Month: February 2014

  • Setting up a man-in-the-middle device with Raspberry Pi, Part 1

    I recently purchased that most marvelous of devices the Raspberry PiĀ and naturally my thoughts turned to the nefarious given its cheap price and small package. I decided to attempt to create a man-in-the-middle device that could be discreetly attached to a remote network and could redirect and sniff traffic. I’m only a very novice Linux […]