- Practical Internet of Things Security
- Brian Russell Drew Van Duren
- 145字
- 2021-06-10 18:42:30
Wireless reconnaissance and mapping
The majority of IoT devices on the market utilize wireless communication protocols such as ZigBee, ZWave, Bluetooth-LE, and Wi-Fi 802.11. Similar to the war dialing days of old where hackers scanned through telephone switching networks to identify electronic modems, today, researchers are successfully demonstrating scanning attacks against IoT devices. One example is the Texas-based company Praetorian, which in Austin, TX, has used a low-flying drone outfitted with a custom ZigBee protocol scanner to identify thousands of ZigBee-enabled IoT device beacon requests. Just as network scanning using tools such as Nmap are commonly utilized by hackers to gather intelligence about network hosts, subnets, ports, and protocols, similar paradigms are being used against IoT devices—things that may open your garage door, lock your front door, turn lights on and off, and so on. Wireless reconnaissance will often precede full-scale attacks (http://fortune.com/2015/08/05/researchers-drone-discover-connected-devices-austin/).
- 網(wǎng)絡(luò)空間攻防技術(shù)原理
- CSO進階之路:從安全工程師到首席安全官
- 黑客攻防入門秘笈
- 開發(fā)者的Web安全戒律:真實威脅與防御實踐
- 物聯(lián)網(wǎng)安全滲透測試技術(shù)
- 數(shù)據(jù)安全領(lǐng)域指南
- End to End GUI Development with Qt5
- 數(shù)據(jù)安全架構(gòu)設(shè)計與實戰(zhàn)
- 網(wǎng)絡(luò)空間安全導(dǎo)論
- 網(wǎng)絡(luò)空間安全實戰(zhàn)基礎(chǔ)
- CPK通向賽博安全之路:理論與實踐CPK Solution to Cyber Security:Theory and Practice
- 云安全深度剖析:技術(shù)原理及應(yīng)用實踐
- 網(wǎng)絡(luò)對抗的前世今生
- 網(wǎng)絡(luò)空間安全實踐能力分級培養(yǎng)(I)
- 大中型網(wǎng)絡(luò)入侵要案直擊與防御