楼主: cmwei333
1188 2

Penetration Testing with Raspberry Pi (2016, 2e), epub + mobi [推广有奖]

贵宾

已卖:205132份资源

泰斗

1%

还不是VIP/贵宾

-

TA的文库  其他...

【历史+心理学+社会自然科学】

【数学+统计+计算机编程】

【金融+经济+商学+国际政治】

威望
6
论坛币
3606723 个
通用积分
1126.8451
学术水平
4327 点
热心指数
4650 点
信用等级
3957 点
经验
363248 点
帖子
9795
精华
9
在线时间
2842 小时
注册时间
2015-2-9
最后登录
2017-1-29

初级热心勋章 中级热心勋章 高级热心勋章 初级信用勋章 中级信用勋章 初级学术勋章 特级热心勋章 中级学术勋章 高级信用勋章 高级学术勋章 特级学术勋章 特级信用勋章

楼主
cmwei333 发表于 2016-12-7 04:16:13 |AI写论文

+2 论坛币
k人 参与回答

经管之家送您一份

应届毕业生专属福利!

求职就业群
赵安豆老师微信:zhaoandou666

经管之家联合CDA

送您一个全额奖学金名额~ !

感谢您参与论坛问题回答

经管之家送您两个论坛币!

+2 论坛币
Penetration Testing with Raspberry Pi - Second Edition

Michael McPhee, Jason Beltrame

cover.jpg

Learn the art of building a low-cost, portable hacking arsenal using Raspberry Pi 3 and Kali Linux 2

This book will show you how to utilize the latest credit card sized Raspberry Pi 3 and create a portable, low-cost hacking tool using Kali Linux 2.

You’ll begin by installing and tuning Kali Linux 2 on Raspberry Pi 3 and then get started with penetration testing. You will be exposed to various network security scenarios such as wireless security, scanning network packets in order to detect any issues in the network, and capturing sensitive data. You will also learn how to plan and perform various attacks such as man-in-the-middle, password cracking, bypassing SSL encryption, compromising systems using various toolkits, and many more. Finally, you’ll see how to bypass security defenses and avoid detection, turn your Pi 3 into a honeypot, and develop a command and control system to manage a remotely-placed Raspberry Pi 3.

By the end of this book you will be able to turn Raspberry Pi 3 into a hacking arsenal to leverage the most popular open source toolkit, Kali Linux 2.0.

What You Will Learn

Install and tune Kali Linux 2 on a Raspberry Pi 3 for hacking
Learn how to store and offload pentest data from the Raspberry Pi 3
Plan and perform man-in-the-middle attacks and bypass advanced encryption techniques
Compromise systems using various exploits and tools using Kali Linux 2
Bypass security defenses and remove data off a target network
Develop a command and control system to manage remotely placed Raspberry Pis
Turn a Raspberry Pi 3 into a honeypot to capture sensitive information

EPUB + MOBI:

本帖隐藏的内容

EPUB:
Penetration Testing with Raspberry Pi (2nd Edition).epub (19.71 MB, 需要: 20 个论坛币)

MOBI:
Penetration Testing with Raspberry Pi (2nd Edition).mobi (20.54 MB, 需要: 20 个论坛币)

EPUB 压缩包:
Penetration Testing with Raspberry Pi (2e, epub).zip (16.77 MB, 需要: 20 个论坛币) 本附件包括:
  • Penetration Testing with Raspberry Pi (2nd Edition).epub


MOBI 压缩包:
Penetration Testing with Raspberry Pi (2e, mobi).zip (16.87 MB, 需要: 20 个论坛币) 本附件包括:
  • Penetration Testing with Raspberry Pi (2nd Edition).mobi


EPUB + MOBI 压缩包:
Penetration Testing with Raspberry Pi (2e, epub mobi).zip (33.64 MB, 需要: 40 个论坛币) 本附件包括:
  • Penetration Testing with Raspberry Pi (2nd Edition).mobi
  • Penetration Testing with Raspberry Pi (2nd Edition).epub



二维码

扫码加我 拉你入群

请注明:姓名-公司-职位

以便审核进群资格,未注明则拒绝

关键词:Raspberry TESTING ration Berry ATION building security network testing started

本帖被以下文库推荐

bbs.pinggu.org/forum.php?mod=collection&action=view&ctid=3257
bbs.pinggu.org/forum.php?mod=collection&action=view&ctid=3258
bbs.pinggu.org/forum.php?mod=collection&action=view&ctid=3259

沙发
franky_sas(未真实交易用户) 发表于 2016-12-8 11:32:04

藤椅
leon_9930754(未真实交易用户) 发表于 2016-12-14 01:59:11
谢谢分享

您需要登录后才可以回帖 登录 | 我要注册

本版微信群
加好友,备注jltj
拉您入交流群
GMT+8, 2026-1-6 10:01