Weaponized IoT: A Comprehensive Comparative Forensic Analysis of Hacker Raspberry Pi and PC Kali Linux Machine

The proliferation of Internet of Things (IoT) devices presents significant challenges for cybersecurity and digital forensics, particularly as these devices have become increasingly weaponised for malicious activities. This research focuses on the forensic analysis capabilities of Raspberry Pi devic...

Full description

Saved in:
Bibliographic Details
Main Authors: Mohamed Chahine Ghanem, Eduardo Almeida Palmieri, Wiktor Sowinski-Mydlarz, Sahar Al-Sudani, Dipo Dunsin
Format: Article
Language:English
Published: MDPI AG 2025-03-01
Series:IoT
Subjects:
Online Access:https://www.mdpi.com/2624-831X/6/1/18
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850279474492342272
author Mohamed Chahine Ghanem
Eduardo Almeida Palmieri
Wiktor Sowinski-Mydlarz
Sahar Al-Sudani
Dipo Dunsin
author_facet Mohamed Chahine Ghanem
Eduardo Almeida Palmieri
Wiktor Sowinski-Mydlarz
Sahar Al-Sudani
Dipo Dunsin
author_sort Mohamed Chahine Ghanem
collection DOAJ
description The proliferation of Internet of Things (IoT) devices presents significant challenges for cybersecurity and digital forensics, particularly as these devices have become increasingly weaponised for malicious activities. This research focuses on the forensic analysis capabilities of Raspberry Pi devices configured with Kali Linux, comparing their forensic capabilities to conventional PC-based forensic investigations. The study identifies key gaps in existing IoT forensic methodologies, including limited tool compatibility, constrained data retention, and difficulties in live memory analysis due to architectural differences. The research employs a testbed-based approach to simulate cyberattacks on both platforms, capturing and analysing forensic artefacts such as system logs, memory dumps, and network traffic. The research findings reveal that while traditional PCs offer extensive forensic capabilities due to superior storage, tool support, and system logging, Raspberry Pi devices present significant forensic challenges, primarily due to their ARM architecture and limited forensic readiness. The study emphasises the need for specialised forensic tools tailored to IoT environments and suggests best practices to enhance forensic investigation capabilities in weaponised IoT scenarios. This research contributes to the field by bridging the gap between theoretical frameworks and real-world forensic investigations, offering insights into the evolving landscape of IoT forensics and its implications for digital evidence collection, analysis, and forensic readiness.
format Article
id doaj-art-d3b42fdc8fc245f4b07565de610deab4
institution OA Journals
issn 2624-831X
language English
publishDate 2025-03-01
publisher MDPI AG
record_format Article
series IoT
spelling doaj-art-d3b42fdc8fc245f4b07565de610deab42025-08-20T01:49:04ZengMDPI AGIoT2624-831X2025-03-01611810.3390/iot6010018Weaponized IoT: A Comprehensive Comparative Forensic Analysis of Hacker Raspberry Pi and PC Kali Linux MachineMohamed Chahine Ghanem0Eduardo Almeida Palmieri1Wiktor Sowinski-Mydlarz2Sahar Al-Sudani3Dipo Dunsin4Cyber Security Research Centre, London Metropolitan University, London N7 8DB, UKCyber Security Research Centre, London Metropolitan University, London N7 8DB, UKCyber Security Research Centre, London Metropolitan University, London N7 8DB, UKCyber Security Research Centre, London Metropolitan University, London N7 8DB, UKCyber Security Research Centre, London Metropolitan University, London N7 8DB, UKThe proliferation of Internet of Things (IoT) devices presents significant challenges for cybersecurity and digital forensics, particularly as these devices have become increasingly weaponised for malicious activities. This research focuses on the forensic analysis capabilities of Raspberry Pi devices configured with Kali Linux, comparing their forensic capabilities to conventional PC-based forensic investigations. The study identifies key gaps in existing IoT forensic methodologies, including limited tool compatibility, constrained data retention, and difficulties in live memory analysis due to architectural differences. The research employs a testbed-based approach to simulate cyberattacks on both platforms, capturing and analysing forensic artefacts such as system logs, memory dumps, and network traffic. The research findings reveal that while traditional PCs offer extensive forensic capabilities due to superior storage, tool support, and system logging, Raspberry Pi devices present significant forensic challenges, primarily due to their ARM architecture and limited forensic readiness. The study emphasises the need for specialised forensic tools tailored to IoT environments and suggests best practices to enhance forensic investigation capabilities in weaponised IoT scenarios. This research contributes to the field by bridging the gap between theoretical frameworks and real-world forensic investigations, offering insights into the evolving landscape of IoT forensics and its implications for digital evidence collection, analysis, and forensic readiness.https://www.mdpi.com/2624-831X/6/1/18IoT digital forensicsRaspberry Pisingle-board computerscybercrimedigital forensicsLinux
spellingShingle Mohamed Chahine Ghanem
Eduardo Almeida Palmieri
Wiktor Sowinski-Mydlarz
Sahar Al-Sudani
Dipo Dunsin
Weaponized IoT: A Comprehensive Comparative Forensic Analysis of Hacker Raspberry Pi and PC Kali Linux Machine
IoT
IoT digital forensics
Raspberry Pi
single-board computers
cybercrime
digital forensics
Linux
title Weaponized IoT: A Comprehensive Comparative Forensic Analysis of Hacker Raspberry Pi and PC Kali Linux Machine
title_full Weaponized IoT: A Comprehensive Comparative Forensic Analysis of Hacker Raspberry Pi and PC Kali Linux Machine
title_fullStr Weaponized IoT: A Comprehensive Comparative Forensic Analysis of Hacker Raspberry Pi and PC Kali Linux Machine
title_full_unstemmed Weaponized IoT: A Comprehensive Comparative Forensic Analysis of Hacker Raspberry Pi and PC Kali Linux Machine
title_short Weaponized IoT: A Comprehensive Comparative Forensic Analysis of Hacker Raspberry Pi and PC Kali Linux Machine
title_sort weaponized iot a comprehensive comparative forensic analysis of hacker raspberry pi and pc kali linux machine
topic IoT digital forensics
Raspberry Pi
single-board computers
cybercrime
digital forensics
Linux
url https://www.mdpi.com/2624-831X/6/1/18
work_keys_str_mv AT mohamedchahineghanem weaponizediotacomprehensivecomparativeforensicanalysisofhackerraspberrypiandpckalilinuxmachine
AT eduardoalmeidapalmieri weaponizediotacomprehensivecomparativeforensicanalysisofhackerraspberrypiandpckalilinuxmachine
AT wiktorsowinskimydlarz weaponizediotacomprehensivecomparativeforensicanalysisofhackerraspberrypiandpckalilinuxmachine
AT saharalsudani weaponizediotacomprehensivecomparativeforensicanalysisofhackerraspberrypiandpckalilinuxmachine
AT dipodunsin weaponizediotacomprehensivecomparativeforensicanalysisofhackerraspberrypiandpckalilinuxmachine