Penetration Testing with Raspberry Pi - Second Edition

Penetration Testing with Raspberry Pi - Second Edition

Penetration Testing with Raspberry Pi Second Edition

Jason Beltrame / Michael McPhee

63,64 €
IVA incluido
Disponible
Editorial:
Packt Publishing
Año de edición:
2016
ISBN:
9781787126138
63,64 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

Learn the art of building a low-cost, portable hacking arsenal using Raspberry Pi 3 and Kali Linux 2 Key Features:Quickly turn your Raspberry Pi 3 into a low-cost hacking tool using Kali Linux 2Protect your confidential data by deftly preventing various network security attacksUse Raspberry Pi 3 as honeypots to warn you that hackers are on your wireBook Description:This book will show you how to utilize the latest credit card sized Raspberry Pi 3 and create a portable, low-cost hacking tool using Kali Linux 2.You’ll begin by installing and tuning Kali Linux 2 on Raspberry Pi 3 and then get started with penetration testing. You will be exposed to various network security scenarios such as wireless security, scanning network packets in order to detect any issues in the network, and capturing sensitive data. You will also learn how to plan and perform various attacks such as man-in-the-middle, password cracking, bypassing SSL encryption, compromising systems using various toolkits, and many more. Finally, you’ll see how to bypass security defenses and avoid detection, turn your Pi 3 into a honeypot, and develop a command and control system to manage a remotely-placed Raspberry Pi 3.By the end of this book you will be able to turn Raspberry Pi 3 into a hacking arsenal to leverage the most popular open source toolkit, Kali Linux 2.0.What You Will Learn:Install and tune Kali Linux 2 on a Raspberry Pi 3 for hackingLearn how to store and offload pentest data from the Raspberry Pi 3Plan and perform man-in-the-middle attacks and bypass advanced encryption techniquesCompromise systems using various exploits and tools using Kali Linux 2Bypass security defenses and remove data off a target networkDevelop a command and control system to manage remotely placed Raspberry PisTurn a Raspberry Pi 3 into a honeypot to capture sensitive informationWho this book is for If you are a computer enthusiast who wants to learn advanced hacking techniques using the Raspberry Pi 3 as your pentesting toolbox, then this book is for you. Prior knowledge of networking and Linux would be an advantage.

Artículos relacionados

  • Mastering IoT For Industrial Environments
    Shrey Sharma
    Powering Industrial Growth with IoT Innovations.Book DescriptionEmbark on a journey through the transformative landscape of IoT with this comprehensive guide, 'Mastering IoT For Industrial Environments'.From its inception in the Industrial Revolution to its pivotal role in Industry 4.0, each chapter provides a deep dive into essential concepts. It will explore IoT architecture,...
    Disponible

    46,96 €

  • The Machine Learning Solutions Architect Handbook - Second Edition
    David Ping
    Design, build, and secure scalable machine learning (ML) systems to solve real-world business problems with Python and AWSPurchase of the print or Kindle book includes a free PDF eBookKey FeaturesGo in-depth into the ML lifecycle, from ideation and data management to deployment and scalingApply risk management techniques in the ML lifecycle and design architectural patterns for...
    Disponible

    65,50 €

  • The FPGA Programming Handbook - Second Edition
    Frank Bruno / Guy Eschemann
    Develop solid FPGA programming skills in SystemVerilog and VHDL by crafting practical projects - VGA controller, microprocessor, calculator, keyboard - and amplify your know-how with insider industry knowledge, all in one handbook.Purchase of the print or Kindle book includes a free eBook in PDF formatKey Features:- Explore a wide range of FPGA applications, grasp their versati...
    Disponible

    71,47 €

  • Exploring Computer Hardware - 2024 Edition
    Kevin Wilson
    Unlock the mysteries of modern computing with Exploring Computer Hardware. This full color illustrated guide delves into the intricate world of computer components, peripherals, networks and the internet, offering a clear understanding for both beginners, students and tech enthusiasts.Key Features:Full-Color Illustrations and Photographs bring each component and concept to life...
    Disponible

    23,82 €

  • Internet of Things Programming Projects - Second Edition
    Colin Dow
    Unleash the potential of IoT by creating weather indicators, information displays, alarm systems, and a vision recognition-enabled robot carKey Features:- Get to grips with the Raspberry Pi ecosystem and its role in IoT development- Integrate cutting-edge technologies such as MQTT, LoRa, and ROS for advanced IoT applications- Achieve superior control in your robot car with visi...
    Disponible

    86,29 €

  • أساسيات الإدارة الإستراتجية
    رشيد بلعريف
    تكمن أهمية هذا الكتاب في كون موضوع الإدارة الإستراتيجية و الجودة الشاملة عملية مستمرة , فالموارد البشرية تستمد قيمتها مما تملكه من معارف ومهارات وقدرات وهذه الأخيرة تتغير باستمرار وفقا لاحتياجات العمل و احتياجات الفرد نفسه و لذا فان موضوع الإدارة الإستراتيجية ومدى فعاليتها في تحقيق الجودة الشاملة يحقق التطوير المستمر لإدارة الموارد البشرية . كما انه من المواضيع المهمة في وقتنا ...
    Disponible

    32,88 €