Weaponizing Your Pi presented at CactusCon 2018

by John Freimuth,

Summary : Pentesting requires you to think outside the box and come up with new and inventive ways to crack the perimeter. With computers becoming constantly smaller, faster, and cheaper, "Weaponizing Your Pi" focuses on using these micro systems to gain a foot hold while staying undetected. We will take a Raspberry Pi III and configure for three different scenarios: A low profile, portable, autonomous, wireless, custom credential stealing tool. A Kali dropbox that is accessible through cell communications. Finally a low profile VOIP network attack tool with a quick tutorial on how to bypass a Cisco lock box to setup the attack. A link to the resources used to create the device configurations will be provided at the end.