The Components

The project is composed of three main components that when used together offer a unique and robust penetration testing package.  The hardware being used is the Raspberry Pi, the operating system is Kali Linux, and Wireshark is used to capture and filter network packets.   The Components section offers a brief overview, history, and uses of each of the above tools used in the attack.  Visit each section to understand how each is leveraged to remotely capture network data.

Raspberry Pi


Permission to use from

Small ARM based computer with more power than the Apollo Moon missions.

Kali Linux


Permission to use provided by

A collection of security and forensic tools built on a strong and popular Linux platform.


Wireshark Image

Permission to use by

The world’s most popular packet capture and network analysis program.