• Tom Peterson

Using a Raspberry Pi to proxy, capture, and decrypt data from mobile and IoT devices!


Using a Raspberry Pi to proxy, capture, and decrypt data from mobile and IoT devices!

The story of Tom versus The Smart Toaster to save The Hungry Dog!

Have you ever wondered what your "smart IoT toaster" was sending back to the internet about you or running your House through the Dog?

Or how your network dog food dispenser is controlled by the Toaster and holds the dog hostage? And you do not know any of this until you deploy Tom's solution!

Well our engineer Tom did, but he didn't have a great way to capture the network traffic sent by mobile and IoT devices. So he turned a Raspberry Pi into a access point/network proxy capable of capturing packets and decrypting SSL within CloudShark, and now you can too.

In this article, you’ll learn more about different kinds of proxies, and how you can use them to intercept, analyze, and even decrypt some data with CloudShark.

A taste of the flow between the IoT Toaster and the internet -

Will the Toaster or the Dog win this battle or will Tom find a solution to put the Toaster in it's proper place and save the Dog from a life of Toaster servitude??

Check out - https://cloudshark.io/articles/packet-capture-using-mitm-proxy-raspberry-pi/

The author - Tom Peterson - Tom works at CloudShark helping bring pcap analysis to the web. Getting started with networking at 2005 performing testing at the InterOperability Lab at UNH he began by learning IPv6 and moved from there testing IPsec, firewalls, and other network security devices. Testing a variety of protocols and devices has led to a passion of looking for strange behavior in a pcap file and getting to the bottom of it.

#TheOldcommguy #IoT

Imagotype-NetworkDataPedia (1)_edited.pn

NetworkDataPedia © 2018-2020  |  Editorial Team   |   Privacy Policies  |  Contact Us          Website built by DYCMarketing