Weaponized RaspberryPi in Red Team Engagements
Offered By: DefCamp via YouTube
Course Description
Overview
Explore the potential of weaponized RaspberryPi devices in Red Team engagements through this 27-minute conference talk from DefCamp 2017. Gain insights into how these small, versatile computers can be utilized for penetration testing and security assessments. Learn about the various applications and techniques employed by Red Teams to simulate real-world cyber attacks using RaspberryPi. Discover the latest research and practices in the field of information security, presented by experts at one of Central and Eastern Europe's most significant hacking and cybersecurity conferences. Enhance your understanding of offensive security strategies and the innovative use of low-cost hardware in professional security testing scenarios.
Syllabus
DefCamp 2017 - Weaponized RaspberryPi in Red Team Engagements
Taught by
DefCamp
Related Courses
The Model of Post-Quantum Signature Using Verkle Tree - DefCamp - 2022DefCamp via YouTube The Anatomy of Wiper Malware - DefCamp - 2022
DefCamp via YouTube Internet Balkanization in an Era of Military Conflict - Dan Demeter - DefCamp - 2022
DefCamp via YouTube How We Analyzed and Built an Exploit PoC for CVE-2022-24086, a Magento RCE - Catalin Filip - DefCamp - 2022
DefCamp via YouTube To Log, or Not to Log! That Is the Question - DefCamp - 2022
DefCamp via YouTube