The Components

The project is composed of three main components that when used together offer a unique and robust penetration testing package.  The hardware being used is the Raspberry Pi, the operating system is Kali Linux, and Wireshark is used to capture and filter network packets.   The Components section offers a brief overview, history, and uses of each of the above tools used in the attack.  Visit each section to understand how each is leveraged to remotely capture network data.

Raspberry Pi

RaspberryPi_Logo2

Permission to use from http://raspberrypi.org

Small ARM based computer with more power than the Apollo Moon missions.

Kali Linux

kali-site-logo2

Permission to use provided by http://kali.org

A collection of security and forensic tools built on a strong and popular Linux platform.

Wireshark

Wireshark Image

Permission to use by http://wireshark.org

The world’s most popular packet capture and network analysis program.