Southwestern Oklahoma State University
2019 Oklahoma Research Day
City and State
Mar 08, 2019
The problem is that companies are constantly being attacked by hackers and they lose sensitive information that can cause stolen identities, bank accounts, private company information, etc. In order to practice keeping hackers out, cyber security experts have been practicing breaking into systems. This activity is generally referred to as penetration testing. This poster describes some of the challenges our team experienced while building a penetration testing lab for the SWOSU College Cyber Defense (CCDC) team. The goal of this research is to show how easy it is to use an inexpensive Raspberry Pi for penetration testing for beginners as well as experts looking for alternative methods. By researching the book Penetration Testing with Raspberry Pi by Michael McPhee and Jason Beltrame, I want to show the benefits of using this software and how to perform this type of test in order to protect sensitive information. In turn, this will keep businesses from losing customers and minimizing the amount of exploits in software's.
Holsapple, Hagan; Smoot, Devin; and Evert, Jeremy, "Penetration Testing Using A Raspberry Pi" (2019). Student Research. 18.