课程: Ethical Hacking: Hacking IoT Devices
今天就学习课程吧!
今天就开通帐号,24,700 门业界名师课程任您挑!
Gathering Intel on IoT devices
- [Instructor] To launch an attack on an IoT device, the team must first learn about the devices on the network. In this segment, we'll discover information gathering techniques and tools such as MultiPing and FCC ID search to assess and learn about local and remote IoT devices on the network. There are many information gathering applications available that help provide the necessary tools for an effective reconnaissance exercise. A few goals at this stage is to see what devices are on the network, and then once identified, take steps to learn more about the devices. The team can begin by conducting a ping sweep using tools such as MultiPing, Nmap, and PRTG Network Monitor. A ping sweep will send probes to multiple hosts simultaneously to identify live hosts and then report on what devices are awake and listening. However, even though this might be part of the exercise, you should use caution when pinging IoT devices for a couple of reasons. Aggressive pinging can deplete resources…
随堂练习,边学边练
下载课堂讲义。学练结合,紧跟进度,轻松巩固知识。