• Complain

Daniel W. Dieterle - Security Testing With Raspberry Pi

Here you can read online Daniel W. Dieterle - Security Testing With Raspberry Pi full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2019, publisher: Independently published, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Daniel W. Dieterle Security Testing With Raspberry Pi
  • Book:
    Security Testing With Raspberry Pi
  • Author:
  • Publisher:
    Independently published
  • Genre:
  • Year:
    2019
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

Security Testing With Raspberry Pi: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Security Testing With Raspberry Pi" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Daniel W. Dieterle: author's other books


Who wrote Security Testing With Raspberry Pi? Find out the surname, the name of the author of the book and a list of all author's works by series.

Security Testing With Raspberry Pi — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Security Testing With Raspberry Pi" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make

Security Testing with Raspberry Pi Cover Art Design alphaomikron - photo 1

Security Testing with Raspberry Pi

Cover Art & Design : @alphaomikron

Chapter 1 Header Graphic : @alphaomikron

Copyright 2019 by Daniel W. Dieterle. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means without the prior written permission of the publisher.

All trademarks, registered trademarks and logos are the property of their respective owners.

Version 1.1

Dedication

To my family and friends for their unending support and encouragement. Without whom, my 6 th major writing project would not have been a reality. You all mean the world to me! Only one more book to write! Maybe

Daniel Dieterle

Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat. - Sun Tzu

Necessity is the mother of invention - Unknown

Behold, I send you forth as sheep in the midst of wolves: be ye therefore wise as serpents, and harmless as doves. - Matthew 10:16 (KJV)

About the Author

Daniel W. Dieterle has worked in the IT field for over 20 years. During this time, he worked for a computer support company where he provided system and network support for hundreds of companies across Upstate New York and throughout Northern Pennsylvania. He also worked in a Fortune 500 corporate data center, briefly worked at an Ivy League schools computer support department and served as an executive at an electrical engineering company.

For about the last 9 years Daniel has been completely focused on security as a computer security researcher and author. His articles have been published in international security magazines, and referenced by both technical entities and the media. His Kali Linux based books are used worldwide as a teaching & training resource for universities, technical training centers, government and private sector organizations. Daniel has assisted with creating numerous security training classes and technical training books mainly based on Ethical Hacking & Kali Linux, and enjoys helping out those new to the field.

Daniel W. Dieterle

E-mail cyberarmslivecom Website cyberarmswordpresscom Twitter - photo 2

E-mail : cyberarms@live.com

Website : cyberarms.wordpress.com

Twitter : @cyberarms

Special Thanks

A special thanks to my friends who helped with this book. Your time, insight and input were greatly appreciated.

Bill Marcy My Chief Editor and friend, thank you for the encouragement to write a 50-page security book on Raspberry Pi. The other 150 pages (give or take) are just a bonus.

@alphaomikron Thank you so much for your hard work on the cover art, it is fantastic! Thank you also for your continuous friendship, and the Spartan gifts, so amazing!

Azime Setol Thank you so much for your insight, encouragement, wisdom and snark!

My Infosec Family Thank you all so much for sharing your time, knowledge and friendship with me. You are all superstars in my book!

Table of Contents

Chapter 1
Security Testing with Raspberry Pi

What are Raspberry Pi Computers A Raspberry Pi RPi is an ARM based single - photo 3

What are Raspberry Pi Computers?

A Raspberry Pi (RPi) is an ARM based single board computer used by technical professionals, educators and hobbyists alike. Raspberry Pi is one of the most popular single board computers due to its ease of use, extremely large user base and functionality. RPis can be used as cost effective desktop computers, but are also used in robotics, science projects, monitoring systems, surveillance cameras, and countless other projects. The potential usage of RPi is really limited only by the mind of the maker using it. In this book we will focus on using RPi in the computer security field. We will cover using the device as a security testing tool and as a lab target. We will also cover some of the many ways RPi could be used in physical security. So, sit back and buckle up, this is going to be an exciting ride!

Why Use Raspberry Pi in Security?

Raspberry Pis are a great tool for the security industry. You can install some industry standard security testing tools and applications on a Raspberry Pi and for the most part, they work and function completely identical to their Linux counterparts. For example, you can run a fully functional copy of Kali Linux on an RPi, giving you access to all the ethical hacking tools that you would have if you were running it on a Linux desktop. Kali Linux is very popular in the security community, because it allows you to use similar tools and techniques that a hacker would use to test the security of your network, so you can find and correct these issues before a real hacker finds them.

I think the biggest drive to use a Pi over a desktop solution is the price. A Raspberry Pi 3b+ costs about $50 USD with a memory card. Also, it can run Kali Linux and Kali is free! Kali includes open source versions of numerous commercial security apps, so you could conceivably replace costly security solutions by simply using Kali on a Pi. Kali also includes several free versions of popular software programs that can be upgraded to the full featured paid versions and used directly through Kali. But Kali is just one solution. Pentesters and Red Team members use Raspberry Pis as drop boxes Cheap hacking devices left on a target site. The drop box gives the testing team remote access to the target network and a platform in which to run security scans and tests. Because they are so cheap, using Pi drop boxes are a perfect solution.

In this book, we will see how to use Kali Linux on a Pi. We will also cover some ways to run Ethical Hacking tools in the Raspberry Pis native Operating System - Raspbian. Then we will just get crazy and check out some Pi specific security images. We will cover how to use an RPi as a Hardware Interface Device attack tool. Lastly, we will see how to use the RPi in physical security applications, like using it as a surveillance camera.

Pre-Requisites and Scope of this Book

The book tutorials have been designed to help walk readers through the exercises in an easy to follow step-by-step manner. That being said, due to the complexities of using hacking tools on a Raspberry Pi, this is not an entry level book, or a How to Use RPi book. This book focuses on those with beginning to intermediate skills with Kali Linux & Ethical Hacking, basic networking skills, familiarity with virtual systems, and who already have experience with using Raspberry Pi systems. Though not solely focused on Kali Linux like my previous books, we will use Kali pretty heavily in this book, so it is a good idea to have a working knowledge of it. We also will use multiple images on multiple memory cards on a Pi, so it is good to be comfortable with writing, interchanging and using multiple OS images.

We will cover multiple ways in which Raspberry Pi systems can be used in ethical hacking and pentesting - From adding security testing tools to a base Raspbian install, using custom security images on the Pi, using it as a test attack target, using it as a HID attack device and finally to using the Pi as a physical security device. Due to how cheap RPi systems can be, this book is a good resource for experienced individuals to practice Ethical hacking techniques on a budget. I think it would also be a good resource for network administrators and non-security IT professionals that are looking to get into the field and learn more about Ethical Hacking and RPi.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Security Testing With Raspberry Pi»

Look at similar books to Security Testing With Raspberry Pi. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Security Testing With Raspberry Pi»

Discussion, reviews of the book Security Testing With Raspberry Pi and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.