Network Attacks: IOT Devices
In this lab, you’ll practice identifying the attack surface of an IOT device, once you have identified the attack surface you will explore two of the common network attacks: Weak or default password, and brute force attack against the Telnet protocol. When you’re finished, you’ll have explored a sample of different network attacks that can be used to attack IOT devices..
Terms and conditions apply.
Lab info
Lab author
Challenge
Getting Started in the Lab Environment
Here are the initial instructions and explanation of the lab environment. Read this while your environment is busy creating itself from nothing. Yes, this violates physics; we know. How fun!
Challenge
Leveraging Weak Credentials to Gain Access
You will explore the attack surface of an IOT device that is running a weakly configured web application. You will learn how to detect a running application on an IOT device by scanning for open ports on the device.
Challenge
Brute Force Telnet Protocol
You will use the Nmap scanning tool to run a script that is related to the telnet protocol and attempt to brute force the password for the telnet user and you will observe the attempt in Wireshark and you will use a utility of Nmap and perform the same test. Finally, you will use Metasploit to perform a brute force attack against the telnet user as well.
Challenge
The Last Challenge
Welcome to the final challenge! This is your last chance to experiment in the environment.
Provided environment for hands-on practice
We will provide the credentials and environment necessary for you to practice right within your browser.
Guided walkthrough
Follow along with the author’s guided walkthrough and build something new in your provided environment!
Did you know?
On average, you retain 75% more of your learning if you get time for practice.
Recommended prerequisites
- Understanding of networks and communication between machines
- Basic knowledge of networks and the TCP/IP protocol