S?t?e?a?l?i?n?g? Harvesting Credentials with a Raspberry Pi Zero
Chris Taylor, CISSP
Leading Cybersecurity Expert Driving IT Strategy at Mittenpunkt
It’s been a long time since I’ve written anything. I’ve been busy. I decided to get my technical juices flowing again and work on something fun. I did the Holiday hack challenges, etc…
I’ve been sitting on my Raspberry Pi Zero W for quite some time in between projects looking for something fun and interesting to do with it.
I was practicing some skills and came across the?Responder?tool and thought it would be fun to have a portable version of it, so I naturally looked into running it on a Raspberry Pi. After some Googling, it quickly became apparent that I was definitely not the first to have this idea. It appeared well-documented. But alas, I started working on it anyway for my own edification But alas, as I started working on it, there were tribbles everywhere. This project took significantly longer than I expected,?especially?given the number of people?claiming?to have done this. I say claiming because I was never able to reproduce anyone’s results by following instructions provided.
I will resolve this dilemma! Since you’re here, you’re probably at least vaguely aware of what?Responder?is and more than comfortable working your way around a?Raspberry Pi; so I’ll skip the background blah blah blah. That said, you can use the links above to learn more. Maybe one day I’ll do a separate write-up on each of these (but don’t hold your breath on that).
See the full write-up on my blog: