Penetration Testing with Raspberry Pi, 2/e (Paperback)
Michael McPhee, Jason Beltrame
- 出版商: Packt Publishing
- 出版日期: 2016-11-30
- 售價: $1,810
- 貴賓價: 9.5 折 $1,720
- 語言: 英文
- 頁數: 316
- 裝訂: Paperback
- ISBN: 1787126137
- ISBN-13: 9781787126138
-
相關分類:
Raspberry Pi、Penetration-test
海外代購書籍(需單獨結帳)
買這商品的人也買了...
-
$948$901 -
$450$356 -
$1,539$1,458 -
$2,060$1,957 -
$420$331 -
$400$312 -
$179$161 -
$179$161 -
$179$161
相關主題
商品描述
Learn the art of building a low-cost, portable hacking arsenal using Raspberry Pi 3 and Kali Linux 2
About This Book
- Quickly turn your Raspberry Pi 3 into a low-cost hacking tool using Kali Linux 2
- Protect your confidential data by deftly preventing various network security attacks
- Use Raspberry Pi 3 as honeypots to warn you that hackers are on your wire
Who This Book Is For
If you are a computer enthusiast who wants to learn advanced hacking techniques using the Raspberry Pi 3 as your pentesting toolbox, then this book is for you. Prior knowledge of networking and Linux would be an advantage.
What You Will Learn
- Install and tune Kali Linux 2 on a Raspberry Pi 3 for hacking
- Learn how to store and offload pentest data from the Raspberry Pi 3
- Plan and perform man-in-the-middle attacks and bypass advanced encryption techniques
- Compromise systems using various exploits and tools using Kali Linux 2
- Bypass security defenses and remove data off a target network
- Develop a command and control system to manage remotely placed Raspberry Pis
- Turn a Raspberry Pi 3 into a honeypot to capture sensitive information
In Detail
This book will show you how to utilize the latest credit card sized Raspberry Pi 3 and create a portable, low-cost hacking tool using Kali Linux 2.
You’ll begin by installing and tuning Kali Linux 2 on Raspberry Pi 3 and then get started with penetration testing. You will be exposed to various network security scenarios such as wireless security, scanning network packets in order to detect any issues in the network, and capturing sensitive data. You will also learn how to plan and perform various attacks such as man-in-the-middle, password cracking, bypassing SSL encryption, compromising systems using various toolkits, and many more. Finally, you’ll see how to bypass security defenses and avoid detection, turn your Pi 3 into a honeypot, and develop a command and control system to manage a remotely-placed Raspberry Pi 3.
By the end of this book you will be able to turn Raspberry Pi 3 into a hacking arsenal to leverage the most popular open source toolkit, Kali Linux 2.0.
Style and approach
This concise and fast-paced guide will ensure you get hands-on with penetration testing right from the start. You will quickly install the powerful Kali Linux 2 on your Raspberry Pi 3 and then learn how to use and conduct fundamental penetration techniques and attacks.
商品描述(中文翻譯)
學習使用Raspberry Pi 3和Kali Linux 2建立低成本、可攜式的黑客工具箱的藝術
關於本書
- 使用Kali Linux 2快速將Raspberry Pi 3轉換為低成本的黑客工具
- 巧妙地防止各種網絡安全攻擊,保護您的機密數據
- 使用Raspberry Pi 3作為蜜罐,警告您有黑客入侵您的網絡
本書適合對計算機感興趣並希望使用Raspberry Pi 3作為測試工具箱學習高級黑客技術的讀者。具備網絡和Linux知識將是一個優勢。
您將學到什麼
- 在Raspberry Pi 3上安裝和調整Kali Linux 2進行黑客攻擊
- 學習如何存儲和卸載測試數據
- 計劃和執行中間人攻擊,並繞過高級加密技術
- 使用Kali Linux 2的各種漏洞和工具來入侵系統
- 繞過安全防禦並從目標網絡中刪除數據
- 開發一個命令和控制系統,以遠程管理放置的Raspberry Pi
- 將Raspberry Pi 3轉換為蜜罐,捕獲敏感信息
詳細內容
本書將向您展示如何利用最新的信用卡大小的Raspberry Pi 3,並使用Kali Linux 2創建一個便攜式、低成本的黑客工具。
您將首先在Raspberry Pi 3上安裝和調整Kali Linux 2,然後開始進行滲透測試。您將接觸到各種網絡安全場景,例如無線安全、掃描網絡封包以檢測網絡中的任何問題,以及捕獲敏感數據。您還將學習如何計劃和執行各種攻擊,例如中間人攻擊、破解密碼、繞過SSL加密、使用各種工具包入侵系統等等。最後,您將了解如何繞過安全防禦和避免檢測,將您的Pi 3轉換為蜜罐,並開發一個命令和控制系統來管理遠程放置的Raspberry Pi 3。
通過閱讀本書,您將能夠將Raspberry Pi 3轉變為一個黑客工具箱,利用最受歡迎的開源工具包Kali Linux 2.0。
風格和方法
這本簡潔而節奏快的指南將確保您從一開始就進行滲透測試。您將快速在Raspberry Pi 3上安裝功能強大的Kali Linux 2,然後學習如何使用和進行基本的滲透技術和攻擊。