EthicalHacking Flashcards
What are the components of IoT?
Devices
Infrastructure
Processes
People
Data
What is OODA loop?
Observe
Orient
Decide
Act
REPEAT
What are some protocols to move data in IoT?
MQTT
HTTP
ZIGBEE
6LoWPAN
XMPP
DDS
CoAP
What is MQTT?
Message Queuing Telemetry Transport
What is XMPP?
Extensible Messaging and Presence Protocol
What is DDS?
Data Distribution Service
What is CoAP
Constrained Application Protocol
What is 6LoWPAN
Ipv6 over low power wireless personal area network
What is 802.15.4 IEEE standard?
Used by ZigBee as protocol standard.
What is NFC?
Near Field Communication
Protocol used in IoT
What is Enemybot?
malicious botnet that targets Internet of Things (IoT) devices.
How does Enemybot work?
- Exploits vulnerabilities in IoT devices to gain access and install the botnet malware
- The infected device establishes a connection with a command-and-control (C&C) server
- The C&C server sends commands to the infected devices, instructing them to perform malicious actions
How to protect against Enemybot?
Keep software and firmware updated
Change default password
Strong passwords
Enable network security features
Disable unnecessary services
What is OWASP
Open Worldwide Application Security Project
Researches application vulnerabilities
What is Telematics
combination of telecommunications and computer information systems to collect, transmit, and analyze data
What are OWASP top ten
Broken Access Control
Cryptographic failures - weak cyphers
Injection
Insecure Design
Security Misconfiguration
Outdated components
Identification and Authentication Failures
Software and Data Integrity Failures
Security Logging and Monitoring Failures
Server-Side Request Forgery
What are best practices with IoT security
Mitigate threats at device level
apply latest patches
strong authorization and authentication
disable unneeded network services
physical protections
Types of IoT attacks
Physical Tampering
Firmware updates run malicious code
Fault injection to introduce errors
Backdoor access
Wireless signal jamming
Supply chain - during manufacture or shipping of devices
What are Zero Trust Policies
assumes that all devices, whether inside or outside the network, are potentially hostile
What is ICS
Industrial Control Systems
What are the Ethical hacking stages
Reconnaissance
Scanning
Gaining access
Maintaining Access
Covering Tracks
Describe Reconnaissance stage ethical hacking
get device make, model and search documentation, firmware updates online
Describe Scanning stage ethical hacking
Scan for open ports, services
Vulnerabilities
Describe gaining access stage ethical hacking
launch exploits on vulnerabilities