Page 91 - Cyber Defense eMagazine August 2023
P. 91

As it’s given through the Figure 2 – we would select some US IP address offering the login details such
            as  username  and  password  to  that  IoT  configuration.  The  username  here  would  be  ‘admin’  and  the
            password would get ‘password’. In addition, through this book’s chapter – we would like to deal with some
            of the widely used hacker’s tools that would get analyzed further through this chapter. At this stage – it’s
            significant to know that for a successful hacking – it’s necessary to get familiar with someone’s IP address
            as well as his login details. Through the Figure 3, we would illustrate some of this Shodan’s results being
            covered with more details on.


















                                            Figure 3. The Shodan’s result details



            As it’s clear – any researcher could analyze some of the Shodan’s results trying to figure out how those
            results could cope with the real-case scenarios. So, what it’s important at this stage are the facts that we
            got a desired  IP address being 184.159.189.201  and some  login details being ‘admin’  for a username
            and ‘password’  for password.  It’s important  to mention that unbelievably  many IoT assets  would use a
            weak  authentication  and the  hackers  would  through  simple  guessing  obtain  an  access  to  someone’s
            computer or another device being online. Through the coming section of this learning material – we would
            talk  a  bit  more  about  some  standard  hacking  tools  and  try  to  explain  the  way  of  their  usage  for  the
            system’s  exploitation.  At  this  stage,  we would  end  up this  part  of the  book’s  chapter  with  well-known
            sentence that following of the best practice could save us greatly from unwanted events.




            How hacking works in practice

            Some of the best known hacking tools are Advanced IP Scanner and Radmin being used to search the
            network  and  take  a  remote  control  over  the  targeted  devices.  These  two  applications  could  get  in
            combination  or separately,  but  we would  always advise  the  users to try  to combine  the both  of them.
            These tools are free of charge and could get downloaded from the internet. The role of the Advanced IP
            Scanner  is to  offer some  results  about  a required  IP address  as well  as  attempt  to  do deeper  into a




            Cyber Defense eMagazine – August 2023 Edition                                                                                                                                                                                                               91
            Copyright © 2023, Cyber Defense Magazine. All rights reserved worldwide.
   86   87   88   89   90   91   92   93   94   95   96