Tech

Stealth Attack From The Produce Aisle


Expo Theatre (Hall G) October 20, 2015 - Feedback   

Bookmark and Share

Todd Dow
Keith Benedict

The proliferation of devices like the Raspberry Pi, Pineapple Express, PwnPi and more make it easier (and cheaper) than ever to obtain a complete stealth attack or defense arsenal.

In this session, we’ll take a low-cost, credit-card sized ARM computer, add some freely available software and see what we get. We’ll learn:

  • what options are available to build such a device
  • how to build a working device
  • add-ons including additional network adapters and wireless extenders
  • overview of some commonly available software tools
  • how to conduct attack and defense scenarios

Hardware will include Cubox, Hummingboard, Raspberry Pi and more. Software will include Kali Linux and a multitude of offensive and defensive infosec tools.

You’ll come away from this session with a better understanding of how much you can accomplish with one of these devices and a healthier respect (or greater fear) of tiny computers.