From the course: Ethical Hacking: Hacking IoT Devices
Unlock the full course today
Join today to access over 24,400 courses taught by industry experts.
Evaluating IoT vulnerabilities
From the course: Ethical Hacking: Hacking IoT Devices
Evaluating IoT vulnerabilities
- [Instructor] A vulnerability is a flaw in a system that a malicious actor can exploit in order to gain unauthorized access to an asset. In this segment, we'll outline tools and techniques used to uncover IoT vulnerabilities and reduce the risk of an attack. Today, businesses and consumers are recognizing the value of integrating IoT products and systems into their infrastructure and homes, but are they secure? When dealing with the IoT, the potential for cyberattacks along with compromising privacy is increasing due to gaping vulnerabilities found within many different types of devices. Researchers have scanned the internet and found hundreds of thousands of vulnerable IoT devices, which can pose serious security risks. Issues include lack of physical security. These small devices such as IP cameras can be located in several areas, many in plain sight, where they could be damaged or stolen. Hard-coded configurations can occur as well, such as the device having backdoor access or…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.