IoT and Hackers Home Work for Next Attack

IoT and Hackers Home Work for Next Attack

Over the years IoT devices are becoming more pervasive with every home now owning a smart or IoT type device. These devices mean increased efficiencies and make our lives easier but at the same time, it introduces a whole range of risks that often people don’t understand or don’t know they exist. It estimated that by 2020, we will have 50 Billion devices connected to the internet & it’s the next Broadway for attackers. Maximum IoT devices don’t have any built-in protection, firewall, intrusion detector, or auto firmware update system. Maximum IoT devices have a default configuration, no patching capability. To secure your credential user need to understand the anatomy of the Attack. Security Tools aren’t enough to defend users against online threats. To be a millimeter-wave surfer user education & awareness are important, so they can understand the methodologies of the attacker & it’s the only option to make a virtual in your property line. Information Gathering through Google Docker is the first task of a Hacker which can be achieved through Internet “Footprint” (Maltego), Physical Surveillance (Shodan), Dumpster diving, Social Engineering. The next level of information can achieve Host & Port Scanning (Nmap / Superscan /Metasploit) & then they trying to Enumeration Tools (SuperScan 4 / Enum / Metasploit) which helps them make inventory or listing of the possible entry point.

Weak, Clear text, or easily guessed passwords provide one of the largest cyber exposures, shared passwords make it easier also Complex passwords can identify by rainbow table/rainbow crack but we can use hash cat to add additional security. More often people keep default password router/switch/modem which makes it easier to gain access & Physical Access like WiFi devices / Call-back Or Jump boxes / Keyloggers / USB rubber ducky / LAN Turtle / Packet Squirrel etc. Also, when you have too many devices it's very hard to remember all credentials & keep them updated.

To remove the human from the equation & take the flavor of automation blockchain technology with dedicated cloud service like AWS (Amazon Web service) / Azure is the present solution now but near future we will see our current cybersecurity infrastructure will become obsolete & Quantum Key / IoT Management devices & IoT device standardization process will help us close the access of Hacker to our Bedroom. 


To view or add a comment, sign in

Insights from the community

Others also viewed

Explore topics