31.07.2023 Views

The Cyber Defense eMagazine August Edition for 2023

Cyber Defense eMagazine August Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine August Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

As it’s given through the Figure 2 – we would select some US IP address offering the login details such<br />

as username and password to that IoT configuration. <strong>The</strong> username here would be ‘admin’ and the<br />

password would get ‘password’. In addition, through this book’s chapter – we would like to deal with some<br />

of the widely used hacker’s tools that would get analyzed further through this chapter. At this stage – it’s<br />

significant to know that <strong>for</strong> a successful hacking – it’s necessary to get familiar with someone’s IP address<br />

as well as his login details. Through the Figure 3, we would illustrate some of this Shodan’s results being<br />

covered with more details on.<br />

Figure 3. <strong>The</strong> Shodan’s result details<br />

As it’s clear – any researcher could analyze some of the Shodan’s results trying to figure out how those<br />

results could cope with the real-case scenarios. So, what it’s important at this stage are the facts that we<br />

got a desired IP address being 184.159.189.201 and some login details being ‘admin’ <strong>for</strong> a username<br />

and ‘password’ <strong>for</strong> password. It’s important to mention that unbelievably many IoT assets would use a<br />

weak authentication and the hackers would through simple guessing obtain an access to someone’s<br />

computer or another device being online. Through the coming section of this learning material – we would<br />

talk a bit more about some standard hacking tools and try to explain the way of their usage <strong>for</strong> the<br />

system’s exploitation. At this stage, we would end up this part of the book’s chapter with well-known<br />

sentence that following of the best practice could save us greatly from unwanted events.<br />

How hacking works in practice<br />

Some of the best known hacking tools are Advanced IP Scanner and Radmin being used to search the<br />

network and take a remote control over the targeted devices. <strong>The</strong>se two applications could get in<br />

combination or separately, but we would always advise the users to try to combine the both of them.<br />

<strong>The</strong>se tools are free of charge and could get downloaded from the internet. <strong>The</strong> role of the Advanced IP<br />

Scanner is to offer some results about a required IP address as well as attempt to do deeper into a<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2023</strong> <strong>Edition</strong> 91<br />

Copyright © <strong>2023</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!