31.07.2023 Views

The Cyber Defense eMagazine August Edition for 2023

Cyber Defense eMagazine August Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine August Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

How Hacking of <strong>The</strong> Internet of Things<br />

Works in Practice<br />

By Milica D. Djekic<br />

<strong>The</strong> Internet of Things (IoT) represents a collection of devices being capable to talk to each other using<br />

the internet as a communication channel. As it’s obvious – the IoT is a cyber as anything else today. That<br />

means such a technology could get vulnerable to hacker’s attacks and <strong>for</strong> such a reason it’s important to<br />

apply the good procedures and practices in order to prevent your IoT assets from cyber incidents.<br />

Through this chapter – we intend to discuss how hacking of the IoT infrastructure works in practice as<br />

well as provide some empirical examples how such a campaign could get conducted in a reality.<br />

How we could obtain login details<br />

Be<strong>for</strong>e anyone makes a decision to begin the hacker’s operation, he should try to think which in<strong>for</strong>mation<br />

he got available as well as which tools he has. In many cases, it’s so important to adjust your hacking<br />

tool’s needs with the in<strong>for</strong>mation being necessary <strong>for</strong> conducting a cyber campaign. <strong>The</strong> role of this<br />

learning material’s chapter is provide a closer look at some of the hacking techniques as well as a usage<br />

of cyber technologies in threatening the IoT resources. For the purpose of a good explanation of this<br />

strategy – we would use the Shodan tool that got provided some Default Passwords which could assist<br />

you in breaking into someone’s system. It’s well known that crawlers like Shodan and Censys could offer<br />

an opportunity to get anyone’s IP address and if there is no or poor authentication – anyone could make<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2023</strong> <strong>Edition</strong> 89<br />

Copyright © <strong>2023</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!