The proliferation of devices like the Raspberry Pi, Pineapple Express, PwnPi and more make it easier (and cheaper) than ever to obtain a complete stealth attack or defense arsenal.
In this session, we’ll take a low-cost, credit-card sized ARM computer, add some freely available software and see what we get. We’ll learn:
Hardware will include Cubox, Hummingboard, Raspberry Pi and more. Software will include Kali Linux and a multitude of offensive and defensive infosec tools.
You’ll come away from this session with a better understanding of how much you can accomplish with one of these devices and a healthier respect (or greater fear) of tiny computers.