SlideShare a Scribd company logo
Forensic Analysis of the
Raspberry PI 400
DFRWS EU, 30 MARCH 2021
MATTIA EPIFANI
WHO AM I
• I live and work in Italy
• Master’s Degree in IT in 2002 @ UNIGE
• Founder and CEO @ REALITY NET
• Digital Forensics Analyst
• Contract professor in Digital Forensics @ UNIGE
• SANS Institute Certified Instructor FOR585/FOR500
• Researcher at IGSG – CNR (Italian National Council of
Research)
RASPBERRY PI 400
RASPBERRY PI 400 - SPECIFICATION
RASPBERRY PI IMAGER
RASPBERRY PI IMAGER
FILE SYSTEM
etcpasswd and etcshadow
etctimezone - etckeyboard - etclocale
etcwpa_supplicantwpa_supplicant.conf
etcresolv.conf
homepi
homepi.bash_history
homepi.configchromium
homepi.configchromiumDefault
Hindsight
Hindsight
Hindsight
homepi.cachechromiumDefault
homepi.claws-mail
varlog
CONTACTS
Mattia Epifani
mattia.epifani@realitynet.it
@mattiaep

More Related Content

PDF
BYOM Build Your Own Methodology (in Mobile Forensics)
PDF
Forensicating the Apple TV
PDF
iOS Forensics: where are we now and what are we missing?
PDF
The state of the art in iOS Forensics
PDF
Study and analysis of Orweb anonymizer on Android Devices
PDF
YOW! Connected 2014 - Developing Secure iOS Applications
PDF
Attacking and Defending Apple iOS Devices
PPT
Jail breaking
BYOM Build Your Own Methodology (in Mobile Forensics)
Forensicating the Apple TV
iOS Forensics: where are we now and what are we missing?
The state of the art in iOS Forensics
Study and analysis of Orweb anonymizer on Android Devices
YOW! Connected 2014 - Developing Secure iOS Applications
Attacking and Defending Apple iOS Devices
Jail breaking

What's hot (20)

PDF
The art of android hacking
PDF
Iphone Presentation for MuMe09
PPTX
Pentesting Android Applications
PDF
Mobile Privacy And Security
PDF
My Null Android Penetration Session
PDF
Hacking your Android (slides)
PDF
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
PPTX
Burp Zeronights workshop
PDF
Introduction to iOS Penetration Testing
PDF
Discovering Windows Phone 8 Artifacts and Secrets
PDF
iOS 6 Exploitation: 280 days later
PPTX
[Wroclaw #1] Android Security Workshop
PDF
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
PDF
Intune/AADとLookout連携によるモバイル端末の管理と脅威対策
PDF
Let's Hack a House
PDF
CODE BLUE 2014 : [Keynote] IDA and digital security by Ilfak Guilfanov
PDF
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
PPTX
Test & Tea : ITSEC testing, manual vs automated
PPTX
Hacking with Remote Admin Tools (RAT)
PDF
Mobile Penetration Testing: Episode 1 - The Forensic Menace
The art of android hacking
Iphone Presentation for MuMe09
Pentesting Android Applications
Mobile Privacy And Security
My Null Android Penetration Session
Hacking your Android (slides)
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
Burp Zeronights workshop
Introduction to iOS Penetration Testing
Discovering Windows Phone 8 Artifacts and Secrets
iOS 6 Exploitation: 280 days later
[Wroclaw #1] Android Security Workshop
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
Intune/AADとLookout連携によるモバイル端末の管理と脅威対策
Let's Hack a House
CODE BLUE 2014 : [Keynote] IDA and digital security by Ilfak Guilfanov
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Test & Tea : ITSEC testing, manual vs automated
Hacking with Remote Admin Tools (RAT)
Mobile Penetration Testing: Episode 1 - The Forensic Menace
Ad

Similar to Forensic Analysis of the Raspberry PI 400 (20)

PDF
JupyterCon 2017 - Collaboration and automated operation as literate computing...
PDF
SIP and IPv6 - Can They Get Along?
PDF
Faraday Blackhat 2011 Arsenal
PPTX
APIs in production - we built it, can we fix it?
PDF
Luiz eduardo. introduction to mobile snitch
PPSX
Eagle eye presentation ver 2.0 slides
PPSX
Eagle eye presentation ver 2.0 slides
PDF
SOC-BlueTEam.pdf
PDF
100 Security Operation Center Tools.pdf
PDF
Internet Evidence Finder Overview
PPTX
Connecting to the raspberry pi from your laptop
PDF
Will iPython replace Bash?
PDF
Will iPython replace bash?
PDF
Introduction to Biological Network Analysis and Visualization with Cytoscape ...
PDF
MNSEC 2018 - Observations from the APNIC Community Honeynet Project
PDF
IPv6 and Telecom: IPv4 Is FInally Running Out. Now What?
PPTX
Fi ware, fi-lab e il trentino
PPTX
Bsides chicago 2013 honeypots
PDF
Janus Workshop @ ClueCon 2020
PPTX
Cybercon 2015 brandon kravitz
JupyterCon 2017 - Collaboration and automated operation as literate computing...
SIP and IPv6 - Can They Get Along?
Faraday Blackhat 2011 Arsenal
APIs in production - we built it, can we fix it?
Luiz eduardo. introduction to mobile snitch
Eagle eye presentation ver 2.0 slides
Eagle eye presentation ver 2.0 slides
SOC-BlueTEam.pdf
100 Security Operation Center Tools.pdf
Internet Evidence Finder Overview
Connecting to the raspberry pi from your laptop
Will iPython replace Bash?
Will iPython replace bash?
Introduction to Biological Network Analysis and Visualization with Cytoscape ...
MNSEC 2018 - Observations from the APNIC Community Honeynet Project
IPv6 and Telecom: IPv4 Is FInally Running Out. Now What?
Fi ware, fi-lab e il trentino
Bsides chicago 2013 honeypots
Janus Workshop @ ClueCon 2020
Cybercon 2015 brandon kravitz
Ad

More from Reality Net System Solutions (7)

PDF
iOS Forensics a costo zero
PDF
(in)Secure Secret Zone
PDF
Acquisizione forense di dispositivi iOS
PDF
Life on Clouds: a forensics overview
PDF
ReVaulting! Decryption and opportunities
PDF
Dammi il tuo iPhone e ti dirò chi sei (Forse)
PDF
Tor Browser Forensics on Windows OS
iOS Forensics a costo zero
(in)Secure Secret Zone
Acquisizione forense di dispositivi iOS
Life on Clouds: a forensics overview
ReVaulting! Decryption and opportunities
Dammi il tuo iPhone e ti dirò chi sei (Forse)
Tor Browser Forensics on Windows OS

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
project resource management chapter-09.pdf
PDF
Getting Started with Data Integration: FME Form 101
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPTX
A Presentation on Touch Screen Technology
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
A Presentation on Artificial Intelligence
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
1. Introduction to Computer Programming.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
NewMind AI Weekly Chronicles - August'25-Week II
Building Integrated photovoltaic BIPV_UPV.pdf
project resource management chapter-09.pdf
Getting Started with Data Integration: FME Form 101
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
A Presentation on Touch Screen Technology
OMC Textile Division Presentation 2021.pptx
A comparative study of natural language inference in Swahili using monolingua...
Web App vs Mobile App What Should You Build First.pdf
Accuracy of neural networks in brain wave diagnosis of schizophrenia
gpt5_lecture_notes_comprehensive_20250812015547.pdf
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Enhancing emotion recognition model for a student engagement use case through...
A Presentation on Artificial Intelligence
Assigned Numbers - 2025 - Bluetooth® Document
1. Introduction to Computer Programming.pptx
Unlocking AI with Model Context Protocol (MCP)
MIND Revenue Release Quarter 2 2025 Press Release
Zenith AI: Advanced Artificial Intelligence
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf

Forensic Analysis of the Raspberry PI 400