![]() In designing this tutorial, I considered two primary modes in which you would be operating the Raspberry Pi. ![]() Case (optional): Every Pi needs a case to protect it.Bluetooth keyboard (optional): A Bluetooth keyboard is helpful for interfacing when you have an HDMI connection.Specialized attacks like PoisonTap can also take advantage of ethernet interfaces to infiltrate computers. Ethernet cable (optional): An Ethernet cable allows you to bypass wireless authentication by directly interfacing with local networks to which you have physical access.This allows for a number of different battery configurations to suit long-endurance reconnaissance or continuously powered operations. Power supply: The Raspberry Pi uses a standard Micro-USB power supply, and nearly any Android phone charger or battery pack will work to power a Pi.Computer: You will also need a computer to download the firmware to load onto the micro SD card.By creating customized cards, it is possible to rapidly change the configuration and function of a Raspberry Pi by simply swapping the card and components. OS build cards: The micro SD card hosts the OS and brain of the computer and can be precisely configured for any desired environment.You can find a great guide to choosing one here.ĭon't Miss: Choosing a Wireless Adapter for Hacking This will be our attack surface and can be a long-range, short-range, or directional antenna depending on attack requirements. Wireless attack card:: Our attack wireless card will be a Kali Linux-compatible Wi-Fi adapter capable of packet injection. ![]() Fortunately for us, the Raspberry Pi 3 has a Wi-Fi card internally, but a wireless network adapter can also be added to a Raspberry Pi 2. This allows remote control of the Pi discreetly or from a great distance via SSH (Secure Shell) or VNC (Virtual Network Computing).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |