{"id":3152,"date":"2013-03-24T14:41:31","date_gmt":"2013-03-24T14:41:31","guid":{"rendered":"http:\/\/178.62.14.192\/?p=3152"},"modified":"2013-03-24T14:41:31","modified_gmt":"2013-03-24T14:41:31","slug":"rogue-pi-network-penetration-tester","status":"publish","type":"post","link":"https:\/\/www.recantha.co.uk\/blog\/?p=3152","title":{"rendered":"Rogue Pi &#8211; network penetration tester"},"content":{"rendered":"<p style=\"text-align: center;\"><a href=\"http:\/\/crushbeercrushcode.org\/2013\/03\/developing-the-rogue-pi\/\"><img src='\/blog\/wp-content\/uploads\/2013\/03\/roguepi-report-feature-img1.png' alt='' \/><\/a><\/p>\n<p>A team from Crush Beer has developed a network penetration tester based on a Raspberry Pi.\u00a0<a href=\"http:\/\/crushbeercrushcode.org\/2013\/03\/developing-the-rogue-pi\/\">Read more here<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A team from Crush Beer has developed a network penetration tester based on a Raspberry Pi.\u00a0Read more here<\/p>\n<p class=\"more-link-p\"><a class=\"more-link\" href=\"https:\/\/www.recantha.co.uk\/blog\/?p=3152\">Read more &rarr;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[15,49],"tags":[],"class_list":["post-3152","post","type-post","status-publish","format-standard","hentry","category-distros","category-software"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Rogue Pi - network penetration tester - Raspberry Pi Pod<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.recantha.co.uk\/blog\/?p=3152\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Rogue Pi - network penetration tester - Raspberry Pi Pod\" \/>\n<meta property=\"og:description\" content=\"A team from Crush Beer has developed a network penetration tester based on a Raspberry Pi.\u00a0Read more hereRead more &rarr;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.recantha.co.uk\/blog\/?p=3152\" \/>\n<meta property=\"og:site_name\" content=\"Raspberry Pi Pod\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/recantha\/\" \/>\n<meta property=\"article:published_time\" content=\"2013-03-24T14:41:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2013\/03\/roguepi-report-feature-img1.png\" \/>\n<meta name=\"author\" content=\"Michael Horne\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@recantha\" \/>\n<meta name=\"twitter:site\" content=\"@recantha\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Horne\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/?p=3152#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/?p=3152\"},\"author\":{\"name\":\"Michael Horne\",\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/#\/schema\/person\/c27c4ef2ee1c18b130f1fcd5dcdbb263\"},\"headline\":\"Rogue Pi &#8211; network penetration tester\",\"datePublished\":\"2013-03-24T14:41:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/?p=3152\"},\"wordCount\":25,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/#organization\"},\"articleSection\":[\"Operating systems\",\"Software\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.recantha.co.uk\/blog\/?p=3152#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/?p=3152\",\"url\":\"https:\/\/www.recantha.co.uk\/blog\/?p=3152\",\"name\":\"Rogue Pi - network penetration tester - Raspberry Pi Pod\",\"isPartOf\":{\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/#website\"},\"datePublished\":\"2013-03-24T14:41:31+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/?p=3152#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.recantha.co.uk\/blog\/?p=3152\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/?p=3152#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.recantha.co.uk\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Rogue Pi &#8211; network penetration tester\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/#website\",\"url\":\"https:\/\/www.recantha.co.uk\/blog\/\",\"name\":\"Raspberry Pi Pod\",\"description\":\"Experiences with the Raspberry Pi micro computer and microcontroller\",\"publisher\":{\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.recantha.co.uk\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/#organization\",\"name\":\"Raspberry Pi Pod\",\"url\":\"https:\/\/www.recantha.co.uk\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2016\/03\/cropped-PiPod-Logo-v3.png?fit=800%2C337&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2016\/03\/cropped-PiPod-Logo-v3.png?fit=800%2C337&ssl=1\",\"width\":800,\"height\":337,\"caption\":\"Raspberry Pi Pod\"},\"image\":{\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/recantha\/\",\"https:\/\/x.com\/recantha\",\"https:\/\/www.linkedin.com\/in\/recantha\/\",\"https:\/\/www.youtube.com\/channel\/UCK4F9blabxzmk8Inzhs8tpg\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/#\/schema\/person\/c27c4ef2ee1c18b130f1fcd5dcdbb263\",\"name\":\"Michael Horne\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.recantha.co.uk\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/479778b0677caadde0ceb54c4129804ef674914607e3ed0998808148357d10d8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/479778b0677caadde0ceb54c4129804ef674914607e3ed0998808148357d10d8?s=96&d=mm&r=g\",\"caption\":\"Michael Horne\"},\"url\":\"https:\/\/www.recantha.co.uk\/blog\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Rogue Pi - network penetration tester - Raspberry Pi Pod","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.recantha.co.uk\/blog\/?p=3152","og_locale":"en_US","og_type":"article","og_title":"Rogue Pi - network penetration tester - Raspberry Pi Pod","og_description":"A team from Crush Beer has developed a network penetration tester based on a Raspberry Pi.\u00a0Read more hereRead more &rarr;","og_url":"https:\/\/www.recantha.co.uk\/blog\/?p=3152","og_site_name":"Raspberry Pi Pod","article_publisher":"https:\/\/www.facebook.com\/recantha\/","article_published_time":"2013-03-24T14:41:31+00:00","og_image":[{"url":"https:\/\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2013\/03\/roguepi-report-feature-img1.png","type":"","width":"","height":""}],"author":"Michael Horne","twitter_card":"summary_large_image","twitter_creator":"@recantha","twitter_site":"@recantha","twitter_misc":{"Written by":"Michael Horne"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.recantha.co.uk\/blog\/?p=3152#article","isPartOf":{"@id":"https:\/\/www.recantha.co.uk\/blog\/?p=3152"},"author":{"name":"Michael Horne","@id":"https:\/\/www.recantha.co.uk\/blog\/#\/schema\/person\/c27c4ef2ee1c18b130f1fcd5dcdbb263"},"headline":"Rogue Pi &#8211; network penetration tester","datePublished":"2013-03-24T14:41:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.recantha.co.uk\/blog\/?p=3152"},"wordCount":25,"commentCount":1,"publisher":{"@id":"https:\/\/www.recantha.co.uk\/blog\/#organization"},"articleSection":["Operating systems","Software"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.recantha.co.uk\/blog\/?p=3152#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.recantha.co.uk\/blog\/?p=3152","url":"https:\/\/www.recantha.co.uk\/blog\/?p=3152","name":"Rogue Pi - network penetration tester - Raspberry Pi Pod","isPartOf":{"@id":"https:\/\/www.recantha.co.uk\/blog\/#website"},"datePublished":"2013-03-24T14:41:31+00:00","breadcrumb":{"@id":"https:\/\/www.recantha.co.uk\/blog\/?p=3152#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.recantha.co.uk\/blog\/?p=3152"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.recantha.co.uk\/blog\/?p=3152#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.recantha.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Rogue Pi &#8211; network penetration tester"}]},{"@type":"WebSite","@id":"https:\/\/www.recantha.co.uk\/blog\/#website","url":"https:\/\/www.recantha.co.uk\/blog\/","name":"Raspberry Pi Pod","description":"Experiences with the Raspberry Pi micro computer and microcontroller","publisher":{"@id":"https:\/\/www.recantha.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.recantha.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.recantha.co.uk\/blog\/#organization","name":"Raspberry Pi Pod","url":"https:\/\/www.recantha.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.recantha.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2016\/03\/cropped-PiPod-Logo-v3.png?fit=800%2C337&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2016\/03\/cropped-PiPod-Logo-v3.png?fit=800%2C337&ssl=1","width":800,"height":337,"caption":"Raspberry Pi Pod"},"image":{"@id":"https:\/\/www.recantha.co.uk\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/recantha\/","https:\/\/x.com\/recantha","https:\/\/www.linkedin.com\/in\/recantha\/","https:\/\/www.youtube.com\/channel\/UCK4F9blabxzmk8Inzhs8tpg"]},{"@type":"Person","@id":"https:\/\/www.recantha.co.uk\/blog\/#\/schema\/person\/c27c4ef2ee1c18b130f1fcd5dcdbb263","name":"Michael Horne","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.recantha.co.uk\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/479778b0677caadde0ceb54c4129804ef674914607e3ed0998808148357d10d8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/479778b0677caadde0ceb54c4129804ef674914607e3ed0998808148357d10d8?s=96&d=mm&r=g","caption":"Michael Horne"},"url":"https:\/\/www.recantha.co.uk\/blog\/?author=1"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p2RsaV-OQ","jetpack-related-posts":[{"id":4775,"url":"https:\/\/www.recantha.co.uk\/blog\/?p=4775","url_meta":{"origin":3152,"position":0},"title":"Penetration testing distros and install kits for the #RaspberryPi","author":"Michael Horne","date":"23 June 2013","format":false,"excerpt":"Jay Turla, a writer for the Infosec Institute, has done a great round-up of Linux distros and apps that will work on the Raspberry Pi to carry out network penetration tests.\u00a0Read more here","rel":"","context":"In &quot;Operating systems&quot;","block_context":{"text":"Operating systems","link":"https:\/\/www.recantha.co.uk\/blog\/?cat=15"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":15294,"url":"https:\/\/www.recantha.co.uk\/blog\/?p=15294","url_meta":{"origin":3152,"position":1},"title":"Easy penetration testing using your Raspberry Pi and Warberry Pi","author":"Michael Horne","date":"20 August 2016","format":false,"excerpt":"It has been possible to do penetration testing using your Pi for some time now, particularly with Kali Linux. However, it has now been made even simpler with a set of scripts known as Warberry Pi. The set of scripts runs when you plug in an Ethernet cable and collects\u2026","rel":"","context":"In &quot;Networking&quot;","block_context":{"text":"Networking","link":"https:\/\/www.recantha.co.uk\/blog\/?cat=33"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/github.com\/secgroundzero\/warberry\/raw\/master\/SCREENS\/Warberry_Logo_Transparent.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":17430,"url":"https:\/\/www.recantha.co.uk\/blog\/?p=17430","url_meta":{"origin":3152,"position":2},"title":"Hiding a Raspberry Pi Zero inside an old hard drive","author":"Michael Horne","date":"3 August 2017","format":false,"excerpt":"Logan Rickert wanted to bring a Raspberry Pi Zero into a penetration testing environment but in a covert manner. He decided to repurpose an old hard drive, fit the Zero inside and then power it from the 5V line of the hard drive. That way, when installed, the Zero would\u2026","rel":"","context":"In &quot;Cases&quot;","block_context":{"text":"Cases","link":"https:\/\/www.recantha.co.uk\/blog\/?cat=9"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2017\/08\/hard-drive.png?fit=816%2C612&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2017\/08\/hard-drive.png?fit=816%2C612&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2017\/08\/hard-drive.png?fit=816%2C612&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.recantha.co.uk\/blog\/wp-content\/uploads\/2017\/08\/hard-drive.png?fit=816%2C612&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":9654,"url":"https:\/\/www.recantha.co.uk\/blog\/?p=9654","url_meta":{"origin":3152,"position":3},"title":"Automated Packet Capture on a #RaspberryPi","author":"Michael Horne","date":"14 May 2014","format":false,"excerpt":"William Knowles wanted to create a penetration testing tool and ended up using a Pi. It has since ended up being a data collection device in his Industrial Control System research as a packet capture device. Read here how he's done it.","rel":"","context":"In &quot;Geeky Techiness&quot;","block_context":{"text":"Geeky Techiness","link":"https:\/\/www.recantha.co.uk\/blog\/?cat=22"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/williamknowles.co.uk\/wp-content\/uploads\/2014\/05\/v1-2.jpg?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/williamknowles.co.uk\/wp-content\/uploads\/2014\/05\/v1-2.jpg?resize=350%2C200 1x, https:\/\/i0.wp.com\/williamknowles.co.uk\/wp-content\/uploads\/2014\/05\/v1-2.jpg?resize=525%2C300 1.5x"},"classes":[]},{"id":2841,"url":"https:\/\/www.recantha.co.uk\/blog\/?p=2841","url_meta":{"origin":3152,"position":4},"title":"Kali Linux released for the #RaspberryPi","author":"Michael Horne","date":"13 March 2013","format":false,"excerpt":"\u00a0 Kali Linux, which describes itself as \"the most advanced penetration testing distribution, ever\" has released a version for the Raspberry Pi.\u00a0If anyone tries it out, perhaps you'd like to leave a comment on this blog post with your experiences. You can get the image from the\u00a0Kali Linux download page.\u00a0\u00a0Installation\u2026","rel":"","context":"In &quot;Operating systems&quot;","block_context":{"text":"Operating systems","link":"https:\/\/www.recantha.co.uk\/blog\/?cat=15"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":6009,"url":"https:\/\/www.recantha.co.uk\/blog\/?p=6009","url_meta":{"origin":3152,"position":5},"title":"Be a #RaspberryPi NOOBS v1.3 beta tester!","author":"Michael Horne","date":"19 September 2013","format":false,"excerpt":"Just posting this before leaving work for the day. The Foundation are asking for beta testers for the newest version of NOOBS. Please head on over to their site to read more\u00a0and become a beta tester yourself. This looks really exciting and a big step-up from the current version.","rel":"","context":"In &quot;Operating systems&quot;","block_context":{"text":"Operating systems","link":"https:\/\/www.recantha.co.uk\/blog\/?cat=15"},"img":{"alt_text":"Be a NOOBS v1.3 beta tester! | Raspberry Pi","src":"\/blog\/wp-content\/uploads\/2013\/09\/os_selected-300x2241.png","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.recantha.co.uk\/blog\/index.php?rest_route=\/wp\/v2\/posts\/3152","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.recantha.co.uk\/blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.recantha.co.uk\/blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.recantha.co.uk\/blog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.recantha.co.uk\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3152"}],"version-history":[{"count":0,"href":"https:\/\/www.recantha.co.uk\/blog\/index.php?rest_route=\/wp\/v2\/posts\/3152\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.recantha.co.uk\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3152"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.recantha.co.uk\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3152"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.recantha.co.uk\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3152"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}