

SD Card with System Image: will host the Operating System and brain of the desired environment. It can be either Long or Short Distance, this varies from your need Wi Wi-Fi Attack Card: must be compatible with Kali Linux, more specifically, it must be a card with support for Monitor mode, so it can be used to sniff networks. Fortunately, Raspberry Pi 3 has a wireless card integrated into the system, in case of a Raspberry Pi 2 it is necessary to include a Wi-Fi adapter This allows you to control the Raspberry Pi from long distances via SSH or VNC. Like a Hotspot from your phone or home network, for example. Wi-Fi Command and Control Card (C2): to automatically connect the Raspberry Pi to an Access Point (AP). As described above, we will use it to support Linux-based operating systems with high customization power and limited only by the creativity of the user Raspberry Pi 3 Kit: used platform, which manages and coordinates all the components used. Here’s the list of components for our project and why we need them.

Necessary Equipment for Raspberry Pi and Kali Linux Our Kali Build will also carry out auditing attacks on Wi-Fi networks and Wired. Due to its small size and a lot of system-based tools such as Kali Linux, it is the ideal weapon for Wi-Fi reconnaissance and attack. Raspberry Pi works exceptionally well as a platform for Wireless attacks. Raspberry Pi Attacksįirst, it is important that you control your expectations reasonably by choosing an RPi as your hacking platform, not least because it is not a supercomputer capable of processing large data capacities or reaching unusual limits for normal computers. This makes it very difficult to identify who is behind a Raspberry Pi attack. With more than 10 million units sold, Raspberry Pi can be bought in cash for just US$ 30.
