- Practical Internet of Things Security
- Brian Russell Drew Van Duren
- 145字
- 2021-06-10 18:42:30
Wireless reconnaissance and mapping
The majority of IoT devices on the market utilize wireless communication protocols such as ZigBee, ZWave, Bluetooth-LE, and Wi-Fi 802.11. Similar to the war dialing days of old where hackers scanned through telephone switching networks to identify electronic modems, today, researchers are successfully demonstrating scanning attacks against IoT devices. One example is the Texas-based company Praetorian, which in Austin, TX, has used a low-flying drone outfitted with a custom ZigBee protocol scanner to identify thousands of ZigBee-enabled IoT device beacon requests. Just as network scanning using tools such as Nmap are commonly utilized by hackers to gather intelligence about network hosts, subnets, ports, and protocols, similar paradigms are being used against IoT devices—things that may open your garage door, lock your front door, turn lights on and off, and so on. Wireless reconnaissance will often precede full-scale attacks (http://fortune.com/2015/08/05/researchers-drone-discover-connected-devices-austin/).
- 數(shù)據(jù)恢復方法及案例分析
- 信息安全導論(在線實驗+在線自測)
- Mobile Forensics Cookbook
- CSO進階之路:從安全工程師到首席安全官
- 零信任網(wǎng)絡(luò):在不可信網(wǎng)絡(luò)中構(gòu)建安全系統(tǒng)
- Building a Home Security System with BeagleBone
- End to End GUI Development with Qt5
- 信息技術(shù)基礎(chǔ):提高篇·實驗與習題
- 黑客攻防實戰(zhàn)從入門到精通
- 網(wǎng)絡(luò)服務安全與監(jiān)控
- 數(shù)字政府網(wǎng)絡(luò)安全合規(guī)性建設(shè)指南:密碼應用與數(shù)據(jù)安全
- 網(wǎng)絡(luò)空間安全:拒絕服務攻擊檢測與防御
- 云計算安全:關(guān)鍵技術(shù)、原理及應用
- ATT&CK與威脅獵殺實戰(zhàn)
- 動態(tài)賦能網(wǎng)絡(luò)空間防御