Chapter 3. Penetration Testing
Until this point, we have covered how to build a Raspberry Pi, install Kali Linux, and prepare your Raspberry Pi for a penetration test through various forms of remote access techniques. Now you are ready to learn how to use the Raspberry Pi to capture data on a target network. This chapter will provide you with various LAN- and wireless-based attack scenarios, using tools found in Kali Linux that are optimized for a Raspberry Pi or tools that you can download using the apt-get
command. There are other tools that are available in Kali Linux as well as online; however, we will focus on applications that we have found to function properly on a Raspberry Pi.
The following topics will be covered in this chapter:
Network scanning
Nmap
Wireless security
Cracking WPA/WPA2
Creating wordlists
Capturing traffic on the network
Getting data to the Pi
Tuning your network capture
Scripting tcpdump for future access
Wireshark and TShark
Beating HTTPS with SSLstrip
Tip
The Raspberry Pi...