Credential harvester
Question:
Is a Raspberry PI, set up to perform credential harvesting at an office location for a long period of time, a viable attack vector?
How:
Build a battery powered Raspberry PI that is configured to run automated credential harvesting tools and plant that device at an office location.
Do you want more information, please contact:

Gianfranco Alongi Poblete
Head of Cyber Security
- +46 73 141 79 97
- gianfranco.alongi@zacco.com
- Stockholm

Johan Öman
Director Cyber Security Sweden Stockholm Team Manager
- +46 70 82 50 082
- johan.oman@zacco.com
- Stockholm