Housekeeping and basic stealth for Raspberry Pi with Kali Linux

Prepare your gear for enemy territory

( 6 minutes )

Raspberry Pi with Kali Linux I hope you have not missed Raspberry Pi, the single-board computers created for promoting teaching of basic computer science in schools, but have found usage in so many ways. One such usage is portable ‘hacking stations’ where the Raspberry Pi is operated by an OS for penetration testing, most commonly the Kali Linux distro. For the penetration tester in the field it can be very convenient to have a portable rig that can crack Wi-Fi passwords, spoof networks, audit systems and much more. [Read More]


Information Gathering

( 5 minutes )

Reconnaissance This is the first part in my blog series on the Kill Chain where I go deeper into the parts of the Unified model. This part is about the reconnaissance phase. What is it? Reconnaissance, is yet another term from the military world, it is “the exploration outside an area occupied by friendly forces to gain information about natural features and other activities in the area” (Wikipedia). By using various detection methods you obtain information about the activities and resources of your opponent. [Read More]

The Kill Chain

Models of Cyber Intrusion

( 2 minutes )

The Kill Chain There is this concept of the “kill chain” in the area of penetration testing. As you would expect, the term comes from the military. As Wikipedia explains, it first was used to describe the phases of a military attack; first target identification, then force dispatch to target, then decision to attack target, and finally the destruction of the target. Cyber Kill Chain It was Lockheed Martin that started to apply this concept to information security. [Read More]