preview

Iot Devices Essay

Good Essays
Open Document

The problem that we are trying to solve preventing and protecting IoT devices from being hacked and organizing the data from the IoT devices so it would be monitored. Since many devices are connected to the Internet and can be hacked. It can also be detected by the Shodan search engine that is made to connect IoT devices.The problem is of interest because many IoT devices are connected to the Internet and our daily lifestyler relies on the digital world. Many IoT devices such as cameras, MRI monitors, and voice recognition devices are all used in our daily lives. Many homeowners and hospital workers would benefit from this investigation to help protect their privacy and information from being leaked out to the public.

Background
Kevin …show more content…

Telnet and SSH are an operating system-level login, and the [Web interface] tends to be more of an application level login. Sometimes changing a password on one changes the password on the other, but more often the Web [interface] is completely different, and changing the password there may not change the underlying password” needed to access the device remotely via SSH and Telnet”.

Additionally, cameras are extremely vulnerable if they are connected to the internet and become exposed to malware that could affect not only the device that’s attacked, but all other devices that’s in the same network. According to the article from ZDNET (175,000 IoT cameras can be remotely hacked thanks to flaw), Chinese manufacturer Shenzen Neo Electronics had two cameras that were discovered to have been vulnerable to cyberattacks that would find loopholes to remotely attack the device and the 175,000 devices connected to it. This prompted researchers to address how trivial it is to exploit IoT devices because of the low quality of the firmware.
Lab Design
Describe the lab that you designed to investigate the problem and explain how the lab/methodology helped in your investigation.

List the hardware/software tools needed for the lab. https://iotscanner.bullguard.com/ Bitdefender scan
Kaspersky scanner
Mirai IoT vulnerability scanner
Retina IoT vulnerability scanner

Using the IoT scanner from

Get Access