1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Tactical exploitation with Warberry Pi

Discussion in 'Help Net Security' started by RSS, Jun 15, 2016.

  1. RSS

    RSS New Member Member

    WarBerry Pi was built for red team engagements where it’s essential to obtain as much information as possible in a short period of time, while going undetected. All you need to do is find a network port and plug it in. WarBerry Pi has the capability to remain silent and observe what is happening on the network by sniffing IPs, MAC addresses and hostnames. It creates a profile that fits what’s normal for the organization, … More →

    Continue reading...

Share This Page