YoVDO

Weaponized RaspberryPi in Red Team Engagements

Offered By: DefCamp via YouTube

Tags

DefCamp Courses Ethical Hacking Courses Penetration Testing Courses Offensive Security Courses

Course Description

Overview

Explore the potential of weaponized RaspberryPi devices in Red Team engagements through this 27-minute conference talk from DefCamp 2017. Gain insights into how these small, versatile computers can be utilized for penetration testing and security assessments. Learn about the various applications and techniques employed by Red Teams to simulate real-world cyber attacks using RaspberryPi. Discover the latest research and practices in the field of information security, presented by experts at one of Central and Eastern Europe's most significant hacking and cybersecurity conferences. Enhance your understanding of offensive security strategies and the innovative use of low-cost hardware in professional security testing scenarios.

Syllabus

DefCamp 2017 - Weaponized RaspberryPi in Red Team Engagements


Taught by

DefCamp

Related Courses

The Model of Post-Quantum Signature Using Verkle Tree - DefCamp - 2022
DefCamp via YouTube
The Anatomy of Wiper Malware - DefCamp - 2022
DefCamp via YouTube
Internet Balkanization in an Era of Military Conflict - Dan Demeter - DefCamp - 2022
DefCamp via YouTube
How We Analyzed and Built an Exploit PoC for CVE-2022-24086, a Magento RCE - Catalin Filip - DefCamp - 2022
DefCamp via YouTube
To Log, or Not to Log! That Is the Question - DefCamp - 2022
DefCamp via YouTube