Skip to content

Raspberry pi mobile AI auto penetration testing kit (requires flipper zero and alpha wifi usb connected)

Notifications You must be signed in to change notification settings

gregcmartin/rpi-hacker

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 
 
 
 
 

Repository files navigation

have a raspberry pi 5 with a alfa wifi usb adapter and a flipper zero connected running the default raspberry pi OS lets configure this for maximum security testing use cases so its a portable network and IOT penetration testing workhorse

A. Wi-Fi recon & hardening (in your own / client environments)

  1. Wi-Fi environment survey – Passively inventory all nearby APs/clients (channels, bands, signal strength) to understand the RF landscape before testing.
  2. Signal coverage mapping – Walk around with the Pi to build a heatmap of Wi-Fi coverage and identify dead zones or overly “loud” APs.
  3. Encryption posture review – Catalog which SSIDs use WPA2, WPA3, open, etc. to find legacy or misconfigured networks that need upgrading.
  4. Default SSID / config detection – Spot APs still using vendor-default SSIDs or settings that might indicate weak overall security.
  5. Open & guest network assessment – Identify open/guest SSIDs and test login flows, captive portals, and isolation (without harvesting real creds).
  6. Hidden SSID enumeration (defensive) – Discover hidden SSIDs so you can document them and ensure they’re actually needed and secured.
  7. Client isolation verification – Join guest networks with different devices and confirm they can’t talk to each other (no lateral movement).
  8. Dual-band / band-steering validation – Confirm devices are correctly being pushed to 5/6 GHz and that 2.4 GHz is limited where needed.
  9. Ad-hoc / Wi-Fi Direct discovery – Find peer-to-peer networks (e.g., printers, cameras, laptops) that bypass your main Wi-Fi controls.
  10. DHCP & IP space enumeration – Map subnets and DHCP scopes on each SSID to find shadow networks or overlapping address spaces.

B. Wireless attack-surface modeling (high-level, for resilience testing)

  1. Association/auth flood resilience testing – Safely simulate high volumes of connection attempts to see how your controllers and monitoring react.
  2. Deauth/roaming resilience checks – Study how clients and infrastructure behave when connections drop or roam frequently (no need to abuse this).
  3. SSID/VLAN mapping validation – Confirm each SSID lands on the correct VLAN and that VLAN ACLs align with your security model.
  4. East–west segmentation checks – From Wi-Fi, validate which subnets and services are reachable vs. blocked, and tune segmentation policies.
  5. Egress policy testing from Wi-Fi – Verify firewall egress rules from wireless networks: which ports/protocols can actually leave.
  6. Rate limiting & IDS/IPS tuning – Generate controlled suspicious patterns (e.g., port scans, weird DNS) to test detection and alert quality.

C. Traffic analysis & monitoring (passive / inspection)

  1. Passive packet capture of authorized networks – Capture traffic (especially management/control frames) for troubleshooting and config review.
  2. Cleartext protocol discovery – Identify HTTP, FTP, Telnet, and other insecure protocols still in use by clients or IoT gear.
  3. IoT device behavior profiling – Observe which cloud endpoints IoT devices call, how often, and over what protocols.
  4. DNS traffic analysis – Look for suspicious domains, DNS tunneling patterns, or devices using hardcoded external resolvers.
  5. mDNS/SSDP/UPnP inventory – See which devices loudly advertise themselves and whether they leak model, firmware, or serial info.
  6. Broadcast & multicast chatter analysis – Identify overly chatty devices that harm performance or leak unnecessary information.
  7. QoS & bandwidth usage insights – Measure which devices/flows hog wireless bandwidth and whether QoS is working as intended.

D. Bluetooth / BLE security testing

  1. BLE device discovery & inventory – Use Pi + Flipper to scan BLE beacons and advertisements from wearables, trackers, smart home gear, etc.
  2. BLE metadata privacy review – Inspect BLE advertising data for device names, IDs, or other PII leaking in the clear.
  3. Pairing policy assessment – Test how easy it is to pair to speakers, locks, and peripherals and whether they enforce confirmation or PINs.
  4. Rogue beacon/tracker detection – Watch for unknown BLE beacons (e.g., trackers) that shouldn’t be in your environment.
  5. BLE range & signal profiling – Measure effective BLE range for sensitive devices (door locks, badges) and adjust placement/security.

E. RF / Sub-GHz / NFC / IR (mostly via Flipper, coordinated by the Pi)

  1. Sub-GHz device inventory – Identify 300–900 MHz devices such as remote switches, gates, sensors, and alarms in your own lab/property.
  2. Fixed vs. rolling-code evaluation (defensive) – Test which of your remotes still use weak fixed codes vs. more robust rolling schemes.
  3. Garage door & gate system review – Verify whether your own access systems rely on outdated RF protocols that need upgrading.
  4. IR remote mapping – Capture IR codes for TVs, projectors, AC units in your lab to understand what’s controllable and centralize control.
  5. NFC tag inventory – Scan NFC tags/cards for plain-text secrets, default keys, or weak access control settings.
  6. Badge/credential robustness checks (authorized only) – Evaluate test badges/cards to see how easily they could be cloned or emulated.
  7. Smart lock radio surface review – Map the wireless interfaces (BLE, Wi-Fi, NFC) exposed by smart locks and confirm their auth flows.

F. Web/app & IoT service testing over Wi-Fi

  1. Internal web app reconnaissance – From Wi-Fi, enumerate internal web portals, management interfaces, and dashboards.
  2. Lightweight web vulnerability scanning – Run authorized scanners against internal sites to discover outdated software or obvious misconfigs.
  3. IoT admin interface review – Connect to printers, cameras, NAS boxes, etc., and review their web admin panels for default creds/settings.
  4. API endpoint mapping – Identify REST/JSON endpoints used by IoT or internal apps and build a map for later in-depth pentesting.
  5. TLS/certificate hygiene checks – Scan for self-signed or expired certs, weak ciphers, and inconsistent hostname validation.
  6. Mobile app traffic inspection (lab only) – Put the Pi in the path (e.g., as Wi-Fi AP + proxy) to inspect how your own apps talk to backends.

“One-button” wireless audit script – Automate your standard recon/telemetry tasks into a single command that generates a human-readable report that covers all wireless protocols into a full detailed but easy to read report Wifi, Bluetooth and all other protocols possible.


About

Raspberry pi mobile AI auto penetration testing kit (requires flipper zero and alpha wifi usb connected)

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors