官术网_书友最值得收藏!

Wireless reconnaissance and mapping

The majority of IoT devices on the market utilize wireless communication protocols such as ZigBee, ZWave, Bluetooth-LE, and Wi-Fi 802.11. Similar to the war dialing days of old where hackers scanned through telephone switching networks to identify electronic modems, today, researchers are successfully demonstrating scanning attacks against IoT devices. One example is the Texas-based company Praetorian, which in Austin, TX, has used a low-flying drone outfitted with a custom ZigBee protocol scanner to identify thousands of ZigBee-enabled IoT device beacon requests. Just as network scanning using tools such as Nmap are commonly utilized by hackers to gather intelligence about network hosts, subnets, ports, and protocols, similar paradigms are being used against IoT devices—things that may open your garage door, lock your front door, turn lights on and off, and so on. Wireless reconnaissance will often precede full-scale attacks (http://fortune.com/2015/08/05/researchers-drone-discover-connected-devices-austin/).

主站蜘蛛池模板: 郧西县| 台北县| 静安区| 黔西| 合作市| 成安县| 建水县| 积石山| 二手房| 师宗县| 彭泽县| 体育| 大关县| 嘉峪关市| 琼海市| 江西省| 安顺市| 中西区| 新沂市| 保山市| 通河县| 湘潭县| 项城市| 文水县| 镇赉县| 顺平县| 舒兰市| 渑池县| 庐江县| 晴隆县| 社旗县| 沭阳县| 巴马| 民勤县| 灵丘县| 武汉市| 开江县| 大田县| 英德市| 理塘县| 习水县|