{"id":15294,"date":"2016-08-20T10:30:14","date_gmt":"2016-08-20T09:30:14","guid":{"rendered":"http:\/\/www.recantha.co.uk\/blog\/?p=15294"},"modified":"2016-08-20T07:40:58","modified_gmt":"2016-08-20T06:40:58","slug":"easy-penetration-testing-using-your-raspberry-pi-and-warberry-pi","status":"publish","type":"post","link":"https:\/\/www.recantha.co.uk\/blog\/?p=15294","title":{"rendered":"Easy penetration testing using your Raspberry Pi and Warberry Pi"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/i0.wp.com\/github.com\/secgroundzero\/warberry\/raw\/master\/SCREENS\/Warberry_Logo_Transparent.png?resize=320%2C57&#038;ssl=1\" alt=\"\" width=\"320\" height=\"57\" \/><\/p>\n<p>It has been possible to do penetration testing using your Pi for some time now, particularly with <a href=\"http:\/\/lifehacker.com\/how-to-build-a-portable-hacking-station-with-a-raspberr-1739297918\" target=\"_blank\">Kali Linux<\/a>. However, it has now been made even simpler with a set of scripts known as Warberry Pi. The set of scripts runs when you plug in an Ethernet cable and collects as much information as it can about your network. You can then get the data off via SSH or by looking at the Pi directly. <a href=\"https:\/\/github.com\/secgroundzero\/warberry\" target=\"_blank\">Full instructions and all the code can be found on GitHub<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It has been possible to do penetration testing using your Pi for some time now, particularly with Kali Linux. However, it has now been made even simpler with a set of scripts known as Warberry Pi. The set of scripts&hellip;<\/p>\n<p class=\"more-link-p\"><a class=\"more-link\" href=\"https:\/\/www.recantha.co.uk\/blog\/?p=15294\">Read more &rarr;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"jetpack_post_was_ever_published":false},"categories":[33,46,49],"tags":[],"class_list":["post-15294","post","type-post","status-publish","format-standard","hentry","category-networking","category-security","category-software"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Easy penetration testing using your Raspberry Pi and Warberry Pi - Raspberry Pi Pod<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.recantha.co.uk\/blog\/?p=15294\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Easy penetration testing using your Raspberry Pi and Warberry Pi - Raspberry Pi Pod\" \/>\n<meta property=\"og:description\" content=\"It has been possible to do penetration testing using your Pi for some time now, particularly with Kali Linux. However, it has now been made even simpler with a set of scripts known as Warberry Pi. The set of scripts&hellip;Read more &rarr;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.recantha.co.uk\/blog\/?p=15294\" \/>\n<meta property=\"og:site_name\" content=\"Raspberry Pi Pod\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/recantha\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-08-20T09:30:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/github.com\/secgroundzero\/warberry\/raw\/master\/SCREENS\/Warberry_Logo_Transparent.png\" \/>\n<meta name=\"author\" content=\"Michael Horne\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@recantha\" \/>\n<meta name=\"twitter:site\" content=\"@recantha\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Horne\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.recantha.co.uk\\\/blog\\\/?p=15294#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.recantha.co.uk\\\/blog\\\/?p=15294\"},\"author\":{\"name\":\"Michael Horne\",\"@id\":\"https:\\\/\\\/www.recantha.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/c27c4ef2ee1c18b130f1fcd5dcdbb263\"},\"headline\":\"Easy penetration testing using your Raspberry Pi and Warberry Pi\",\"datePublished\":\"2016-08-20T09:30:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.recantha.co.uk\\\/blog\\\/?p=15294\"},\"wordCount\":96,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.recantha.co.uk\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.recantha.co.uk\\\/blog\\\/?p=15294#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/github.com\\\/secgroundzero\\\/warberry\\\/raw\\\/master\\\/SCREENS\\\/Warberry_Logo_Transparent.png\",\"articleSection\":[\"Networking\",\"Security\",\"Software\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.recantha.co.uk\\\/blog\\\/?p=15294#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.recantha.co.uk\\\/blog\\\/?p=15294\",\"url\":\"https:\\\/\\\/www.recantha.co.uk\\\/blog\\\/?p=15294\",\"name\":\"Easy penetration testing using your Raspberry Pi and Warberry Pi - Raspberry Pi Pod\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.recantha.co.uk\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.recantha.co.uk\\\/blog\\\/?p=15294#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.recantha.co.uk\\\/blog\\\/?p=15294#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/github.com\\\/secgroundzero\\\/warberry\\\/raw\\\/master\\\/SCREENS\\\/Warberry_Logo_Transparent.png\",\"datePublished\":\"2016-08-20T09:30:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.recantha.co.uk\\\/blog\\\/?p=15294#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.recantha.co.uk\\\/blog\\\/?p=15294\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.recantha.co.uk\\\/blog\\\/?p=15294#primaryimage\",\"url\":\"https:\\\/\\\/github.com\\\/secgroundzero\\\/warberry\\\/raw\\\/master\\\/SCREENS\\\/Warberry_Logo_Transparent.png\",\"contentUrl\":\"https:\\\/\\\/github.com\\\/secgroundzero\\\/warberry\\\/raw\\\/master\\\/SCREENS\\\/Warberry_Logo_Transparent.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.recantha.co.uk\\\/blog\\\/?p=15294#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.recantha.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Easy penetration testing using your Raspberry Pi and Warberry Pi\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.recantha.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.recantha.co.uk\\\/blog\\\/\",\"name\":\"Raspberry Pi Pod\",\"description\":\"Experiences with the Raspberry Pi micro computer and microcontroller\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.recantha.co.uk\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.recantha.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.recantha.co.uk\\\/blog\\\/#organization\",\"name\":\"Raspberry Pi Pod\",\"url\":\"https:\\\/\\\/www.recantha.co.uk\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.recantha.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.recantha.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/03\\\/cropped-PiPod-Logo-v3.png?fit=800%2C337&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.recantha.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/03\\\/cropped-PiPod-Logo-v3.png?fit=800%2C337&ssl=1\",\"width\":800,\"height\":337,\"caption\":\"Raspberry Pi Pod\"},\"image\":{\"@id\":\"https:\\\/\\\/www.recantha.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/recantha\\\/\",\"https:\\\/\\\/x.com\\\/recantha\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/recantha\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCK4F9blabxzmk8Inzhs8tpg\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.recantha.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/c27c4ef2ee1c18b130f1fcd5dcdbb263\",\"name\":\"Michael Horne\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/479778b0677caadde0ceb54c4129804ef674914607e3ed0998808148357d10d8?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/479778b0677caadde0ceb54c4129804ef674914607e3ed0998808148357d10d8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/479778b0677caadde0ceb54c4129804ef674914607e3ed0998808148357d10d8?s=96&d=mm&r=g\",\"caption\":\"Michael Horne\"},\"url\":\"https:\\\/\\\/www.recantha.co.uk\\\/blog\\\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Easy penetration testing using your Raspberry Pi and Warberry Pi - Raspberry Pi Pod","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.recantha.co.uk\/blog\/?p=15294","og_locale":"en_US","og_type":"article","og_title":"Easy penetration testing using your Raspberry Pi and Warberry Pi - Raspberry Pi Pod","og_description":"It has been possible to do penetration testing using your Pi for some time now, particularly with Kali Linux. However, it has now been made even simpler with a set of scripts known as Warberry Pi. The set of scripts&hellip;Read more &rarr;","og_url":"https:\/\/www.recantha.co.uk\/blog\/?p=15294","og_site_name":"Raspberry Pi Pod","article_publisher":"https:\/\/www.facebook.com\/recantha\/","article_published_time":"2016-08-20T09:30:14+00:00","og_image":[{"url":"https:\/\/github.com\/secgroundzero\/warberry\/raw\/master\/SCREENS\/Warberry_Logo_Transparent.png","type":"","width":"","height":""}],"author":"Michael Horne","twitter_card":"summary_large_image","twitter_creator":"@recantha","twitter_site":"@recantha","twitter_misc":{"Written by":"Michael Horne"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.recantha.co.uk\/blog\/?p=15294#article","isPartOf":{"@id":"https:\/\/www.recantha.co.uk\/blog\/?p=15294"},"author":{"name":"Michael Horne","@id":"https:\/\/www.recantha.co.uk\/blog\/#\/schema\/person\/c27c4ef2ee1c18b130f1fcd5dcdbb263"},"headline":"Easy penetration testing using your Raspberry Pi and Warberry Pi","datePublished":"2016-08-20T09:30:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.recantha.co.uk\/blog\/?p=15294"},"wordCount":96,"commentCount":0,"publisher":{"@id":"https:\/\/www.recantha.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/www.recantha.co.uk\/blog\/?p=15294#primaryimage"},"thumbnailUrl":"https:\/\/github.com\/secgroundzero\/warberry\/raw\/master\/SCREENS\/Warberry_Logo_Transparent.png","articleSection":["Networking","Security","Software"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.recantha.co.uk\/blog\/?p=15294#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.recantha.co.uk\/blog\/?p=15294","url":"https:\/\/www.recantha.co.uk\/blog\/?p=15294","name":"Easy penetration testing using your Raspberry Pi and Warberry Pi - Raspberry Pi Pod","isPartOf":{"@id":"https:\/\/www.recantha.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.recantha.co.uk\/blog\/?p=15294#primaryimage"},"image":{"@id":"https:\/\/www.recantha.co.uk\/blog\/?p=15294#primaryimage"},"thumbnailUrl":"https:\/\/github.com\/secgroundzero\/warberry\/raw\/master\/SCREENS\/Warberry_Logo_Transparent.png","datePublished":"2016-08-20T09:30:14+00:00","breadcrumb":{"@id":"https:\/\/www.recantha.co.uk\/blog\/?p=15294#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.recantha.co.uk\/blog\/?p=15294"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.recantha.co.uk\/blog\/?p=15294#primaryimage","url":"https:\/\/github.com\/secgroundzero\/warberry\/raw\/master\/SCREENS\/Warberry_Logo_Transparent.png","contentUrl":"https:\/\/github.com\/secgroundzero\/warberry\/raw\/master\/SCREENS\/Warberry_Logo_Transparent.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.recantha.co.uk\/blog\/?p=15294#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.recantha.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Easy penetration testing using your Raspberry Pi and Warberry Pi"}]},{"@type":"WebSite","@id":"https:\/\/www.recantha.co.uk\/blog\/#website","url":"https:\/\/www.recantha.co.uk\/blog\/","name":"Raspberry Pi Pod","description":"Experiences with the Raspberry Pi micro computer and microcontroller","publisher":{"@id":"https:\/\/www.recantha.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.recantha.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.recantha.co.uk\/blog\/#organization","name":"Raspberry Pi Pod","url":"https:\/\/www.recantha.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.recantha.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2016\/03\/cropped-PiPod-Logo-v3.png?fit=800%2C337&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2016\/03\/cropped-PiPod-Logo-v3.png?fit=800%2C337&ssl=1","width":800,"height":337,"caption":"Raspberry Pi Pod"},"image":{"@id":"https:\/\/www.recantha.co.uk\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/recantha\/","https:\/\/x.com\/recantha","https:\/\/www.linkedin.com\/in\/recantha\/","https:\/\/www.youtube.com\/channel\/UCK4F9blabxzmk8Inzhs8tpg"]},{"@type":"Person","@id":"https:\/\/www.recantha.co.uk\/blog\/#\/schema\/person\/c27c4ef2ee1c18b130f1fcd5dcdbb263","name":"Michael Horne","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/479778b0677caadde0ceb54c4129804ef674914607e3ed0998808148357d10d8?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/479778b0677caadde0ceb54c4129804ef674914607e3ed0998808148357d10d8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/479778b0677caadde0ceb54c4129804ef674914607e3ed0998808148357d10d8?s=96&d=mm&r=g","caption":"Michael Horne"},"url":"https:\/\/www.recantha.co.uk\/blog\/?author=1"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p2RsaV-3YG","jetpack-related-posts":[{"id":17430,"url":"https:\/\/www.recantha.co.uk\/blog\/?p=17430","url_meta":{"origin":15294,"position":0},"title":"Hiding a Raspberry Pi Zero inside an old hard drive","author":"Michael Horne","date":"3 August 2017","format":false,"excerpt":"Logan Rickert wanted to bring a Raspberry Pi Zero into a penetration testing environment but in a covert manner. He decided to repurpose an old hard drive, fit the Zero inside and then power it from the 5V line of the hard drive. That way, when installed, the Zero would\u2026","rel":"","context":"In &quot;Cases&quot;","block_context":{"text":"Cases","link":"https:\/\/www.recantha.co.uk\/blog\/?cat=9"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2017\/08\/hard-drive.png?fit=816%2C612&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2017\/08\/hard-drive.png?fit=816%2C612&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2017\/08\/hard-drive.png?fit=816%2C612&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2017\/08\/hard-drive.png?fit=816%2C612&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":4775,"url":"https:\/\/www.recantha.co.uk\/blog\/?p=4775","url_meta":{"origin":15294,"position":1},"title":"Penetration testing distros and install kits for the #RaspberryPi","author":"Michael Horne","date":"23 June 2013","format":false,"excerpt":"Jay Turla, a writer for the Infosec Institute, has done a great round-up of Linux distros and apps that will work on the Raspberry Pi to carry out network penetration tests.\u00a0Read more here","rel":"","context":"In &quot;Operating systems&quot;","block_context":{"text":"Operating systems","link":"https:\/\/www.recantha.co.uk\/blog\/?cat=15"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":369,"url":"https:\/\/www.recantha.co.uk\/blog\/?p=369","url_meta":{"origin":15294,"position":2},"title":"Redwing Pi scripts released","author":"Michael Horne","date":"29 October 2012","format":false,"excerpt":"Following the Milton Keynes Raspberry Jam, and the fair amount of success running the PiPodCorder with a working temperature sensor and LCD read-out, I've decided to put the code onto GitHub in the hope that somewhere someone will find them useful! Groups of scripts in the project include: access_point -\u2026","rel":"","context":"In &quot;Making&quot;","block_context":{"text":"Making","link":"https:\/\/www.recantha.co.uk\/blog\/?cat=50"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":9654,"url":"https:\/\/www.recantha.co.uk\/blog\/?p=9654","url_meta":{"origin":15294,"position":3},"title":"Automated Packet Capture on a #RaspberryPi","author":"Michael Horne","date":"14 May 2014","format":false,"excerpt":"William Knowles wanted to create a penetration testing tool and ended up using a Pi. It has since ended up being a data collection device in his Industrial Control System research as a packet capture device. Read here how he's done it.","rel":"","context":"In &quot;Geeky Techiness&quot;","block_context":{"text":"Geeky Techiness","link":"https:\/\/www.recantha.co.uk\/blog\/?cat=22"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/williamknowles.co.uk\/wp-content\/uploads\/2014\/05\/v1-2.jpg?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/williamknowles.co.uk\/wp-content\/uploads\/2014\/05\/v1-2.jpg?resize=350%2C200 1x, https:\/\/i0.wp.com\/williamknowles.co.uk\/wp-content\/uploads\/2014\/05\/v1-2.jpg?resize=525%2C300 1.5x"},"classes":[]},{"id":16934,"url":"https:\/\/www.recantha.co.uk\/blog\/?p=16934","url_meta":{"origin":15294,"position":4},"title":"White Hat Hacking using a Raspberry Pi as a target computer","author":"Michael Horne","date":"20 June 2017","format":false,"excerpt":"There are many reasons why you might want to try out your 'hacking' or penetration-testing skills. These range from a simple proof-of-concept as to why systems should be locked down to more aggressive hacking to prove the vulnerability of parts of a system. There are, likewise, many ways of setting\u2026","rel":"","context":"In &quot;Operating systems&quot;","block_context":{"text":"Operating systems","link":"https:\/\/www.recantha.co.uk\/blog\/?cat=15"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2017\/06\/dv-pi.png?fit=480%2C320&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":3152,"url":"https:\/\/www.recantha.co.uk\/blog\/?p=3152","url_meta":{"origin":15294,"position":5},"title":"Rogue Pi &#8211; network penetration tester","author":"Michael Horne","date":"24 March 2013","format":false,"excerpt":"A team from Crush Beer has developed a network penetration tester based on a Raspberry Pi.\u00a0Read more here","rel":"","context":"In &quot;Operating systems&quot;","block_context":{"text":"Operating systems","link":"https:\/\/www.recantha.co.uk\/blog\/?cat=15"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.recantha.co.uk\/blog\/index.php?rest_route=\/wp\/v2\/posts\/15294","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.recantha.co.uk\/blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.recantha.co.uk\/blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.recantha.co.uk\/blog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.recantha.co.uk\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=15294"}],"version-history":[{"count":1,"href":"https:\/\/www.recantha.co.uk\/blog\/index.php?rest_route=\/wp\/v2\/posts\/15294\/revisions"}],"predecessor-version":[{"id":15295,"href":"https:\/\/www.recantha.co.uk\/blog\/index.php?rest_route=\/wp\/v2\/posts\/15294\/revisions\/15295"}],"wp:attachment":[{"href":"https:\/\/www.recantha.co.uk\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=15294"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.recantha.co.uk\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=15294"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.recantha.co.uk\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=15294"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}