Skip to main content
Skip table of contents

How to Create a Custom Script/Task to Discover Raspberry Pi's

A Raspberry Pi ( is a low cost, high performance, single board computer that can be used as a covert "dropbox" for penetration testing and because of the risk associated for misuse with this hardware device many organizations may prohibit it.

The following custom script may be used to to identify Raspberry Pi devices on local network subnet.

Steps for use:

  1. Login to Pwn Pulse, select Scripts from the main drop-down menu.
  2. Select Add a script, provide an indicative name, for example Custom - Detect Raspberry Pi and select Bash.
  3. In the scripting window, type the following lines and click the Save button.

    nmap -sP {{target_range}} | awk '/^Nmap/{ip=$NF}/B8:27:EB/{print ip}'
  4. Next, select Tasks from the main drop-down menu, then select Add a task.
  5. On the New Task page, provide an indicative name for the task, for example Scan for Raspberry Pi, select the newly created script from the Script drop-down menu.
  6. For the Add to parameter, choose to run the task specific to a single sensor selected from the drop-down menu, or to a group of sensors.
  7. Next, specify the local network subnet as the target range, select a Start Time and choose a Frequency how often the task should be run (***).  Afterward, click the Save button.
  8. After the task has completed and assuming the targets were accessible at the time the task was run, the results of the task may be viewed by returning to the Tasks page, then selecting the Results button.


© 2024 Outpost24® All rights reserved. This document may only be redistributed unedited and unaltered. This document may be cited and referenced only if clearly crediting Outpost24® and this document as the source. Any other reproduction and redistribution in print or electronically is strictly prohibited without explicit permission.


Outpost24® and OUTSCAN™ are trademarks of Outpost24® and its affiliated companies. All other brand names, product names or trademarks belong to their respective owners.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.