Any actions and or activities related to the material contained within this Website is solely your responsibility. The misuse of the information in this website can result in criminal charges brought against the persons in question. Cyber Security Associates Limited, will not be held responsible for any criminal charges brought against any individuals misusing the information in these projects to break the law.
Please ensure you are using the latest SD Card image which is available here.
Learn the basic principles of Metasploit;
Learn how to create a payload using msfvenom;
Learn how an attack would work on Metasploit.
Component Number (Peli Case)
(Base) 4 + 5
(Level 1) 3
(Level 1) 3
(Level 1) 5
(Level 1) 1
Component Number (Box Case)
Raspberry Pi + Case
Kali Linux SD Card
Power Supply Unit
This project is designed to introduce you to Metasploit and the applications it has within IT and cyber security. You will have used Metasploit on the Raspberry Pi to create payloads then have run them on other devices. Metasploit is an extremely powerful tool, and this tutorial is just scratching the surface of what you can achieve with it. Keep in mind that the Raspberry is limited in processing power and will not be able to handle large volumes of traffic accurately. As such, this should obviously not be used in production environments.