IoT router exploitation scenario introduction
In this scenario, we will analyze and attack an IoT device that we hold dear to our hearts – the performance version of Mango [4 and 5] called Shadow.
These devices are travel routes from GL.iNet [6], which are highly versatile and can be used in several ways. The primary purpose for which it was presented was to protect ourselves when traveling, especially when staying in hotels. While this may seem like paranoia to some, we must remember the 2014 DarkHotel attacks [7], where hotel Wi-Fi was used to attack unsuspecting visitors.
We selected Shadow as our target IoT device for this scenario for several reasons. First, it is a cheap device, accessible to a broad range of people who may be interested in conducting their experiments. Second, it is readily available, so you can easily acquire and explore its capabilities. Finally, it’s a valuable device for those who are particularly security-conscious.
In this chapter...