Raspberry Pi Setup: Lab vs Headless
The Raspberry Pi is an ideally versatile platform for pentesting, as you would have guessed by reading my previous posts since it is my device of choice. I wrote about several attacks performed with Kali Linux running on a Pi 3, but I didn't mention the different setups possible: lab or headless.
The lab setup
This is the config you have probably used while installing Kali Linux on the Pi. Here, you are interacting with the Pi directly and not through an intermediate device (more on that later): this is why you need to use a keyboard, mouse and monitor connected to the USB and HDMI ports respectively. The Pi is powered with a 5V/2A adapter plugged in a wall socket. I made a diagram to illustrate the setup:
This is called a "lab" setup for two reasons. First, it is meant to be rather permanent, in a fixed place, rather than portable. Second, this is usually the "laboratory" of the pentester, where he searches for new vulnerabilities and exploits them to make assessments and reports. However, this does not mean that the lab config cannot be used on the ground: professional-level pentesters or hackers will often scout a secluded location near their target to install their equipment for the duration of the attack, using a lab setup, to allow for more powerful antennas or processing power.
The lab setup provides a virtually infinite power source and allows for a comfortable experience with a keyboard and a monitor as big as needed. However, the major drawback is obviously its lack of mobility. It is not suitable for on-the-go jobs.
The headless setup
This setup is used when you need to be on the move. Here, the Pi is not physically connected to an external monitor, which is why it's referred to as a "headless Pi". Instead, it is connected to a Wifi network belonging to the pentester and accessed through this network via SSH or VNC. In this case, the behavior of the Pi becomes similar to that of a virtual machine installed on your laptop. Below is a diagram showcasing the setup:
Legend:
A good pentester will need both the lab and headless setups to operate, which is why it's important to be familiar with each of the components used in the configs.
The lab setup
This is the config you have probably used while installing Kali Linux on the Pi. Here, you are interacting with the Pi directly and not through an intermediate device (more on that later): this is why you need to use a keyboard, mouse and monitor connected to the USB and HDMI ports respectively. The Pi is powered with a 5V/2A adapter plugged in a wall socket. I made a diagram to illustrate the setup:
Fig.1 - Lab setup (click to enlarge) |
This is called a "lab" setup for two reasons. First, it is meant to be rather permanent, in a fixed place, rather than portable. Second, this is usually the "laboratory" of the pentester, where he searches for new vulnerabilities and exploits them to make assessments and reports. However, this does not mean that the lab config cannot be used on the ground: professional-level pentesters or hackers will often scout a secluded location near their target to install their equipment for the duration of the attack, using a lab setup, to allow for more powerful antennas or processing power.
The lab setup provides a virtually infinite power source and allows for a comfortable experience with a keyboard and a monitor as big as needed. However, the major drawback is obviously its lack of mobility. It is not suitable for on-the-go jobs.
The headless setup
This setup is used when you need to be on the move. Here, the Pi is not physically connected to an external monitor, which is why it's referred to as a "headless Pi". Instead, it is connected to a Wifi network belonging to the pentester and accessed through this network via SSH or VNC. In this case, the behavior of the Pi becomes similar to that of a virtual machine installed on your laptop. Below is a diagram showcasing the setup:
Fig.2 - Headless setup (click to enlarge) |
Legend:
- Raspberry Pi Model 2 or later running Kali Linux
- Power bank
- Monitor-mode & packet-injection capable USB Wifi adapter
- Integrated Wifi modem of the Pi
- Router or mobile hotspot (pentester's network)
- Pentester's device (laptop, tablet or mobile phone)
A good pentester will need both the lab and headless setups to operate, which is why it's important to be familiar with each of the components used in the configs.
Comments
Post a Comment
Share your thoughts! Leave a comment here