Getting data to the Pi

One of the most important tasks to keep in mind for a lot of the tools we are discussing here is making sure data flows through or to our Raspberry Pi. In order to be the man-in-the-middle (MITM), we need to make sure traffic flows from the source target, through our Pi, to the destination target. This way, we can eavesdrop on the conversation and do what we need to do.

With the Raspberry Pi, there are a couple ways to accomplish this. One involves physically putting our Raspberry Pi on the network, inline between the two targets. For the other two options, we will redirect traffic to the Raspberry Pi.

Physically inline option

Having our Pi physically inline between the source and destination target makes sniffing the traffic ...

Get Penetration Testing with Raspberry Pi - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.