Pen-Test Your Devices
HOW VULNERABLE is your network and the machines on it? Penetration testing distros such as Kali Linux aim to give you all the tools you need to hammer your own hardware. And we do mean your hardware, because this entails turning your Pi into a toolkit that could cause chaos when plugged into any other network. Like taking a crowbar to a windshield, it’s liable to land you in jail if that windshield doesn’t belong to you. Kali is a mature pen-testing distro, with over 600 tools for everything from vulnerability exploration to wireless attacking and digital forensics. www.kali.org