官术网_书友最值得收藏!

Wireless reconnaissance and mapping

The majority of IoT devices on the market utilize wireless communication protocols such as ZigBee, ZWave, Bluetooth-LE, and Wi-Fi 802.11. Similar to the war dialing days of old where hackers scanned through telephone switching networks to identify electronic modems, today, researchers are successfully demonstrating scanning attacks against IoT devices. One example is the Texas-based company Praetorian, which in Austin, TX, has used a low-flying drone outfitted with a custom ZigBee protocol scanner to identify thousands of ZigBee-enabled IoT device beacon requests. Just as network scanning using tools such as Nmap are commonly utilized by hackers to gather intelligence about network hosts, subnets, ports, and protocols, similar paradigms are being used against IoT devices—things that may open your garage door, lock your front door, turn lights on and off, and so on. Wireless reconnaissance will often precede full-scale attacks (http://fortune.com/2015/08/05/researchers-drone-discover-connected-devices-austin/).

主站蜘蛛池模板: 调兵山市| 游戏| 郴州市| 舒兰市| 通城县| 东方市| 九龙坡区| 三门峡市| 黄浦区| 林甸县| 新巴尔虎左旗| 伊川县| 彝良县| 洛川县| 齐河县| 岱山县| 明光市| 舒兰市| 阳朔县| 盐山县| 富宁县| 陇西县| 四子王旗| 五寨县| 自治县| 延边| 东莞市| 中阳县| 徐州市| 江川县| 盐池县| 尖扎县| 彭水| 阜新市| 泉州市| 桐城市| 东港市| 镇雄县| 衢州市| 怀宁县| 唐山市|