1. Footprinting IoT and OT devices
As a professional ethical hacker or pen tester, your first step is to gather maximum information about the target IoT and OT devices by performing footprinting
Last updated
As a professional ethical hacker or pen tester, your first step is to gather maximum information about the target IoT and OT devices by performing footprinting
Last updated
The information regarding the target IoT and OT devices can be acquired using various online sources such as Whois domain lookup, advanced Google hacking, and Shodan search engine. The gathered information can be used to scan the devices for vulnerabilities and further exploit them to launch attacks.
In this Lab, we will focus on performing footprinting on the MQTT protocol, which is a machine-to-machine (M2M)/“Internet of Things” connectivity protocol. It is useful for connections with remote locations where a small code footprint is required and/or network bandwidth is at a premium.
You can perform whois analysis on OASIS website who have actually developed the MQTT protocol.
Whois lookup reveals available information on a hostname, IP address, or domain.
You can look for dorks related to IoT devices on google hacking database.
Using SCADA as a search query
You can also use Shodan to footprint IoT devices.
Port 1833 is default MQTT port