1. Footprinting IoT and OT devices

As a professional ethical hacker or pen tester, your first step is to gather maximum information about the target IoT and OT devices by performing footprinting

1. Gather Information using Online Footprinting Tools

The information regarding the target IoT and OT devices can be acquired using various online sources such as Whois domain lookup, advanced Google hacking, and Shodan search engine. The gathered information can be used to scan the devices for vulnerabilities and further exploit them to launch attacks.

In this Lab, we will focus on performing footprinting on the MQTT protocol, which is a machine-to-machine (M2M)/“Internet of Things” connectivity protocol. It is useful for connections with remote locations where a small code footprint is required and/or network bandwidth is at a premium.

Oasis is an organization that has published the MQTT v5.0 standard, which represents a significant leap in the refinement and capability of the messaging protocol that already powers IoT

You can perform whois analysis on OASIS website who have actually developed the MQTT protocol.

Whois lookup reveals available information on a hostname, IP address, or domain.

You can look for dorks related to IoT devices on google hacking database.

Using SCADA as a search query

"login" intitle:"scada login"
 intitle:"index of" scada

You can also use Shodan to footprint IoT devices.

Port 1833 is default MQTT port

port:1833

Search for Modbus-enabled ICS/SCADA systems:
port:502

Search for SCADA systems using PLC name:
“Schneider Electric”

Search for SCADA systems using geolocation:
SCADA Country:"US"
IoT OSINT complete tutorial

Last updated

Was this helpful?