Raspberry Pi Project

Raspberry Pi logo

Cybersecurity is a vast study area, but with the right tools you can learn skills valuable to the industry. If you haven't noticed already, much of the internet's backbone — routers, firewalls, web servers, intrusion detection systems — run on some "flavor" of Unix/Linux. So understanding how this mysterious operating system works is invaluable to a cyber professional.

Why learn about the Raspberry Pi? As a device that only costs $40 to $70, it provides a small, modularized way to experiment with Linux without risk of harming your own computer. Further, you can use a separate SD card for each project and swap them out within seconds to begin a whole new project.

Download Raspbian for your Pi

The new Raspbian is out, based on Debian Jessie! Download it from the official www.RaspberryPi.org website. Then head over to our dedicated page for How to setup your Raspberry Pi.

Other Resources

Networking configuration that has changed with Debian Jessie

How to find your Raspberry Pi's IP address

tcpdump man page

Setting up SSH server

Copy files remotely using SCP

Using 'Weaved' Instead of Port Forwarding

Setting up apache web server

Setting up nginx web server

CodeCademy Course about the Command Line

Project leaders

Note: Keep in mind that our project leaders are not experts, and they do not know all the answers. They are students just like you, and will do their own research and experiments alongside you. Let's all learn from each other!

In the Fall 2016 we have some great surprises coming, lots to do!

Winter 2016 Quarter

Please bring your own laptop to each meeting, as there will be quite a bit of research (aka Googling) involved.

This quarter, our goals are...

  1. Access the Pi remotely, via various protocols (ICMP, SSH, SCP, HTTP)
  2. Use TCPDump or Wireshark to see the traffic on the network
  3. Install a web server on the Pi (apache, nginx, lighttpd, etc.)
  4. Setup port forwarding at your home, to access your Pi from anywhere (or use Weaved as an alternative)
  5. Remotely take a photo, or check home security sensors (use a Python, PHP, or BASH script)

See the Meeting Notes for the quarter so far

Fall 2015 Quarter

What we accomplished: