How Hackers Discover & Attack Raspberry Pis On A Network

gbFIlV8Sems/default.jpg

How Rpi-hunter Works to Grab Credentials
Full Video: https://nulb.app/z4i8p
Subscribe to Null Byte: https://goo.gl/J6wEnH
Kody's Twitter:ร‚ https://twitter.com/KodyKinzie

Cyber Weapons Lab, Episode 084 (Recut - Partial Episode)

One of the most common mistakes a person makes with a new device is failing to change any default passwords. That leaves that device vulnerable to attack. On this episode of Cyber Weapons Lab, weรข€™ll show you a tool that hackers and pentesters use called rpi-hunter, which can discover and attack any vulnerable Raspberry Pi on a network. While it's meant for scanning a local network, if the Pis are connected to the internet, they're fair game too.

Raspberry Pi 4: https://amzn.to/2PHLihL
Raspberry Pi 3 Model B+: https://amzn.to/38jg2Mq
Raspberry Pi Zero W: https://amzn.to/2TzFtE6
Other Raspberry Pis: https://amzn.to/2PG7jgO

To learn more, check out the article and more in-depth video on our website: https://nulb.app/z4i8p

Follow Null Byte on:
Twitter: https://twitter.com/nullbyte
Flipboard: https://flip.it/3.Gf_0
Website: https://null-byte.com
Weekly newsletter: https://eepurl.com/dE3Ovb
Vimeo: https://vimeo.com/channels/nullbyte

gbFIlV8Sems/default.jpg
How Hackers Discover & Attack Raspberry Pis On A Network How Hackers Discover & Attack Raspberry Pis On A Network Reviewed by Anonymous on March 02, 2020 Rating: 5