Hacking Workshop Weaponizing the Raspberry Pi

Want to learn to think and act like a hacker? This is a fun and practical one-day course to gain insight into how hackers can break into your organisation. First, you will see how an attacker will become the Domain Administrator of an organisation after compromising the laptop of an employee. Afterwards, in a practical session, you will be able to set up a Raspberry Pi Zero as an attack platform to gain this first foothold in an organisation.

The next Hands-on Hacking workshop Weaponizing the Raspberry Pi on 29 November 2018 is open to join.


Very good alternative to only listening. Hands-on give a better result in awareness how easy it is to break into systems

Intended Audience

This training is for people interested in understanding how hackers think to protect their organisation better. This course is suitable for:

  • White team/ blue team members;
  • Starting ethical hackers;
  • Mobile application developers;
  • Technical staff involved in security management;
  • Security enthusiasts.

Required skills & expertise

For this course you need some basic Linux command line skills as you will set up your own Raspberry Pi.

Insight how easy it is to fool Windows with a Raspberry Pi acting like a network device or keyboard.


In the one day hands-on-hacking workshop, we show you in the morning how a hacker works his way into your organisation. And in the afternoon we teach you how to weaponize a Raspberry Pi Zero to carry out the initial attack into a company.

  • Part 1: Ethical hacking
    In this section we explain to you the basics around ethical hacking and the steps we follow:  1) Reconnaissance, 2) Scanning, 3) Gaining access, and 4) Reporting and security recommendations. We also explain the difference between various types of investigations.
  • Part 2: Demo of stolen laptop scenario
    Within this section we will show you in a live demo how one of our Senior Security Consultants becomes Domain Admin via a stolen laptop scenario. We jointly discuss and take the steps he takes to take over the entire network and organisation.
  • Part 3: Raspberry Pi as attack platform
    During the afternoon you receive a Raspberry Pi Zero, which we jointly set up as an attack platform. We show you how to use it and walk through the steps to be able to exfiltrate credentials from a windows system.

Learning objectives

Get into the mind of a hacker

  • Understand the basic steps a hacker performs to take over your network
  • Understand the basic types of security testing
  • See these basic steps in practice in the stolen laptop scenario
  • Set up a Raspberry Pi Zero as an attack platform within one afternoon
  • Learn to use a Raspberry Pi Zero as an attack platform 

Register now!

  • Date: 29 November 2018
  • Location: Eindhoven, Vestdijk 59
  • Costs: EUR 400 per person (excl. VAT, including lunch, documentation and Raspberry Pi)

Good for me to see how easy it is to gain access


Stay informed
Want to be the first to know more about our upcoming training courses and workshops? Sign up here! Of course we can organize an interactive session in your company. Please contact us for more information. 

@Secura 2018
Webdesign Studio HB / webdevelopment Medusa