Any potential action or event that exploits vulnerabilities in IoT devices, networks, or platforms to compromise confidentiality, integrity, or availability
MEMORY HOOK: Threat exploits weakness
WHY IoT DEVICES ARE HIGHLY VULNERABLE
Reason
Default credentials
Hardcoded passwords
Weak/no encryption
Insecure web interfaces
Lack of patching
Limited processing power
Physical accessibility
Long device lifecycle
MEMORY HOOK: Cheap, old, exposed
IoT ATTACK SURFACE (EXAM FAVORITE)
Layer
Attack Surface
Device
Firmware, hardware ports
Network
Protocols, wireless
Gateway
Authentication flaws
Cloud
APIs, web apps
Application
Web/mobile apps
MEMORY HOOK: Every layer is attackable
IoT THREAT CATEGORIES (CEH LIST)
Category
Physical attacks
Network-based attacks
Software attacks
Cloud attacks
Supply chain attacks
DEVICE-LEVEL ATTACKS (CRITICAL)
1. DEFAULT CREDENTIAL ATTACK
Aspect
Description
Cause
Default usernames/passwords
Method
Credential reuse
Impact
Full device takeover
MEMORY HOOK: Default creds = instant access
2. FIRMWARE TAMPERING
Aspect
Description
Method
Modify firmware image
Vector
Update mechanism
Result
Persistent backdoor
MEMORY HOOK: Firmware = permanent control
3. PHYSICAL TAMPERING
Method
JTAG access
UART access
Chip-off attacks
Side-channel attacks
MEMORY HOOK: Physical access = root
4. HARDWARE BACKDOORS
Aspect
Malicious chips
Supply chain compromise
Undetectable persistence
NETWORK-LEVEL ATTACKS (VERY HIGH YIELD)
1. MAN-IN-THE-MIDDLE (MITM)
Description
Intercepts device communication
Alters commands/data
Exploits weak encryption
2. PROTOCOL-BASED ATTACKS
MQTT ATTACKS
Attack
Unauthorized topic subscription
Message injection
Broker compromise
MEMORY HOOK: MQTT without auth = broadcast
CoAP ATTACKS
Attack
Amplification
Spoofing
Replay attacks
3. DNS ATTACKS
Attack
DNS spoofing
DNS hijacking
Rogue DNS servers
4. JAMMING ATTACKS
Aspect
Wireless interference
DoS condition
Targets ZigBee, Bluetooth
MEMORY HOOK: Noise = DoS
SOFTWARE-LEVEL ATTACKS
1. INSECURE WEB INTERFACES (OWASP IoT TOP)
Issue
Weak authentication
No HTTPS
Command injection
XSS
2. INSECURE MOBILE APPS
Issue
Hardcoded APIs
Weak auth
Improper certificate validation
3. BUFFER OVERFLOWS
Cause
Unsafe memory handling
No bounds checking
4. INJECTION ATTACKS
Type
Command injection
SQL injection
XML injection
CLOUD & BACKEND ATTACKS
1. API ABUSE
Issue
Weak authentication
Broken authorization
Excessive privileges
2. DATA BREACHES
Cause
Misconfigured cloud storage
Weak access controls
3. ACCOUNT TAKEOVER
Vector
Credential stuffing
Phishing
BOTNET-BASED IoT ATTACKS (EXAM FAVORITE)
IoT BOTNET — DEFINITION
Term
Definition
IoT Botnet
A network of compromised IoT devices controlled by an attacker
MIRAI BOTNET (MUST MEMORIZE)
Feature
Targets IoT devices
Uses default credentials
Performs DDoS attacks
Scans Telnet/SSH
MEMORY HOOK: Mirai = IoT DDoS
OTHER IoT BOTNETS (RECOGNITION)
Botnet
Reaper
Hajime
Bashlite
Mozi
IoT DDoS ATTACK FLOW (STEP LOGIC)
Attacker scans for vulnerable IoT devices
Compromises devices using default credentials
Installs bot malware
Botnet receives C2 commands
Devices flood target with traffic
MEMORY HOOK: Scan → Infect → Control → Flood
SUPPLY CHAIN ATTACKS (IMPORTANT)
Attack
Compromised firmware
Malicious updates
Third-party library backdoors
MEMORY HOOK: Trust vendor = risk
IoT PRIVACY THREATS
Threat
Location tracking
Audio/video surveillance
Behavioral profiling
OBJECTIVE 02 — EXAM MEMORY BLOCK
IoT threats target devices, networks, software, and cloud components. Default credentials, weak encryption, and insecure interfaces are primary weaknesses. Botnets like Mirai exploit IoT at scale for DDoS attacks. Physical access and firmware attacks enable persistent compromise.