Wireless Pentesting with the Raspberry Pi

Wireless Pentesting
with the Raspberry Pi

Pen-test your wireless network with
Raspberry Pi to avoid vulnerability attacks


Wireless Pentesting with the Raspberry Pi

Attack on Wireless Networks by hackers is the most common threat to the businesses in modern world. This course will teach you how to protect your network by converting your raspberry pi into a low-cost hacking tool.


This Course Will Help You To

Learn network scanning, capturing data and cracking WPA/WPA2 with Kali Linux.
Learn to test your network wireless security system.
Build an extremely affordable tool to perform hacking.

Who is it for?

Ethical hackers, cyber security enthusiasts and professionals interested in using Raspberry pi for penetration testing.
Security experts or novice Linux users who want to learn about Network and System Security.


Learn to secure wireless networks using hacking methods via Raspberry Pi.

About the Course

icon box image


5 hours

icon box image



icon box image



Wireless Pentesting with the Raspberry Pi

Raspberry pi, a credit card sized computer chip can help you design open and well documented projects which are easy to build and modify. Ever thought, a portable raspberry pi tool can be converted into a low-cost hacking tool.EC-Council’s Mobile Security Toolkit (Better known as the STORM!) is a fully-loaded pen-test platform which comes equipped with STORM Linux (a Raspbian based, customized distro of Linux equipped with the industry’s most popular hacking tools) loaded onto a portable touchscreen device.

This course will provide a practical experimentation of penetration hacking beginning with setting up Kali Linux on Raspberry Pi 3. Further, you’ll learn about various network scenarios such as wireless security and network scanning, thus helping you to detect real-time issues and capture sensitive data. By the end of this course, you’ll be able to turn your Pi 3 into a honeypot and will be able to detect that hackers are on your wire. 



Getting up to Grips with the Hacking Concepts

Watch Your First Video

Course Outline

Section 1: Getting up to Grips with the Hacking Concepts

Section 2: Overview of Hacking Methodologies

Section 3: Getting Started with Wireless Hacking

Section 4: Lab 01 Wi-Fi Hacking

Section 5: Lab 02 Wi-Fi Hacking

Section 6: Intrusion Analysis- Logging Monitoring, and Detection

Section 7: Lab 03 RF Hacking

Section 8: Lab 01- Live Memory Analysis

Section 9: Lab 02- Basic Malware Analysis

Section 10: Lab 03- Forensic Triage

Section 11: Lab 04- Forensic Triage

Kevin Cardwell

Know Your Author

Kevin has worked extensively with banks and financial institutions throughout the Middle East, Europe and the UK. Served as leader of a DoD Red Team with 100% success rate of compromise. Some recent consulting projects include the Petroleum Development Oman and the Central Bank of Oman. He Designed and implemented the custom security baseline for the existing Oman Airport Management Company (OAMC) airports and the two new airports. 


Wayne Burke

Know Your Author

Wayne Burke is internationally recognized for his commitment, achievements, and contributions to the IT Security Industry. Currently specializing in offensive and defensive technologies for autonomous Unmanned Aerial Systems (Drones), building and managing new high-tech security tools, custom hardware solutions for Penetration Testing, Mobile Security and Digital Forensics.
He is imminently qualified in his field in that he holds a string of professional qualifications in Networking to name a few (MCT, MCSE, Cisco, Network+) and IT Security (CEH, ECSA, LPT, CHFI, and CCE) besides a bachelor’s degree in science.



learn python
[spb_gopricing pricing_table=”code-red_5_5ee3b9e94420e” width=”1/1″ el_position=”first last”]

Customers Who Loved Our Courses


Wireless Pentesting with the Raspberry Pi


I liked the way the course was a good mix of theory and hands on practice.


Good understanding of the basic of forensics.



Introduction of raspberry pi tools for penetration testing, with instruction on Ec-Councils Mobile Security Toolkit or STORM.


An excellent treatment of a crucial InfoSec domain area which is becoming more and more critical but is often neglected.