The Cyber Defense eMagazine August Edition for 2023
Cyber Defense eMagazine August Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES
Cyber Defense eMagazine August Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
How Hacking of <strong>The</strong> Internet of Things<br />
Works in Practice<br />
By Milica D. Djekic<br />
<strong>The</strong> Internet of Things (IoT) represents a collection of devices being capable to talk to each other using<br />
the internet as a communication channel. As it’s obvious – the IoT is a cyber as anything else today. That<br />
means such a technology could get vulnerable to hacker’s attacks and <strong>for</strong> such a reason it’s important to<br />
apply the good procedures and practices in order to prevent your IoT assets from cyber incidents.<br />
Through this chapter – we intend to discuss how hacking of the IoT infrastructure works in practice as<br />
well as provide some empirical examples how such a campaign could get conducted in a reality.<br />
How we could obtain login details<br />
Be<strong>for</strong>e anyone makes a decision to begin the hacker’s operation, he should try to think which in<strong>for</strong>mation<br />
he got available as well as which tools he has. In many cases, it’s so important to adjust your hacking<br />
tool’s needs with the in<strong>for</strong>mation being necessary <strong>for</strong> conducting a cyber campaign. <strong>The</strong> role of this<br />
learning material’s chapter is provide a closer look at some of the hacking techniques as well as a usage<br />
of cyber technologies in threatening the IoT resources. For the purpose of a good explanation of this<br />
strategy – we would use the Shodan tool that got provided some Default Passwords which could assist<br />
you in breaking into someone’s system. It’s well known that crawlers like Shodan and Censys could offer<br />
an opportunity to get anyone’s IP address and if there is no or poor authentication – anyone could make<br />
<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2023</strong> <strong>Edition</strong> 89<br />
Copyright © <strong>2023</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.