Penetration Testing with Raspberry Pi, 2nd Edition

0
(0)

Penetration Testing with Raspberry Pi, 2nd Edition
 

  • Author:Jason BeltrameMike McPhee
  • Length: 248 pages
  • Edition: 1
  • Publisher: Packt Publishing
  • Publication Date: 2017-03-06
  • ISBN-10: 1787126137
  • ISBN-13: 9781787126138
  • Sales Rank: #321234 (See Top 100 Books)
  • Download:Register/Login to Download
  • Buy Print:Buy from amazon


    Book Description

    Key Features

    • Quickly turn your Raspberry Pi 3 into a low-cost hacking tool using Kali Linux 2
    • Confidently prevent various network security attacks in order to protect your confidential data
    • Use Raspberry Pi 3 as honeypots to warn you that hackers are on your wire.

    Book Description

    We will be leveraging the latest credit-card sized Raspberry Pi 3 and teach you how to create a portable, low cost hacking tool using Kali Linux 2.

    This book will start with installing and tuning Kali Linux 2 on Raspberry Pi 3 so that you can get started with penetration testing. You will be exposed to various network security scenarios like wireless security, scanning network packets in order to detect any issues in the network along with capturing sensitive data. You will also learn to plan and perform various attacks like man-in-the-middle, password cracking, bypassing SSL encryption, compromising systems using various toolkits and many more. Finally, this book will teach you how to bypass security defenses, turn your Pi 3 into a honeypot along with developing a command and control system to manage remotely placed Raspberry Pi 3.

    By the end of the book, you will be able to turn Raspberry Pi 3 into a hacking arsenal to leverage the most popular open source toolkit, Kali Linux 2.

    What you will learn

    • Install and tune Kali Linux 2 on a Raspberry Pi 3 for hacking
    • Learn how to manage and monitor the Raspberry Pi for remote hacking scenarios
    • Learn how to store and offload pentest data from the Raspberry Pi 3
    • Plan and perform man-in-the-middle attacks and bypass advanced encryption techniques
    • Compromise systems using various exploits and tools using Kali Linux 2
    • Bypass security defenses and remove data off a target network
    • Develop a command and control system to manage remotely placed Raspberry Pis
    • Turn a Raspberry Pi 3 into a honeypot to capture sensitive information

    Table of Contents

    Chapter 1. Choosing a Pen Test Platform
    Chapter 2. Preparing for Battle
    Chapter 3. Planning the Attack
    Chapter 4. Explore the Target – Recon and Weaponize
    Chapter 5. Taking Action – Intrude and Exploit
    Chapter 6. Finishing the Attack – Report and Withdraw
    Chapter 7. Alternative Pi Projects

    中文:

    书名:Penetration Testing with Raspberry Pi, 2nd Edition

    Key Features

    • 使用Kali Linux 2快速将你的Raspberry PI 3变成一个低成本的黑客工具
    • 信心十足地防范各种网络安全攻击,保护您的机密数据
    • 使用树莓派3作为蜜罐,警告你黑客在你的电线上。

    Book Description

    我们将利用最新的信用卡大小的Raspberry PI 3,并教你如何使用Kali Linux2创建一个便携的、低成本的黑客工具。

    本书将从在Raspberry PI 3上安装和调优Kali Linux2开始,以便您可以开始渗透测试。您将面临各种网络安全场景,如无线安全、扫描网络数据包以检测网络中的任何问题以及捕获敏感数据。您还将学习如何计划和执行各种攻击,如中间人攻击、密码破解、绕过SSL加密、使用各种工具包攻击系统等等。最后,这本书将教你如何绕过安全防御,把你的PI 3变成一个蜜罐,同时开发一个命令和控制系统来管理远程放置的覆盆子PI 3。

    到本书结束时,您将能够将Raspberry PI 3变成黑客武器库,以利用最流行的开源工具包Kali Linux2。

    你将学到什么

    • 在Raspberry PI 3上安装和调整Kali Linux 2以进行黑客攻击
    • 了解如何管理和监控远程黑客场景的Raspberry PI
    • 了解如何从Raspberry PI 3存储和卸载Pentest数据
    • 计划和执行中间人攻击并绕过高级加密技术
    • 使用各种漏洞和工具危害使用Kali Linux2的系统
    • 绕过安全防御并从目标网络删除数据
    • 开发一个指挥和控制系统来管理远程放置的树莓Pis
    • Turn a Raspberry Pi 3 into a honeypot to capture sensitive information

    Table of Contents

    第1章:选择笔测试平台
    第二章:备战
    第三章:策划攻击
    第四章探索目标侦察和武器化
    Chapter 5. Taking Action – Intrude and Exploit
    第六章:完成攻击报告和撤退
    第7章.替代PI项目

  • 下载电子版:下载地址
  • 购买纸质版:亚马逊商城

    点击星号评分!

    平均分 0 / 5. 投票数: 0

    还没有投票!请为他投一票。

  • 推荐阅读

    评论 抢沙发

    评论前必须登录!

     

    登录

    找回密码

    注册