The information regarding the target IoT and OT devices can be acquired using various online sources such as Whois domain lookup, advanced Google hacking, and Shodan search engine. The gathered information can be used to scan the devices for vulnerabilities and further exploit them to launch attacks.
In this Lab, we will focus on performing footprinting on the MQTT protocol, which is a machine-to-machine (M2M)/“Internet of Things” connectivity protocol. It is useful for connections with remote locations where a small code footprint is required and/or network bandwidth is at a premium.
You can perform whois analysis on OASIS website who have actually developed the MQTT protocol.
Whois lookup reveals available information on a hostname, IP address, or domain.
You can look for dorks related to IoT devices on google hacking database.
You can also use Shodan to footprint IoT devices.