Is a Raspberry PI, set up to perform credential harvesting at an office location for a long period of time, a viable attack vector?
Build a battery powered Raspberry PI that is configured to run automated credential harvesting tools and plant that device at an office location.
Do you want more information, please contact:
Gianfranco Alongi Poblete
Head of Cyber Security
Director Cyber Security Sweden Stockholm Team Manager