Zacco logotypeDigital Trust

Credential harvester

Question:

Is a Raspberry PI, set up to perform credential harvesting at an office location for a long period of time, a viable attack vector?

How:

Build a battery powered Raspberry PI that is configured to run automated credential harvesting tools and plant that device at an office location.

Do you want more information, please contact:

Johan Öman

Director Cyber Security Sweden Stockholm Team Manager