官术网_书友最值得收藏!

Wireless reconnaissance and mapping

The majority of IoT devices on the market utilize wireless communication protocols such as ZigBee, ZWave, Bluetooth-LE, and Wi-Fi 802.11. Similar to the war dialing days of old where hackers scanned through telephone switching networks to identify electronic modems, today, researchers are successfully demonstrating scanning attacks against IoT devices. One example is the Texas-based company Praetorian, which in Austin, TX, has used a low-flying drone outfitted with a custom ZigBee protocol scanner to identify thousands of ZigBee-enabled IoT device beacon requests. Just as network scanning using tools such as Nmap are commonly utilized by hackers to gather intelligence about network hosts, subnets, ports, and protocols, similar paradigms are being used against IoT devices—things that may open your garage door, lock your front door, turn lights on and off, and so on. Wireless reconnaissance will often precede full-scale attacks (http://fortune.com/2015/08/05/researchers-drone-discover-connected-devices-austin/).

主站蜘蛛池模板: 台州市| 曲阜市| 垫江县| 五寨县| 望谟县| 柳江县| 尼木县| 靖州| 龙江县| 漳平市| 双柏县| 绥德县| 仁怀市| 象州县| 雷山县| 屯留县| 浦北县| 藁城市| 东安县| 乐至县| 平泉县| 鱼台县| 华池县| 中西区| 东宁县| 宁乡县| 东阳市| 花垣县| 临城县| 拉萨市| 遂平县| 镇赉县| 合阳县| 叙永县| 泉州市| 武川县| 确山县| 屏东县| 增城市| 福海县| 佛坪县|