An IoT hacking methodology
The following defines the hacking approach for IoT, which is nearly the same as those employed for other platforms with a couple of nuances:
- Information gathering: Information extraction of details such as IP addresses, active protocols, open ports, device types and vendor details is a prerequisite for initiating an IoT hacking attack. Search engines such as Censys and Shodan are frequently used to obtain data about IoT devices. One useful resource for finding and learning about IoT devices is Shodan, as shown in the following screenshot:
Figure 13.4 – The Shodan.io screen for IoT information gathering
Shodan has information and telemetry about IoT devices connected to the internet. In some cases, entries even divulge device vulnerabilities. The search engine in Shodan, which captures and categorizes devices on the internet, can be used to find individual devices based on the manufacturer or ports that are...