The curious case of the Raspberry Pi in the network closet, how we found, analyzed (with the help of Reddit) and in the end caught the culprit of a malicious device in our network
Archive: January 2019
  		2019
	
	
	
	
		
		
		18		
		
			Jan		
	
	
	
	
	    
	    
	    
		
		
		4		
		
			Jan		
	
	
	
	
	    
	    
	    
		NOTE: This document incomplete, still DRAFT Mode… The intelligence, in terms of security, is a collection of security-related information which when analysed provides meaningful foresight. The threat intelligence likewise is an analysis of information collected about the cyber threat so[…]
  
  	End  
	
|--Although you should be able to work out who I am, I don't really care, as I can work out who you are. So beware of leaving footprints.--|

