How to Perform a Rogue Raspberry Pi Exploitby@fatman
760 reads

How to Perform a Rogue Raspberry Pi Exploit

tldt arrow
Read on Terminal Reader🖨️

Too Long; Didn't Read

The goal of a cyber attack is to gain a foothold into the victim’s network. In the absence of a successful external attack on servers, imagine that a malicious group can bypass your firewalls and fancy network scanners and get direct access to your network from the inside. An often-overlooked vulnerability exists from your exposed Ethernet ports. Gaining access to these unattended ports is the threat that allows rogue devices to expose your network. Exploiting this vulnerability comes in the form of a reverse shell. A reverse shell is where the host (or victim) machine initiates outgoing shell connections to a command server and provides reverse shell capability. The remote host can then SSH back into the. victim machine and establish a foothold on the compromised network.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - How to Perform a Rogue Raspberry Pi Exploit
Scott Eggimann HackerNoon profile picture

@fatman

Scott Eggimann

About @fatman
LEARN MORE ABOUT @FATMAN'S EXPERTISE AND PLACE ON THE INTERNET.
react to story with heart

RELATED STORIES

L O A D I N G
. . . comments & more!
Hackernoon hq - po box 2206, edwards, colorado 81632, usa