Wrapping it up with an example

Going back to our example from the beginning of the chapter, let's see how the topics covered in this chapter would apply to the real world. To recap on the situation, we had a customer with multiple international locations requiring on-site penetration testing services at an affordable price. To meet this challenge, we put together a Raspberry Pi hosting Kali Linux kit that cost us under a hundred dollars to construct per location. We sent a kit to each location and had a local person connect the Raspberry Pi to the local network. The method of connection and the tools that we ran will be covered in the next chapter.

Each local site was not aware of our service engagement, so we had to work around existing security such as firewalls configured to block outbound connections. To do this, we set up stunnel over a mail port and accessed all Raspberry Pi kits from a MacBook running Kali Linux. This gave us a centralized command and control point for each Raspberry Pi and a method to offload anything requiring heavy processes. At this point, we started launching various attacks from each Raspberry Pi from our home office in USA.

The total cost of this approach versus charging for travel and on-site services, which was night and day based, was as per initial budget expectations. The customer was happy to pay a few hundred dollars for hardware cost per site since we had a markup for time for construction and shipping. Outside of that, we charged for our services and that was it, making the overall project affordable and successful.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset