From the course: Ethical Hacking: Hacking IoT Devices (2019)

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

IoT hacking methodology

IoT hacking methodology

From the course: Ethical Hacking: Hacking IoT Devices (2019)

Start my 1-month free trial

IoT hacking methodology

- [Instructor] Hacking methodology for IoT platforms is pretty much the same use on other platforms. It just has some particularities due to the fact IoT devices in general has the hardware component on top of it and it has its own particular vulnerabilities. But the idea is the same. With that said, what will be the first step in our IoT hacking methodology? If you said information gathering you scored. That's the first thing you should be working on. Gather information about the targeted systems. IP addresses, running protocols, open ports, types of devices, vendor information. Very useful resources like the Shodan, Censys, Thingful that will help you search and find information you are looking for. Vulnerability scanning. That's the best way to find vulnerabilities to be exploited later. You will use tools like Nmap, RIoT, Nessus, Qualys, Nexpose, to scan the network or the web application to find vulnerabilities such as weak passwords, software or firmware bugs, default…

Contents