Summary

This last chapter provided additional tools and use cases for using a Raspberry Pi. We briefly covered some alternative penetration testing arsenals to Kali Linux, but believe Kali Linux should see the most innovation based on its popularity in the IT community. We also touched upon ARM images that can be used for defensive purposes such as firewalls, IPS/IDS, and VPN. We closed with some fun ARM images that are not necessarily security-related, but cool regardless.

This wraps up this book. Hopefully, you enjoyed reading it. We would love to hear from you. Feel free to reach us on our respective blogs and share your thoughts. Aamir Lakhani can be reached at www.drchaos.com and Joseph Muniz can be reached at www.thesecurityblogger.com. We had a ton of fun working through the topics covered and wish you the best with your Raspberry Pi experience. That includes those looking to do good or evil with this new knowledge. Aamir really wanted to close with the Spiderman quote about responsibility. So against Joseph's suggestion, here it is: "With great power comes great responsibility". Have fun and happy hacking!

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset