[ Certified Ethical Hacker v10 ] :: [ Chapter 8 cont’d ] :: Hacking the Internet of Things

Mobile Things, Smart Things, Internet of Things

Targets

Doorbells
Thermostats
Lights
Coffee pots
Toilets
Car computers
Useless things

Methodologies

OWASP Mobile Top 10 Vulnerabilities – https://owasp.org/www-project-mobile-top-10/

Tools

Shodan

A very simple visual example from WikiHow:

https://www.wikihow.com/Use-Shodan

A more elaborate set of examples from Null Byte:

https://null-byte.wonderhowto.com/how-to/hack-like-pro-find-vulnerable-targets-using-shodan-the-worlds-most-dangerous-search-engine-0154576/

Some good examples:

https://danielmiessler.com/study/shodan/

Shodon.io’s Own Search Query Fundamentals

https://help.shodan.io/the-basics/search-query-fundamentals

Thingful

https://www.thingful.net/
https://www.youtube.com/watch?v=8szgWWXjMTY

Censys

https://censys.io/
https://www.youtube.com/watch?v=JYpfXPhk_Gw
https://www.youtube.com/watch?v=WPEfYKkSJk4

The Internet of Useless Things

https://iout.rehabagency.ai/

EarthCam: Find Online Cameras

https://www.earthcam.com/

Gee, can I view a video stream from a CCTV camera?

https://flir.custhelp.com/app/answers/detail/a_id/1053/~/vlc-media-player—display-and-record-a-video-stream-(automation-cameras)

VANET

Vehicle Ad-Hoc Network