Weaponizing Your Pi

Pentesting requires you to think outside the box and come up with new and inventive ways to crack the perimeter.  With computers becoming constantly smaller, faster, and cheaper, "Weaponizing Your Pi" focuses on using these micro systems to gain a foot hold while staying undetected. We will take a Raspberry Pi III and configure for three different scenarios: A low profile, portable, autonomous, wireless, custom credential stealing tool. A Kali dropbox that is accessible through cell communications. Finally a low profile VOIP network attack tool with a quick tutorial on how to bypass a Cisco lock box to setup the attack.  A link to the resources used to create the device configurations will be provided at the end.

John Freimuth

John Freimuth - In Security since 2010, but professionally since 2012. Currently pentesting with a health company in the valley. You might remember me from such talks as "Return of the Dork" or "Wrangling Malware for Fun and Pentesting."