The Cyber Defense eMagazine August Edition for 2023
Cyber Defense eMagazine August Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES
Cyber Defense eMagazine August Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
As it’s given through the Figure 2 – we would select some US IP address offering the login details such<br />
as username and password to that IoT configuration. <strong>The</strong> username here would be ‘admin’ and the<br />
password would get ‘password’. In addition, through this book’s chapter – we would like to deal with some<br />
of the widely used hacker’s tools that would get analyzed further through this chapter. At this stage – it’s<br />
significant to know that <strong>for</strong> a successful hacking – it’s necessary to get familiar with someone’s IP address<br />
as well as his login details. Through the Figure 3, we would illustrate some of this Shodan’s results being<br />
covered with more details on.<br />
Figure 3. <strong>The</strong> Shodan’s result details<br />
As it’s clear – any researcher could analyze some of the Shodan’s results trying to figure out how those<br />
results could cope with the real-case scenarios. So, what it’s important at this stage are the facts that we<br />
got a desired IP address being 184.159.189.201 and some login details being ‘admin’ <strong>for</strong> a username<br />
and ‘password’ <strong>for</strong> password. It’s important to mention that unbelievably many IoT assets would use a<br />
weak authentication and the hackers would through simple guessing obtain an access to someone’s<br />
computer or another device being online. Through the coming section of this learning material – we would<br />
talk a bit more about some standard hacking tools and try to explain the way of their usage <strong>for</strong> the<br />
system’s exploitation. At this stage, we would end up this part of the book’s chapter with well-known<br />
sentence that following of the best practice could save us greatly from unwanted events.<br />
How hacking works in practice<br />
Some of the best known hacking tools are Advanced IP Scanner and Radmin being used to search the<br />
network and take a remote control over the targeted devices. <strong>The</strong>se two applications could get in<br />
combination or separately, but we would always advise the users to try to combine the both of them.<br />
<strong>The</strong>se tools are free of charge and could get downloaded from the internet. <strong>The</strong> role of the Advanced IP<br />
Scanner is to offer some results about a required IP address as well as attempt to do deeper into a<br />
<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2023</strong> <strong>Edition</strong> 91<br />
Copyright © <strong>2023</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.