Raspberry Pi sensors for home networks

Who’s your fridge talking to at night?

By Gary Fisk, Sales Engineer, Corelight I love origin stories – the tales of grand plans, unforeseen circumstances, and necessity that creates something new. These strange times have resulted in something new ...
Small, fast and easy. Pick any three.

Small, fast and easy. Pick any three.

By Seth Hall, Co-Founder & Chief Evangelist, Corelight Zeek has been the darling of security defenders looking to get deep visibility into network traffic. Over the last two decades, Zeek has become ...
Mixed VLAN tags and BPF syntax

Mixed VLAN tags and BPF syntax

By Richard Bejtlich, Principal Security Strategist, Corelight This post contains a warning and a solution for anyone using BPF syntax when filtering traffic for network security monitoring.  Introduction I have been writing ...
OT

RasPi and SDP: Ensuring Impenetrable Perimeters in a Perimeterless World

Since its introduction, the lightweight yet effective credit card-sized Raspberry Pi (RasPi) computer has grown steadily in global popularity. This is because the RasPi offers an easy-to-learn (it originated as an educational ...
Security Boulevard

Pentesting with a Raspberry Pi!

For years now I have been a huge proponent of the Raspberry Pi. I started with a Raspberry Pi 2, which required a USB WiFi dongle for wireless, to a Raspberry Pi ...
Raspberry Pi 4 Model B running PolarProxy

Raspberry PI WiFi Access Point with TLS Inspection

This is a how-to guide for setting up a Raspberry Pi as a WiFi Access Point, which acts as a transparent TLS proxy and saves the decrypted traffic in PCAP files. Image: ...
EH-Net - Brown - Raspberry Pi Hacking - Mr. Robot

Poisonous Pi – The Execution of a Raspberry Pi Hacking Workshop

43 years ago, a small team led by Chuck Peddle changed the way society computes today. In 1975, encased in plastic, this 40-pin DIP 8-bit microprocessor, known as the MOS Technology 6502, ...
EH-Net - Kron - Modern Day Hacker - Clipboard of Death

The Modern Day Hacker – A Cautionary Tale

J0hn_D0ugh$ – So there I was once again enjoying my victory. I wasn’t technically done yet, however all of the hard stuff had already been done. I’m not a hacker just for ...