- Tapa blanda: 208 páginas
- Editor: Packt Publishing (27 de enero de 2015)
- Idioma: Inglés
- ISBN-10: 1784396435
- ISBN-13: 978-1784396435
- Valoración media de los clientes: Sé el primero en opinar sobre este producto
Clasificación en los más vendidos de Amazon:
nº791.625 en Libros en idiomas extranjeros (Ver el Top 100 en Libros en idiomas extranjeros)
- n.° 2248 en Libros en idiomas extranjeros > Informática, internet y medios digitales > Sistemas operativos
- n.° 4677 en Libros en idiomas extranjeros > Informática, internet y medios digitales > Redes y administración de sistemas
- n.° 13584 en Libros en idiomas extranjeros > Informática, internet y medios digitales > Programación y desarrollo de software
Penetration Testing with Raspberry Pi (Inglés) Tapa blanda – 27 ene 2015
|Nuevo desde||Usado desde|
Los clientes que compraron este producto también compraron
Descripción del producto
Reseña del editor
If you are looking for a low budget, small form-factor remotely accessible hacking tool, then the concepts in this book are ideal for you. If you are a penetration tester who wants to save on travel costs by placing a low-cost node on a target network, you will save thousands by using the methods covered in this book. You do not have to be a skilled hacker or programmer to use this book. It will be beneficial to have some networking experience; however, it is not required to follow the concepts covered in this book.
Biografía del autor
Joseph Muniz is a consultant at Cisco Systems and security researcher. He started his career in software development and later managed networks as a contracted technical resource. Joseph moved into consulting and found a passion for security while meeting with a variety of customers. He has been involved with the design and implementation of multiple projects ranging from Fortune 500 corporations to large federal networks. Joseph is the author and contributor of several books as well as a speaker for popular security conferences. Check out his blog www.thesecurityblogger.com showcasing the latest security events, research, and technologies. Aamir Lakhani is a leading cyber security architect, senior strategist, and researcher. He is responsible for providing IT security solutions to major commercial and federal enterprise organizations. Lakhani leads projects that implement security postures for Fortune 500 companies, government organizations, major healthcare providers, educational institutions, and financial and media organizations. Lakhani has designed offensive counter-defense measures, and has assisted organizations in defending themselves from active strike-back attacks perpetrated by underground cyber groups. Lakhani is considered an industry leader in support of detailed architectural engagements and projects on topics related to cyber defense, mobile application threats, malware, advanced persistent threat (APT) research, and Dark Security. Lakhani is the author and contributor of several books that include Web Penetration Testing with Kali Linux and XenMobile MDM, both by Packt Publishing, and he has appeared on National Public Radio as an expert on cyber security. Lakhani runs the blog DrChaos.com, which was ranked as a leading source for cyber security by FedTech Magazine. He has been named one of the top personalities to follow on social media, ranked highly as leader in his field, and he continues to dedicate his career to cyber security, research, and education.
No es necesario ningún dispositivo Kindle. Descárgate una de las apps de Kindle gratuitas para comenzar a leer libros Kindle en tu smartphone, tablet u ordenador.
Obtén la app gratuita:
Detalles del producto
Si eres el vendedor de este producto, ¿te gustaría sugerir ciertos cambios a través del servicio de atención al vendedor?
Opiniones de clientes
|5 estrellas (0%)|
|4 estrellas (0%)|
|3 estrellas (0%)|
|2 estrellas (0%)|
|1 estrella (0%)|
Opiniones de clientes más útiles en Amazon.com
You will get a lot out of this book regardless if you are a cyber security geek or just a geek!
I purchased it so I wouldn't have to hunt and peck all over the internet to figure out how to get everything configured and running appropriately. I'm 38 pages in and have already run across several issues (e.g. links being out of date, depreciated Linux commands).
That's a good thing because this software should be kept out of the hands of indolent and effeminate ninny's and criminal wannabes. You get a software suite which is just powerful enough to get you a stretch in Lompoc being traded around the cell block for smokes.
But if you like puzzles and want to find out about this stuff, it's OK
Besides that, you have a risk of wanting to load up with $$$ penetration gear after you mess with this tar baby..
Once the discussion surrounding installing and configuring Kali for the RPi is complete, the book continues the discussion by laying out the possibilities of using a wifi USB adapter, USB 3G modem, and more. Once a form of networking (or possibly two!) is configured and set up, the book continues by discussing network mapping, wireless security cracking, network data capturing, and ARP spoofing.
Following the discussion about exploits, the book turns toward more advanced pentest topics. There is a brief explanation of creating and wrapping your own Metasploit payloads. A discussion of the Social Engineer Toolkit follows with a quick introduction to SET and its myriad of options. Following this is an additional discussion using BeEF for phishing, and setting up and using rogue access honeypots.
A quick overview of post-exploitation, masking your pentesting efforts, and developing reports for management and clients. A wrap-up of other projects to use on your (newly, perhaps?) purchased Raspberry Pi are presented with other thoughts and ideas – PwnPi, Raspberry Pwn, etc – as well as other thoughts on defending yourself and network.
Overall, this was an enjoyable book covering just one of the multitude of options in using your Raspberry Pi. It was very much worth the read for an overview on using Kali on a RPi. For those who are interested in RPi's, security, or just curious in technology in general, this is a great quick read that you'll want to reference.