Stealth Attack From The Produce Aisle

Stealth Attack From The Produce Aisle

The proliferation of devices like the Raspberry Pi, Pineapple Express, PwnPi and more make it easier (and cheaper) than ever to obtain a complete stealth attack or defense arsenal.

In this session, we’ll take a low-cost, credit-card sized ARM computer, add some freely available software and see what we get. We’ll learn:

  • What options are available to build such a device
  • How to build a working device
  • Add-ons including additional network adapters and wireless extenders
  • Overview of some commonly available software tools
  • How to conduct attack and defense scenarios.

Hardware will include Cubox, Hummingboard, Raspberry Pi and more. Software will include Kali Linux and a multitude of offensive and defensive infosec tools.

You’ll come away from this session with a better understanding of how much you can accomplish with one of these devices and a healthier respect (or greater fear) of tiny computers.

Presented by

Links