Henry Dalziel | General Hacking Posts | May 23, 2013
Ever since Kali Linux was made available on ARM Architecture we have taken an even greater interest. Anyway – long story short, here are a bunch of resources we hope that you enjoy!
Installing (standard) Kali on the Raspberry Pi
Once you got yourself a large SD card go ahead and download the appropriate image and then apply the old school terminal command ‘dd’ which is basically like cloning an image over. In fact, ‘dd’ is used to make a backup copy of your hard drive (but use it wisely since you can easily make an error).
If your SD storage device is located at /dev/sdb2 then you would need to do something like this:
root@kali:~ dd if=kali-pi.img of=/dev/sdb2 bs=512k
That’s it. Be warned! It might take a long time to write the data to the SD card – but no fear, it will be just fine.
› For a better and more in-depth tutorial, hit up this post.
› To make a custom pentesting image for your Raspberry Pi then this tutorial is ideal.
› To watch a video (YouTube) on installing and configuring the Pi with Kali then this is certainly a great place to start.
Packet Sniffing with the Raspberry Pi
There are a gazillion uses for the Pi, but since this post is all about using the device for security purposes, let’s take a little look at network sniffing. To make this work, or at least, one method to get this to work is to use a surge protector with RJ-45 protection (recommended version) with a low-profile SD card adaptor for the Raspberry Pi, some few cables, a soldering iron, and some electrical tape. Here’s the tutorial for that.
Worth mentioning here that our friends over at Pwnie Express have some luxury versions of the above. They sell state-of-the-art penetration testing and hacking gear.
Another great tutorial on this (YouTube) is by the same guy that made the ‘how to configure Kali Linux’ on the Pi. Here’s the video on packet sniffing.
As a reminder, you should watch our Hacker Hotshot event (recorded video) since DJ talks a lot about the uses of the Pi when it comes to ethical hacking or penetration testing.
Slightly off-topic, but we also had to mention this post: Celebrate Pi Day With These 9 High-Tech Raspberry Pi Hacks.
What do you think? Is there a resource we should add? Please suggest it in the comments and thanks for reading this!