- Practical Internet of Things Security
- Brian Russell Drew Van Duren
- 145字
- 2021-06-10 18:42:30
Wireless reconnaissance and mapping
The majority of IoT devices on the market utilize wireless communication protocols such as ZigBee, ZWave, Bluetooth-LE, and Wi-Fi 802.11. Similar to the war dialing days of old where hackers scanned through telephone switching networks to identify electronic modems, today, researchers are successfully demonstrating scanning attacks against IoT devices. One example is the Texas-based company Praetorian, which in Austin, TX, has used a low-flying drone outfitted with a custom ZigBee protocol scanner to identify thousands of ZigBee-enabled IoT device beacon requests. Just as network scanning using tools such as Nmap are commonly utilized by hackers to gather intelligence about network hosts, subnets, ports, and protocols, similar paradigms are being used against IoT devices—things that may open your garage door, lock your front door, turn lights on and off, and so on. Wireless reconnaissance will often precede full-scale attacks (http://fortune.com/2015/08/05/researchers-drone-discover-connected-devices-austin/).
- 白話網(wǎng)絡(luò)安全2:網(wǎng)安戰(zhàn)略篇
- 網(wǎng)絡(luò)安全保障能力研究
- 網(wǎng)絡(luò)安全意識(shí)導(dǎo)論
- INSTANT Burp Suite Starter
- 安全實(shí)戰(zhàn)之滲透測試
- 走進(jìn)新安全:讀懂網(wǎng)絡(luò)安全威脅、技術(shù)與新思想
- 黑客攻防與無線安全從新手到高手(超值版)
- 網(wǎng)絡(luò)安全能力成熟度模型:原理與實(shí)踐
- Web安全之深度學(xué)習(xí)實(shí)戰(zhàn)
- 情報(bào)驅(qū)動(dòng)應(yīng)急響應(yīng)
- 持續(xù)集成:軟件質(zhì)量改進(jìn)和風(fēng)險(xiǎn)降低之道
- CTF快速上手:PicoCTF真題解析(Web篇)
- 華為Anti-DDoS技術(shù)漫談
- Hands-On Artificial Intelligence for Cybersecurity
- Securing Network Infrastructure