This is an essential tool for white hat hackers, featuring a palm-sized Raspberry Pi 4B equipped with the well-known vulnerability testing tool Kali.
This tool (Note 1) is designed to use Raspberry Pi 4B and Kali for port scanning, web vulnerability assessment, password cracking, and hacking tools, and can be used as a training tool for developing white hat hackers through hands-on experience. Additionally, it allows for in-house vulnerability testing on company devices, enabling early response to information leaks, risk reduction, and cost savings. Furthermore, ransomware countermeasures and forensics have been added this time. (Note 1) Using this tool on devices from other companies may constitute a crime, so please use it only within your own company.
Inquire About This Product
basic information
Features: (1) Diverse vulnerability testing tools nmap (port scanning), maltego (information gathering), owasp-zap (web vulnerability assessment), sqlmap (SQL injection), hydra (account cracking tool), metasploit, Armitage (GUI version of hacking tools) Newly added Ransomware countermeasures and Autopsy (forensics) (2) User-friendly and portable Operates on Raspberry Pi4B, can be controlled from PCs and smartphones via VNC (Virtual Network Computing), and runs on a mobile battery. The application operates with a GUI. (3) Low cost Provides Linux hardware, Kali, and manuals at a low price. (4) Reliable support Offers a comprehensive manual and 14 days of free support. It's safe for those new to Linux. Recommended for: - Those aiming to become white hat hackers - Individuals responsible for information security in companies or SIers - Students who want to acquire advanced hacking skills - Those troubled by ransomware or wanting to recover deleted data
Price information
37,400 yen
Price range
P2
Delivery Time
P2
Applications/Examples of results
Use Cases and Effects: (1) In-house Vulnerability Testing Vulnerability testing and diagnosis of information systems within the company. It can be conducted in-house, allowing for cost reduction. We provide easy-to-understand procedure manuals. Additionally, we can perform decryption of ransomware. (2) Vulnerability Reproduction Testing Reproduction testing of incidents caused by vulnerabilities that occurred in the past. By sharing this within the company, employees can experience the seriousness of security incidents. (3) Training Tool As a training tool to become a white hat hacker, it can be used daily to acquire advanced information security skills.
Detailed information
-
Overall Overview
-
Connection configuration
-
Specifications
Company information
Our company provides a comfortable wireless LAN (WiFi) and M2M environment through wireless visualization. Additionally, we conduct on-site surveys and troubleshoot issues through radio wave surveys, security investigations, and traffic surveys. Please feel free to contact us if you have any requests.