From the course: Ethical Hacking: Hacking IoT Devices
Unlock the full course today
Join today to access over 24,500 courses taught by industry experts.
Reviewing IoT attacks
From the course: Ethical Hacking: Hacking IoT Devices
Reviewing IoT attacks
- [Instructor] Testing indicates that approximately 25% of IOT devices have vulnerabilities, which can lead to an attack. In this segment, we'll explore IOT security attacks, which can lead to more extensive incidents such as DDoS attacks, botnets, and supply chain breaches. IOT devices have vulnerabilities in multiple layers as outlined here. For example, we can see in the application layer there can be insecure software. In the network layer, we can see weak or hard-coded passwords. And in the physical layer, there can be a lack of a secure boot process. Now let's talk about some of the attacks that can occur on an IOT device. We can see physical attacks. Now, physical access can lead to tampering or theft of devices. Attackers can tamper with insecure firmware on an IOT device and insert malicious code. Malicious actors can also use a fault injection attack. Now, this is when a threat actor introduces faults such as electromagnetic interference or errors into a system, which can…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.