi
  • honeypot
    • about / Rogue access honeypots
    • production honeypot / Rogue access honeypots
    • monitoring honeypot / Rogue access honeypots
  • hostapt.conf file
    • about / Tor router
    • URL / Tor router
  • hostport
    • about / Reverse shell through SSH
  • HTTPS
    • defeating, with SSLstrip / Beating HTTPS with SSLstrip
  • HTTP Strict Transport Security (HSTS)
    • about / Beating HTTPS with SSLstrip

I

  • ifconfig wlan0 command
    • about / Setting up wireless cards
  • ImageMagick
    • about / ImageMagick
  • installation, Kali Linux / Installing Kali Linux
  • installation, KidSafe
    • about / KidSafe
  • installation, OpenSSH server
    • about / Setting up the SSH service
  • installation, OpenVPN
    • about / Remote access with OpenVPN
  • installation, PiPlay
    • about / PiPlay
  • installation, PwnBerry Pi
    • about / PwnBerry Pi
  • installation, PwnPi
    • about / PwnPi
  • installation, Raspberry Pwn
    • about / Raspberry Pwn
  • installation, Snort
    • about / Snort
  • installation, stunnel client
    • about / Installing a Stunnel client
  • Internet Control Message Protocol (ICMP)
    • about / Tuning your network capture
  • Internet Protocol Secutiry (IPsec)
    • about / Scripting tcpdump for future access
  • intrusion detection/prevention
    • about / Intrusion detection and prevention
    • Snort / Snort
  • Intrusion Prevention System (IPS) / Reverse shell through SSH
  • iptable rules
    • adding / Tor router
    • about / Tor router
  • iwconfig command
    • about / Setting up wireless cards
  • iwlist wlan0 scanning command
    • about / Setting up wireless cards

J

  • John the Ripper
    • about / Cracking WPA/WPA2

K

  • Kali Linux
    • installing / Installing Kali Linux
    • combining, with Raspberry Pi / Combining Kali Linux and Raspberry Pi
    • 3G USB modem, setting / Setting up a 3G USB modem with Kali Linux
  • Kali Linux Custom ARM Images / Installing Kali Linux
  • K Desktop Environment (KDE)
    • about / Raspberry Pwn
  • Keka
    • about / Installing Kali Linux
  • KidSafe
    • about / KidSafe
    • installing / KidSafe
    • URL / KidSafe

L

  • LHOST option
    • configuring / Metasploit
  • Linux QEMU kernel file
    • URL, for downloading / Running Raspberry Pi on your PC with QEMU emulator
  • Live Host Identification tools
    • ncat / Pros and cons of the Raspberry Pi
    • nmap / Pros and cons of the Raspberry Pi

M

  • macchanger
    • about / Cracking WPA/WPA2
  • man-in-the-middle attacks
    • about / Man-in-the-middle attacks
  • Metasploit
    • about / Metasploit, PwnBerry Pi
    • Msfcli / Metasploit
    • Msfconsole / Metasploit
    • exploits / Metasploit
    • payloads / Metasploit
    • database / Metasploit
    • Meterpreter / Metasploit
    • local system, exploiting / Metasploit
    • using / Metasploit
    • launching / Metasploit
    • custom payloads, creating with / Creating your own payloads with Metasploit
    • payloads, wrapping / Wrapping payloads
  • Meterpreter / Metasploit
  • microSD card
    • preparing / Preparing a microSD card
    • downloading / Preparing a microSD card
    • URL, for downloading / Preparing a microSD card
  • Mobile Wi-Fi (MiFi)
    • about / Setting up a 3G USB modem with Kali Linux
  • Msfcli
    • about / Metasploit
  • Msfconsole
    • about / Metasploit

N

  • network
    • scanning / Network scanning
    • scanning, Nmap used / Nmap
    • scanning, for wireless security / Wireless security
    • traffic, capturing / Capturing traffic on the network
    • traffic capturing, tcpdump used / Tuning your network capture
    • defending / Defending your network
  • Network Address Translate (NAT)
    • about / Raspberry Tor
  • network defense
    • intrusion detection/prevention / Intrusion detection and prevention
    • content filter / Content filter
    • remote access, with OpenVPN / Remote access with OpenVPN
    • Tor relay / Tor relays and routers
    • Tor router / Tor relays and routers
  • network footprint
    • masking / Masking your network footprint
    • proxychains / Proxychains
    • Raspberry Pi, resetting to factory settings / Resetting the Raspberry Pi to factory settings
    • Kali Linux, corrupting remotely / Remotely corrupting Kali Linux
  • New Out of the Box Software (NOOBS)
    • about / Cloning the Raspberry Pi SD card
    • URL, for downloading / Cloning the Raspberry Pi SD card
  • Nmap
    • used, for scanning network / Nmap
    • URL / Nmap
    • nmap commands / Nmap
  • no-operation (NOP) / Metasploit
    • about / Metasploit

O

  • Open Embedded Linux Entertainment Center (OpenELEC) / More uses
  • OpenSSH server
    • installing / Setting up the SSH service
  • OpenVPN
    • about / Remote access with OpenVPN
    • used, for remote access / Remote access with OpenVPN
    • installing / Remote access with OpenVPN
  • overclocking
    • about / Overclocking

P

  • Packet Capture (pcap) file
    • about / Wireshark
  • payloads / Metasploit
  • penetration test
    • preparing for / Preparing for a penetration test
    • example / Wrapping it up with an example
    • tracks, covering / Covering your tracks
    • logs, wiping / Wiping logs
    • network footprint, masking / Masking your network footprint
    • proxychains / Proxychains
  • penetration testing, Raspberry Pi
    • use cases / Raspberry Pi penetration testing use cases
  • Phishing attack
    • about / The Command and Control server
  • PiAware
    • used, for flight tracking / Flight tracking using PiAware
    • about / Flight tracking using PiAware
    • URL / Flight tracking using PiAware
  • PiPlay
    • about / PiPlay
    • installing / PiPlay
  • PrivateEyePi
    • about / PrivateEyePi
  • proxychains
    • about / Proxychains
  • PwnBerry Pi
    • about / PwnBerry Pi
    • installing / PwnBerry Pi
  • PWNIE Express
    • about / Raspberry Pi penetration testing use cases
  • PwnPi
    • about / PwnPi
    • features / PwnPi
    • URL / PwnPi
    • URL, for downloading / PwnPi
    • installing / PwnPi

Q

  • QEMU Emulator
    • Raspberry Pi, executing / Running Raspberry Pi on your PC with QEMU emulator
  • QEMU emulator
    • URL, for downloading / Running Raspberry Pi on your PC with QEMU emulator

R

  • Raspberry Pi
    • purchasing / Purchasing a Raspberry Pi
    • assembling / Assembling a Raspberry Pi
    • microSD card, preparing / Preparing a microSD card
    • combining, with Kali Linux / Combining Kali Linux and Raspberry Pi
    • pros / Pros and cons of the Raspberry Pi
    • cons / Pros and cons of the Raspberry Pi
    • use cases / Raspberry Pi use cases, Other Raspberry Pi uses, More uses
    • data, capturing / Getting data to the Pi
    • configuring, into Tor router / Tor router
    • URL, for downloading / Tor router, Running Raspberry Pi on your PC with QEMU emulator
    • executing, with QEMU Emulator / Running Raspberry Pi on your PC with QEMU emulator
    • URL / Other Raspberry Pi uses
  • Raspberry Pi, common problems
    • avoiding / Avoiding common problems
    • power issues / Avoiding common problems
    • microSD card reading issues / Avoiding common problems
    • permission denied / Avoiding common problems
    • blank screen after startx / Avoiding common problems
    • blank screen with working mouse after startx / Avoiding common problems
    • Kali Linux programs not found in GUI / Avoiding common problems
  • Raspberry Pi attacks
    • target, exploiting / Exploiting a target
    • social engineering attacks / Social engineering
  • Raspberry Pi firmware
    • URL, for downloading / PwnPi
  • Raspberry Pi Model B+
    • about / Purchasing a Raspberry Pi
    • versus Raspberry Pi Model B / Purchasing a Raspberry Pi
    • benefits / Purchasing a Raspberry Pi
  • Raspberry Pi Ultimate Kit
    • about / Purchasing a Raspberry Pi
  • Raspberry Pwn
    • about / Raspberry Pwn
    • installing / Raspberry Pwn
  • Raspberry Tor
    • used, for converting Raspberry Pi to Tor node / Raspberry Tor
  • raspi-config application
    • URL, for downloading / Overclocking
  • reports, developing
    • about / Developing reports
    • screenshots, creating / Creating screenshots
    • files, compressing / Compressing files
  • reserve shell / Metasploit
  • reverse shell tunneling
    • about / Reverse shell through SSH
  • rogue access honeypot
    • about / Rogue access honeypots
  • ROM
    • adding / PiPlay

S

  • SD card
    • formatting / Installing Kali Linux
    • cloning / Cloning the Raspberry Pi SD card
  • Secure Shell (SSH) service
    • setting up / Setting up the SSH service
    • default keys / SSH default keys and management
    • used, for remote management / SSH default keys and management
    • reverse shell tunneling / Reverse shell through SSH
  • Service Set Identifier (SSID)
    • about / Wireless security
  • service ssh restart command
    • about / SSH default keys and management
  • service ssh start command
    • about / Setting up the SSH service
  • SHA1SUM / Installing Kali Linux
  • Shutter
    • about / Shutter
  • Snort
    • about / Snort
    • installiing / Snort
    • URL / Snort
  • Social-Engineer Toolkit
    • executing / PwnPi
  • Social Engineering Toolkit (SET)
    • about / The Social-Engineer Toolkit
    • launching / The Social-Engineer Toolkit
  • split
    • about / Split
  • SSH/Secure File Transfer Protocol (SFTP)
    • about / Scripting tcpdump for future access
  • SSLstrip
    • used, for defeating HTTPS / Beating HTTPS with SSLstrip
  • SSLstrip attack
    • launching / Launching an SSLstrip attack
  • stunnel
    • about / Stunnel
  • stunnel client
    • installing / Installing a Stunnel client
    • URL, for downloading / Installing a Stunnel client
  • Super Nintendo Entertainment System (SNES)
    • about / PiPlay
  • Switch Port Analyzer (SPAN) / Exploiting a target

T

  • target
    • exploiting / Exploiting a target
  • tcpdump
    • about / Tcpdump
    • using / Tcpdump
    • used, for capturing network traffic / Tuning your network capture
    • scripting / Scripting tcpdump for future access
    • Wireshark, using / Wireshark
    • WordPress password, capturing / Capturing a WordPress password example
    • TShark, using / TShark
  • Tor
    • about / Tor relays and routers
    • URL / Tor relays and routers
  • Tor relay
    • about / Tor relays and routers
    • reference link / Raspberry Tor
  • Tor router
    • about / Tor relays and routers
    • Raspberry Pi, configuring / Tor router
  • Transmission Control Protocol (TCP)
    • about / Tuning your network capture
  • troubleshooting, Raspberry Pi
    • reference link / Avoiding common problems
  • TShark
    • about / TShark
    • using / TShark

U

  • Unarchiver
    • about / Installing Kali Linux
  • Unzip / Zip/Unzip
  • update-rc.d -f ssh defaults command
    • about / Setting up the SSH service
  • update-rc.d -f ssh remove command
    • about / Setting up the SSH service
  • use cases, Raspberry Pi
    • about / Raspberry Pi use cases
    • flight tracking, with PiAware / Flight tracking using PiAware
    • PiPlay / PiPlay
    • PrivateEyePi / PrivateEyePi
  • User Datagram Protocol (UDP)
    • about / Tuning your network capture

V

  • Viscosity
    • URL / Remote access with OpenVPN
  • VPN
    • about / Remote access with OpenVPN

W

  • white-box assessment
    • about / Reverse shell through SSH
  • Wi-Fi adapters
    • reference link / Setting up wireless cards
  • Wi-Fi Protected Access (WPA)
    • about / Cracking WPA/WPA2
  • Win32 Disk Imager
    • using / Installing Kali Linux
    • URL, for downloading / Installing Kali Linux
    • about / Installing Kali Linux
  • Wired Equivalent Privacy (WEP)
    • about / Cracking WPA/WPA2
  • wireless cards
    • setting up / Setting up wireless cards
  • wireless security
    • about / Wireless security
  • Wireshark
    • about / Wireshark
    • using / Wireshark
  • wordlists
    • creating / Creating wordlists
    • example sources / Creating wordlists
  • WPA/WPA2
    • cracking, with Aircrack / Cracking WPA/WPA2
    • wordlists, creating / Creating wordlists
    • network traffic, capturing / Capturing traffic on the network
    • Tcpdump, using / Tcpdump
    • man-in-the-middle attacks / Man-in-the-middle attacks

Z

  • Zenmap
    • about / Nmap
  • Zip
    • about / Zip/Unzip
lock icon The rest of the chapter is locked
arrow left Previous Section
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at £13.99/month. Cancel anytime
Visually different images