Page 91 - Cyber Defense eMagazine August 2023
P. 91
As it’s given through the Figure 2 – we would select some US IP address offering the login details such
as username and password to that IoT configuration. The username here would be ‘admin’ and the
password would get ‘password’. In addition, through this book’s chapter – we would like to deal with some
of the widely used hacker’s tools that would get analyzed further through this chapter. At this stage – it’s
significant to know that for a successful hacking – it’s necessary to get familiar with someone’s IP address
as well as his login details. Through the Figure 3, we would illustrate some of this Shodan’s results being
covered with more details on.
Figure 3. The Shodan’s result details
As it’s clear – any researcher could analyze some of the Shodan’s results trying to figure out how those
results could cope with the real-case scenarios. So, what it’s important at this stage are the facts that we
got a desired IP address being 184.159.189.201 and some login details being ‘admin’ for a username
and ‘password’ for password. It’s important to mention that unbelievably many IoT assets would use a
weak authentication and the hackers would through simple guessing obtain an access to someone’s
computer or another device being online. Through the coming section of this learning material – we would
talk a bit more about some standard hacking tools and try to explain the way of their usage for the
system’s exploitation. At this stage, we would end up this part of the book’s chapter with well-known
sentence that following of the best practice could save us greatly from unwanted events.
How hacking works in practice
Some of the best known hacking tools are Advanced IP Scanner and Radmin being used to search the
network and take a remote control over the targeted devices. These two applications could get in
combination or separately, but we would always advise the users to try to combine the both of them.
These tools are free of charge and could get downloaded from the internet. The role of the Advanced IP
Scanner is to offer some results about a required IP address as well as attempt to do deeper into a
Cyber Defense eMagazine – August 2023 Edition 91
Copyright © 2023, Cyber Defense Magazine. All rights reserved worldwide.