In this lecture we understanding IoT
concepts, an overview of IoT threats and attacks, IoT hacking methodology,
tools and techniques of IoT hacking, security tool and penetration testing.
Internet of Things (IoT) is an environment of physical devices such as home
appliances, electronic devices, sensors, etc.
The world is rapidly moving towards automation. The need for automated
devices which controls our daily tasks on fingertips is increasing day by day.
SO,
IoT technology simply requires unique identity.Every one know that unique identity refers to the IP
address, especially IPV6 addresses to provide each and every device a unique
identity. IPv4 arid IPV6 planning and deployment over an advance network
structure requires thorough consideration of advanced strategies and
techniques. In IP version 4, a 32-bit address is assigned to each network node
for the identification while in IP version 6, 128 bits are assigned to each node
for unique identification. Advance IP address must consider IP address which supports efficiency, reliability,
and scalability in the overall network model.
Internet of Things (IoT) Technologies and Protocols
IoT Communication Models
There are same ways in which IoT devices can communicate with the other devices.
First:
Device to device model
Device to device model is a basic IoT communication model in which two devices are communicating with each other without interfering any other device.
For example, consider a real-life scenario of a home where multiple sensors are installed for security reasons such as motion detector, cameras,temperature sensor, etc.
D-to-G Model
Device-to-Gateway(D to G) model is similar to Device to cloud model. IoT gateway device is added in this Device-to-Gateway model which collects the data from sensors and send it to the remote application server.
B-End D-S Model
Back-End Data-Sharing (B end D.S)Model is an advanced model in which devices are communicating with the application servers.
IoT Attacks
There are same attacks:
1: DDoS Attack
2: BlueBome Attack
3: Jamming Attack
4: Rolling Code Attack
IoT Hacking Methodology
Every one know that rules of hacking are
Information Gathering
Vulnerability Scanning
Perform/Launch Attack
Gain Access
Maintain Attack
Secure yourself from this hack by simply steps
Firmware update
Block unnecessary ports
Disable Telnet
Use encrypted communication such as SSL/TLS
Use strong password
Use encryption of drives
User account lockout
Periodic assessment of devices
Secure password recovery
Two-Factor Authentication
Disable UPnP
0 comments:
Post a Comment