Penetration Testing With Raspberry Pi
K**R
Awesome!
The author did a great job o guiding the reader through the steps of constructing a Pi based intrusion testing platform. He then goes on to provide clear instruction on the mechanics of establishing command and control and exploiting systems. As a bonus the author devotes a chapter to how to apply your new skills to building other cool Pi based projects, such as flight tracker, game console and home automation platform.You will get a lot out of this book regardless if you are a cyber security geek or just a geek!
Z**N
Worth the money!
You don't know a single thing about Rasberry Pi B+ and Pen Testing? This book is an awesome write and works in a chronological order. Starts from the very basic and guides you to advanced techniques. I highly recommend this! $10 for Kindle edition??? How can it not be worthy? Lol. Go buy it!
R**N
Well-written, concise, quick read that you'll want as a reference
Raspberry pi devices are extremely budget-friendly personal computers smaller than the size of your TV remote. This book starts off with a quick discussion on specific Raspberry Pi (RPi) models and how to begin formatting and installing Kali, a penetration testing Linux distribution, on a microSD card. One caveat listed for using a RPi as your main attack tool is the Pi's limited computing resources. This does not detract from the usefulness of the Pi's potential, however. Just one think to keep tucked in the back of your mind.Once the discussion surrounding installing and configuring Kali for the RPi is complete, the book continues the discussion by laying out the possibilities of using a wifi USB adapter, USB 3G modem, and more. Once a form of networking (or possibly two!) is configured and set up, the book continues by discussing network mapping, wireless security cracking, network data capturing, and ARP spoofing.Following the discussion about exploits, the book turns toward more advanced pentest topics. There is a brief explanation of creating and wrapping your own Metasploit payloads. A discussion of the Social Engineer Toolkit follows with a quick introduction to SET and its myriad of options. Following this is an additional discussion using BeEF for phishing, and setting up and using rogue access honeypots.A quick overview of post-exploitation, masking your pentesting efforts, and developing reports for management and clients. A wrap-up of other projects to use on your (newly, perhaps?) purchased Raspberry Pi are presented with other thoughts and ideas – PwnPi, Raspberry Pwn, etc – as well as other thoughts on defending yourself and network.Overall, this was an enjoyable book covering just one of the multitude of options in using your Raspberry Pi. It was very much worth the read for an overview on using Kali on a RPi. For those who are interested in RPi's, security, or just curious in technology in general, this is a great quick read that you'll want to reference.
T**P
I great reference manual .
This book has been very useful with the proper setup of the Kali system on a Raspberry Pi. It explains the strengths of the Raspberry Pi as well as it's weaknesses. It is written in the typical "Cookbook" fashion. Most everything that the author has you perform is explained for you. If you already have a running Kali Pi, chances are you have missed a step in the proper configuration and concealment of your system.Even though it is a beginner's book, I have learned a lot from the author. I would recommend this to anyone who is interested in starting up with Kali with a Raspberry Pi
J**N
Great book
This is a great book. It allows you to conceptualize the many uses of a raspberry pi, but also is a great way to begin your journey into kali linux. The commands illustrated in the book transend all platforms in kali linux not just for the pi. Would definately recommend to beginners to learn the fundamentals.
J**R
Excellent book if you want to use Raspberry Pi as ...
Excellent book if you want to use Raspberry Pi as penetration testing platform . I really enjoyed it. I like most the rogue access honeypots +easy-creds part. Just imagine you have a wireless router and Kali as firmware ! . second most important part for me was reverse ssh connection. great explanation of the reason for reverse ssh and how to set it.
C**U
Great reading for newbies and advanced users alike.
This is a great book on how to use this powerful little device for pen testing. It gives you the tools of the trade and the power of such a low consumption device to have your arsenal with you all the way. As a pen tester you will love this book!
N**E
A waste of time and money! Barely any original material in this book, there are many better alternatives.
This is a poorly written book with very little original information in it. The vast majority of the information has virtually been copied from freely available websites. The little bits that have been written specifically relating to the raspberry pi do not nearly go far enough to justify the writing of an entire book. Avoid!
C**1
Ouvrage très instructif
Si vous souhaitez utiliser votre Raspberry sur d'autres projets que les projets classiques, l'idée de profiter de la petite taille de cet ordinateur pour jouer au "man in the middle" sur un réseau (où vous êtes autorisé à pénétre...), ce livre est fait pour vous. Bien évidemment, les techniques proposées par l'ouvrage sont adaptées à la puissance du Raspberry, et donc pas nécessairement très performantes, mais cet ouvrage vous permettra de comprendre, à moindres frais, les rudiments des tests de pénétration. L'ouvrage est très pédagogique.
P**R
Five Stars
Good
A**A
perfect
this book is amost the same of the book "penetration testing w/ kali linux"perfect book w/ explication for the raspberry
E**Y
bonne approche un peu demodée
Ouvrage pour débutants maitrisant linux. Fondamentaux avec des outils quelque peu dépassés mais toujours efficace. Les bases à l ancienne.
Trustpilot
3 weeks ago
2 days ago