Stealth Attack From The Produce Aisle

The proliferation of devices like the Raspberry Pi, Pineapple Express, PwnPi and more make it easier (and cheaper) than ever to obtain a complete stealth attack or defense arsenal.

In this session, we’ll take a low-cost, credit-card sized ARM computer, add some freely available software and see what we get. We’ll learn:

  • What options are available to build such a device
  • How to build a working device
  • Add-ons including additional network adapters and wireless extenders
  • Overview of some commonly available software tools
  • How to conduct attack and defense scenarios.

Hardware will include Cubox, Hummingboard, Raspberry Pi and more. Software will include Kali Linux and a multitude of offensive and defensive infosec tools.

You’ll come away from this session with a better understanding of how much you can accomplish with one of these devices and a healthier respect (or greater fear) of tiny computers.

Presented by