S?t?e?a?l?i?n?g? Harvesting Credentials with a Raspberry Pi Zero
Raspberry Pi Zero W

S?t?e?a?l?i?n?g? Harvesting Credentials with a Raspberry Pi Zero

It’s been a long time since I’ve written anything. I’ve been busy. I decided to get my technical juices flowing again and work on something fun. I did the Holiday hack challenges, etc…

I’ve been sitting on my Raspberry Pi Zero W for quite some time in between projects looking for something fun and interesting to do with it.

I was practicing some skills and came across the?Responder?tool and thought it would be fun to have a portable version of it, so I naturally looked into running it on a Raspberry Pi. After some Googling, it quickly became apparent that I was definitely not the first to have this idea. It appeared well-documented. But alas, I started working on it anyway for my own edification But alas, as I started working on it, there were tribbles everywhere. This project took significantly longer than I expected,?especially?given the number of people?claiming?to have done this. I say claiming because I was never able to reproduce anyone’s results by following instructions provided.

I will resolve this dilemma! Since you’re here, you’re probably at least vaguely aware of what?Responder?is and more than comfortable working your way around a?Raspberry Pi; so I’ll skip the background blah blah blah. That said, you can use the links above to learn more. Maybe one day I’ll do a separate write-up on each of these (but don’t hold your breath on that).

See the full write-up on my blog:


要查看或添加评论,请登录

Chris Taylor, CISSP的更多文章

  • Governance added to NIST Cybersecurity Framework v2.0

    Governance added to NIST Cybersecurity Framework v2.0

    The NIST CSF has added a sixth function to the original 5 functions that we know and love. In addition to the original…

  • Building a Better Leprechaun Trap

    Building a Better Leprechaun Trap

    My son is in elementary school. Last year (2021), he learned about Saint Patrick’s day and the cheeky shenanigans of…

    5 条评论
  • Is it Time for a Federal Data Privacy Law in the United States?

    Is it Time for a Federal Data Privacy Law in the United States?

    Data privacy is appearing in the news with increasing regularity. But what exactly is meant by “data privacy?” The…

  • Attack of the QR Codes

    Attack of the QR Codes

    The seemingly benign QR (Quick Response) code is nearly everywhere you look these days. They are useful – simply point…

    4 条评论
  • The Impacts of IT on Physical Security

    The Impacts of IT on Physical Security

    When you think of physical security, I’m sure locks, CCTV, and security guards come to mind. These are all still…

  • Remote Work

    Remote Work

    I originally drafted this at the beginning of April. But given how crazy things have been, I haven't had time to finish…

    1 条评论
  • Back to Basics

    Back to Basics

    Annual cybersecurity spending is rapidly increasing, with worldwide cumulative spend to exceed $1 Trillion from 2017 to…

    2 条评论
  • Better Marking of Information

    Better Marking of Information

    Before I dive into a better way of marking information, we need to first understand what information marking is and why…

    2 条评论
  • Security Through Obscurity

    Security Through Obscurity

    noun: obscurity the state of being unknown, inconspicuous, or unimportant. Synonyms: insignificance, inconspicuousness,…

    1 条评论

社区洞察

其他会员也浏览了