Loading...

Security Testing with Raspberry Pi by Dieterle Daniel

Security Testing with Raspberry Pi by Dieterle Daniel

Author:Dieterle, Daniel [Dieterle, Daniel]
Language: eng
Format: azw3
Published: 2019-06-30T16:00:00+00:00


All instructions on how to use Pi-Tail for different connection techniques are covered in the Pi-Tail How To:

https://github.com/Re4son/RPi-Tweaks/blob/master/pi-tail/Pi-Tail.HOWTO

Additional Tips here:

https://github.com/Re4son/RPi-Tweaks/blob/master/pi-tail/Pi-Tail.README

Follow the Pi-Tail instructions carefully, as there are multiple ways to setup the different features. It also matters where you plug your USB cable into the Pi Zero W, depending on what features you are using.

Conclusion

In this chapter we covered using Re4son’s “Sticky Finger Kali-Pi”. We showed that the main difference between this and the official Kali Raspberry Pi image is the enhanced support for touch, mainly the touch button interface. We finished the chapter by introducing “Pi-Tail”, the Kali-Pi solution for the Pi 0 W. Though we didn’t talk about it much, we will dig deeper into using the Pi 0 W for security testing later in the book.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(6553)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(5493)
Grails in Action by Glen Smith Peter Ledbrook(5151)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(2801)
Kotlin in Action by Dmitry Jemerov(2205)
Learn Windows PowerShell in a Month of Lunches by Don Jones(1633)
MCSA Windows Server 2016 Study Guide: Exam 70-740 by William Panek(1485)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(1381)
Blockchain Basics by Daniel Drescher(1329)
TCP IP by Todd Lammle(1326)
React Native - Building Mobile Apps with JavaScript by Novick Vladimir(1201)
The Age of Surveillance Capitalism by Shoshana Zuboff(1156)
Applied Network Security by Arthur Salmon & Michael McLafferty & Warun Levesque(1086)
Owning Bitcoin: The Illustrated Guide to Security, Privacy, and Potential by Apodaca Richard(1043)
The Art Of Deception by Kevin Mitnick(992)
Serious Cryptography: A Practical Introduction to Modern Encryption by Aumasson Jean-Philippe(970)
Wireless Hacking 101 by Karina Astudillo(954)
Networking A Beginner's Guide by Bruce Hallberg(951)
Blockchain: Ultimate Step By Step Guide To Understanding Blockchain Technology, Bitcoin Creation, and the future of Money (Novice to Expert) by Keizer Söze(930)
31 Days Before Your CompTIA A+ Exams (Shanette Luellen's Library) by Benjamin Patrick Conry(928)