31.07.2023 Views

The Cyber Defense eMagazine August Edition for 2023

Cyber Defense eMagazine August Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine August Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

a breach or take advantage over weaknesses of that IT infrastructure. In Figure 1, we would want to show<br />

step-by-step how a Shodan could serve in obtaining so valuable login in<strong>for</strong>mation. <strong>The</strong> illustration is given<br />

as follows.<br />

Figure 1. <strong>The</strong> Shodan’s default passwords<br />

As it’s illustrated in the previous Figure – the Shodan would deal with many different IoT resources and<br />

one of the options would be – so called – Default Password. As it’s obvious – there would be around<br />

1,000 devices getting its login details available to the rest of a web population. We would always highlight<br />

that a primary role of the Shodan is to serve to research’s community, but – unluckily – many malicious<br />

actors would find their interest to exploit such an asset. Indeed, the Shodan is a powerful tool offering a<br />

chance to everyone to test its capacities. Through the Figure 2 – we would illustrate how such a Default<br />

Password section could get used <strong>for</strong> getting the IP details as well as the authentication data. That step<br />

is illustrated as follows.<br />

Figure 2. <strong>The</strong> Shodan’s login details<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2023</strong> <strong>Edition</strong> 90<br />

Copyright © <strong>2023</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!