Any actions and or activities related to the material contained within this Website is solely your responsibility. The misuse of the information in this website can result in criminal charges brought against the persons in question. Cyber Security Associates Limited, will not be held responsible for any criminal charges brought against any individuals misusing the information in these projects to break the law.
Please ensure you are using the latest SD Card image which is available here.
Understand the basic principles of Wireshark;
Learn about the benefits of using Wireshark;
Run Wireshark on Kali Linux on the Raspberry Pi and use it to capture, filter and analyse data.
Component Number (Peli Case)
(Base) 4 + 5
(Level 1) 3
(Level 1) 3
(Level 1) 5
(Level 1) 1
Component Number (Box Case)
Raspberry Pi + Case
Kali Linux SD Card
Power Supply Unit
This project is designed to introduce the students to Wireshark and the applications this technology has in IT. You will have used Wireshark on the Raspberry Pi to detect incoming traffic then have captured the data; then taken that data and filtered it for further inspection. Wireshark is an extremely powerful tool, and this project is just scratching the surface of what you can achieve with it. IT Professionals use Wireshark to debug network protocol implementations, examine security problems and inspect network protocol internals. Also, keep in mind that the Raspberry Pi is limited in processing power and is unable to handle large volumes of traffic accurately. As such, it should not be used in production environments. I hope you found this tutorial helpful and discovered a new use for your Raspberry Pi.