Question:
Is a Raspberry PI, set up to perform credential harvesting at an office location for a long period of time, a viable attack vector?
How:
Build a battery powered Raspberry PI that is configured to run automated credential harvesting tools and plant that device at an office location.
Director Cyber Security Sweden Stockholm Team Manager