Turning a Raspberry Pi 3 Into a Cloaking Device With goSecure VPN
Summary
This article describes how to repurpose a Raspberry Pi 3 into a "cloaking device" using a goSecure VPN. The process involves acquiring a Raspberry Pi and a VPS running CentOS 6.8, and then configuring both to establish a VPN connection.
IFF Assessment
FOE
This article details a technique that could be used for malicious obfuscation or to bypass network security controls, making it bad news for defenders.
Defender Context
Defenders should be aware of techniques that allow for network traffic obfuscation, especially those leveraging inexpensive hardware like Raspberry Pis. Monitoring for unusual VPN connections originating from unexpected devices or network segments could help detect such activities.