From the course: Ethical Hacking: Hacking IoT Devices
Unlock the full course today
Join today to access over 24,500 courses taught by industry experts.
Gathering Intel on IoT devices
From the course: Ethical Hacking: Hacking IoT Devices
Gathering Intel on IoT devices
- [Instructor] To launch an attack on an IoT device, the team must first learn about the devices on the network. In this segment, we'll discover information gathering techniques and tools such as MultiPing and FCC ID search to assess and learn about local and remote IoT devices on the network. There are many information gathering applications available that help provide the necessary tools for an effective reconnaissance exercise. A few goals at this stage is to see what devices are on the network, and then once identified, take steps to learn more about the devices. The team can begin by conducting a ping sweep using tools such as MultiPing, Nmap, and PRTG Network Monitor. A ping sweep will send probes to multiple hosts simultaneously to identify live hosts and then report on what devices are awake and listening. However, even though this might be part of the exercise, you should use caution when pinging IoT devices for a couple of reasons. Aggressive pinging can deplete resources…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.