# 1. Footprinting IoT and OT devices

## 1. Gather Information using Online Footprinting Tools

The information regarding the target IoT and OT devices can be acquired using various online sources such as Whois domain lookup, advanced Google hacking, and Shodan search engine. The gathered information can be used to scan the devices for vulnerabilities and further exploit them to launch attacks.

> In this Lab, we will focus on performing footprinting on the MQTT protocol, which is a machine-to-machine (M2M)/“Internet of Things” connectivity protocol. It is useful for connections with remote locations where a small code footprint is required and/or network bandwidth is at a premium.

{% embed url="<https://www.whois.com/whois>" %}

{% embed url="<https://www.oasis-open.org/>" %}
Oasis is an organization that has published the MQTT v5.0 standard, which represents a significant leap in the refinement and capability of the messaging protocol that already powers IoT
{% endembed %}

You can perform whois analysis on OASIS website who have actually developed the MQTT protocol.

<figure><img src="https://2218819509-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FrUBnODuUX4EQ8P27uc5D%2Fuploads%2F1LJ6esy30iqp5J3xzTDM%2Fimage.png?alt=media&#x26;token=ef28b628-e615-4530-b7ed-cd1d7f31b775" alt=""><figcaption></figcaption></figure>

Whois lookup reveals available information on a hostname, IP address, or domain.

You can look for dorks related to IoT devices on google hacking database.

{% embed url="<https://www.exploit-db.com/google-hacking-database>" %}

<figure><img src="https://2218819509-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FrUBnODuUX4EQ8P27uc5D%2Fuploads%2FPrFqORF8fjrtSq5nB70E%2Fimage.png?alt=media&#x26;token=756f6686-418b-47a7-9c72-af0984e01751" alt=""><figcaption></figcaption></figure>

Using SCADA as a search query

```
"login" intitle:"scada login"
 intitle:"index of" scada
```

You can also use Shodan to footprint IoT devices.

{% embed url="<https://account.shodan.io/login>" %}

Port 1833 is default MQTT port

```
port:1833

Search for Modbus-enabled ICS/SCADA systems:
port:502

Search for SCADA systems using PLC name:
“Schneider Electric”

Search for SCADA systems using geolocation:
SCADA Country:"US"
```

<figure><img src="https://2218819509-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FrUBnODuUX4EQ8P27uc5D%2Fuploads%2FfF7nfpCxUSTFKiG4fgpF%2Fimage.png?alt=media&#x26;token=d2c24f3e-be87-4e21-b45e-45a44a076a1b" alt=""><figcaption></figcaption></figure>

{% embed url="<https://youtu.be/pg-7M0UbCLA>" %}
IoT OSINT complete tutorial
{% endembed %}

{% embed url="<https://www.udemy.com/course/ethical-hacker-practical/?referralCode=289CF01CF51246BCAD6C>" %}
CEHv13 Prep Course
{% endembed %}
