paint-brush
How to Perform a Rogue Raspberry Pi Exploitby@fatman
1,634 reads
1,634 reads

How to Perform a Rogue Raspberry Pi Exploit

by Scott Eggimann7mJuly 7th, 2022
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

The goal of a cyber attack is to gain a foothold into the victim’s network. In the absence of a successful external attack on servers, imagine that a malicious group can bypass your firewalls and fancy network scanners and get direct access to your network from the inside. An often-overlooked vulnerability exists from your exposed Ethernet ports. Gaining access to these unattended ports is the threat that allows rogue devices to expose your network. Exploiting this vulnerability comes in the form of a reverse shell. A reverse shell is where the host (or victim) machine initiates outgoing shell connections to a command server and provides reverse shell capability. The remote host can then SSH back into the. victim machine and establish a foothold on the compromised network.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - How to Perform a Rogue Raspberry Pi Exploit
Scott Eggimann HackerNoon profile picture
Scott Eggimann

Scott Eggimann

@fatman

Cybersecurity enthusiast, Technical Writer, Security+ Student, and sometime lockpicker

About @fatman
LEARN MORE ABOUT @FATMAN'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

Scott Eggimann HackerNoon profile picture
Scott Eggimann@fatman
Cybersecurity enthusiast, Technical Writer, Security+ Student, and sometime lockpicker

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite