In this tutorial from our Penetration Testing With Raspberry Pi course, your instructor Thomas Sermpinis shows you how to set up and use Metasploit on your Raspberry Pi. A must-know tool on a must-have piece of hardware is a combination you can't miss :). We hope this will get you into incorporating Raspberry Pi in your pentesting arsenal. And if you would like to learn more tricks and advanced techniques, check out the course!
[custom-related-posts title="Tom's Courses:" none_text="None found" order_by="title" order="ASC"]
(441 views)
Author
- BlogMarch 28, 2022Footprinting Firewalls | Reconnaissance Tutorial [FREE COURSE CONTENT]
- BlogMarch 17, 2022Process Hollowing Malware | Reverse Engineering Tutorial [FREE COURSE CONTENT]
- BlogMarch 9, 2022Sniffing BLE packets | IoT Hacking Tutorial [FREE COURSE CONTENT]
- BlogFebruary 18, 2022Pass The Hash Attacks in Active Directory [FREE COURSE CONTENT]