C80e0de40a602519e54f6798abe8f49c

Abstract

Introduction to Raspberry Pi

  1. Raspberry Pi 3 As TOR Switch – Anonymize Your Browsing
    Know how to use a Raspberry Pi 3 as to set up as TOR network router. This will help in Surfing the Internet securely with your very own portable WiFi VPN/TOR router.
    The connection encrypts your internet traffic so that hackers and spies can’t figure out what web sites you are visiting, and the web sites you are visiting can’t tell which computer you are surfing from.

  2. Rapsberry Pi 3 as Firewall & Intrusion Detection System

    • Enforce network traffic policies.
    • Ensure that abnormal packets does not get out or in our network.
    • DHCP server to distribute network parameters to your LAN.
    • DNS cache/server to speed up DNS requests and filter out bad DNS queries.
    • NIDS to detect malicious traffic, such as malware or vulnerability exploits.
    • Central network monitoring node to watch and debug network traffic.
  3. Wifi Attack & Social Engineering
    Cracking WPA2 Wifi networks capturing 4-Way handshake from a WPA2 WiFi network and perform offline brute-force attempt at find the password for the WiFi network.
    Wifi hacking using Social Engineering and phishing attack. Setting up a Rogue Access Point on the Raspberry Pi is very easy. Our Access Point will act as a fake network providing free WiFi for our victim. It will have a captive portal which means any website that a user visits will be redirected to our login page where they will need to enter in their credentials to login.

  4. Raspberry Pi For Domain Compromise
    Attacking corporate domain network.Setting up Raspberry Pi to poison LLMNR and NBT-NS Poison.
    MultiRelay is a module in Responder that allows targeted attacks using NTLMv1 and NTLMv2 relay. MultiRelay takes advantage of commonly misconfigured Windows environments not enforcing SMB signing.

Speaker

Sanket

Penetration Tester/Security Analyst
Incident response

Certifications : C|EH ,OSCP

Qualification: B.E E&TC

Interests: Information security innovations

Timing

Starts at Saturday June 23 2018, 10:10 AM. The sessions runs for about 5 hours.

Resources