Microcomputer or USB-based attack agents

We have noticed a significant increase in using microcomputers and USB based devices in RTE/penetration testing. These are mainly used due to their compactness, they can be hidden anywhere in the network and also can run almost anything that a full fledged laptop can. In this section, we will explore the most commonly used devices, the Raspberry Pi and Malduino USB.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.216.114.23