penetration testing with raspberry pi

penetration testing with raspberry pi

Quickly turn your Raspberry Pi 3 into a low-cost hacking tool using Kali Linux 2

Protect your confidential data by deftly preventing various network security attacks

Use Raspberry Pi 3 as honeypots to warn you that hackers are on your wire

You’ll begin by installing and tuning Kali Linux 2 on Raspberry Pi 3 and then get started with penetration testing.

You will be exposed to various network security scenarios such as wireless security, scanning network packets in order to detect any issues in the network, and capturing sensitive data.

You will also learn how to plan and perform various attacks such as man-in-the-middle, password cracking, bypassing SSL encryption, compromising systems using various toolkits, and many more.

Finally, you’ll see how to bypass security defenses and avoid detection, turn your Pi 3 into a honeypot, and develop a command and control system to manage a remotely-placed Raspberry Pi 3.


penetration testing with raspberry pi


What You Will Learn


  • Install and tune Kali Linux 2 on a Raspberry Pi 3 for hacking
  • Learn how to store and offload pentest data from the Raspberry Pi 3
  • Plan and perform man-in-the-middle attacks and bypass advanced encryption techniques
  • Compromise systems using various exploits and tools using Kali Linux 2
  • Bypass security defenses and remove data off a target network
  • Develop a command and control system to manage remotely placed Raspberry Pis
  • Turn a Raspberry Pi 3 into a honeypot to capture sensitive information


Course Contents


1. Choosing a Pen Test Platform

Hardware options and why the Pi
Software option and why Kali
Purchasing a Raspberry Pi
Assembling a Raspberry Pi
Installing Kali Linux
Combining Kali Linux and the Raspberry Pi
Cloning the Raspberry Pi SD card
Avoiding common problems

2. Preparing for Battle

The Command and Control server
Preparing for a penetration test
Setting up the SSH service
SSH default keys and management
Reverse shell through SSH
SSL tunnelling
Using the GUI
Setting up the wireless interface
Setting up the Bluetooth interface
Setting up a 3G or 4G modem
Wrapping it up with an example

3. Planning the Attack

Understanding the Cyber or Intrusion Kill Chain
Preparing for the penetration test
Common tools for web, wired, and wireless attacks

Mapping our tools to the Penetration test Kill Chain

Addition of non-standard tools to arsenal
Positioning the Pi

4. Explore the Target – Recon and Weaponize

Prospecting the target
Network scanning

Seeing and cracking Wi-Fi

Obtaining the key
Cracking the key
Capturing and cracking passwords

Getting data to the Pi

Physically inline option
Software based approach
Web application hacks

5. Taking Action – Intrude and Exploit

Using the Metasploit framework to exploit targets
Getting Recon data into Metasploit
Scoping vectors and launching attacks
Rolling our own exploits
Wrapping payloads

Social engineering

The Social-Engineer Toolkit
Phishing with BeEF

Executing man-in-the-middle attacks


Manipulating data

Sniffing the network in Scapy
Writing/reading PCAP files
Creating/sending/receiving of packets
Creating and sending malformed packets
TCP SYN scan
Rogue Access honeypot (revising and re-shooting)
Bluetooth testing

6. Finishing the Attack – Report and Withdraw

Covering our tracks
Masking our network footprint
Developing reports
Moving data

7. Alternative Pi Projects

Diving into PwnPi
Discovering Raspberry Pwn
Investigating PwnBerry Pi

Defending your network

Intrusion detection and prevention
Content filtering

Remote access with OpenVPN

Server installation
Server Certificate Authority setup
Server configuration and startup
Client-Configuration and Startup

Tor networking

Raspberry Tor
Tor Exit node or router
Running Raspberry Pi on your PC with QEMU emulator
Running Windows 10 on Raspberry Pi 3

Other popular use cases for the Raspberry Pi

Raspberry Weather

Call – +91 97899 68765 / 044 – 42645495

Weekdays / Fast Track / Weekends / Corporate Training modes available


penetration testing with raspberry pi Training Also available across India in Bangalore, Pune, Hyderabad, Mumbai, Kolkata, Ahmedabad, Delhi, Gurgon, Noida, Kochin, Tirvandram, Goa, Vizag, Mysore,Coimbatore, Madurai, Trichy, Guwahati

On-Demand Fast track penetration testing with raspberry pi Training globally available also at Singapore, Dubai, Malaysia, London, San Jose, Beijing, Shenzhen, Shanghai, Ho Chi Minh City, Boston, Wuhan, San Francisco, Chongqing.