Any actions and or activities related to the material contained within this Website is solely your responsibility. The misuse of the information in this website can result in criminal charges brought against the persons in question. Cyber Security Associates Limited, will not be held responsible for any criminal charges brought against any individuals misusing the information in these projects to break the law.

Please ensure you are using the latest SD Card image which is available here.



1.         Understand the fundamentals of Wi-Fi;

         Gain a better understanding of Linux;

3·         Use Kismet to scan local Wi-Fi and discover the associated data.



Component Number (Box Case)

Slot 1

Slot 11

Slot 3

Slot 12

Slot 2

Slot 11

Slot 11

Slot 12

Slot 13


Raspberry Pi + Case

Raspbian SD Card


Alfa WiFi Card

TFT Screen


Wireless Keyboard

Wireless Mouse

Power Supply





The purpose of this project was to illustrate how much data is freely available when you use Wi-Fi. The Wi-Fi name, IP address, MAC address, encryption standard and wireless clients could all be exposed and exploited. Once you have found a target it is only a matter of time before you are able to break the encryption and have access to the network. Wireless Encryption Protocol (WEP) has been compromised for a very long time, but many Wi-Fi routers are still installed with and use WEP. WPA and WPA2 take longer but are still vulnerable to attack, and you can still search the reports generated for specific devices and MAC addresses. The information you find as a result of this project needs to be deleted promptly and NEVER used for malicious purposes. It is important to understand this information and how it can be used; for example, a network admin could scan their network to search for legitimate wireless devices and discover any wireless devices that shouldn’t be connected to their network and blacklist them. Research what encryption standards are available for Wi-Fi and the different attacks each is vulnerable to.