Summary

This chapter focused on closing a penetration test or attacking exercise. Topics included removing your footprint from the systems that you breached, masking how you communicate with systems, and finally removing evidence that the Raspberry Pi was used for a penetration test. We closed this chapter by covering reporting options to create professional deliverables for your potential customers.

The next chapter will look at other ARM images, besides Kali Linux, that are available for the Raspberry Pi.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset