Page 89 - Cyber Defense eMagazine August 2023
P. 89
How Hacking of The Internet of Things
Works in Practice
By Milica D. Djekic
The Internet of Things (IoT) represents a collection of devices being capable to talk to each other using
the internet as a communication channel. As it’s obvious – the IoT is a cyber as anything else today. That
means such a technology could get vulnerable to hacker’s attacks and for such a reason it’s important to
apply the good procedures and practices in order to prevent your IoT assets from cyber incidents.
Through this chapter – we intend to discuss how hacking of the IoT infrastructure works in practice as
well as provide some empirical examples how such a campaign could get conducted in a reality.
How we could obtain login details
Before anyone makes a decision to begin the hacker’s operation, he should try to think which information
he got available as well as which tools he has. In many cases, it’s so important to adjust your hacking
tool’s needs with the information being necessary for conducting a cyber campaign. The role of this
learning material’s chapter is provide a closer look at some of the hacking techniques as well as a usage
of cyber technologies in threatening the IoT resources. For the purpose of a good explanation of this
strategy – we would use the Shodan tool that got provided some Default Passwords which could assist
you in breaking into someone’s system. It’s well known that crawlers like Shodan and Censys could offer
an opportunity to get anyone’s IP address and if there is no or poor authentication – anyone could make
Cyber Defense eMagazine – August 2023 Edition 89
Copyright © 2023, Cyber Defense Magazine. All rights reserved worldwide.