OBJECTIVE 02 — IoT THREATS AND ATTACKS


IoT THREAT — CORE DEFINITION (EXAM)

Term Definition
IoT Threat Any potential action or event that exploits vulnerabilities in IoT devices, networks, or platforms to compromise confidentiality, integrity, or availability

MEMORY HOOK:
Threat exploits weakness


WHY IoT DEVICES ARE HIGHLY VULNERABLE

Reason
Default credentials
Hardcoded passwords
Weak/no encryption
Insecure web interfaces
Lack of patching
Limited processing power
Physical accessibility
Long device lifecycle

MEMORY HOOK:
Cheap, old, exposed


IoT ATTACK SURFACE (EXAM FAVORITE)

Layer Attack Surface
Device Firmware, hardware ports
Network Protocols, wireless
Gateway Authentication flaws
Cloud APIs, web apps
Application Web/mobile apps

MEMORY HOOK:
Every layer is attackable


IoT THREAT CATEGORIES (CEH LIST)

Category
Physical attacks
Network-based attacks
Software attacks
Cloud attacks
Supply chain attacks

DEVICE-LEVEL ATTACKS (CRITICAL)


1. DEFAULT CREDENTIAL ATTACK

Aspect Description
Cause Default usernames/passwords
Method Credential reuse
Impact Full device takeover

MEMORY HOOK:
Default creds = instant access


2. FIRMWARE TAMPERING

Aspect Description
Method Modify firmware image
Vector Update mechanism
Result Persistent backdoor

MEMORY HOOK:
Firmware = permanent control


3. PHYSICAL TAMPERING

Method
JTAG access
UART access
Chip-off attacks
Side-channel attacks

MEMORY HOOK:
Physical access = root


4. HARDWARE BACKDOORS

Aspect
Malicious chips
Supply chain compromise
Undetectable persistence

NETWORK-LEVEL ATTACKS (VERY HIGH YIELD)


1. MAN-IN-THE-MIDDLE (MITM)

Description
Intercepts device communication
Alters commands/data
Exploits weak encryption

2. PROTOCOL-BASED ATTACKS

MQTT ATTACKS

Attack
Unauthorized topic subscription
Message injection
Broker compromise

MEMORY HOOK:
MQTT without auth = broadcast


CoAP ATTACKS

Attack
Amplification
Spoofing
Replay attacks

3. DNS ATTACKS

Attack
DNS spoofing
DNS hijacking
Rogue DNS servers

4. JAMMING ATTACKS

Aspect
Wireless interference
DoS condition
Targets ZigBee, Bluetooth

MEMORY HOOK:
Noise = DoS


SOFTWARE-LEVEL ATTACKS


1. INSECURE WEB INTERFACES (OWASP IoT TOP)

Issue
Weak authentication
No HTTPS
Command injection
XSS

2. INSECURE MOBILE APPS

Issue
Hardcoded APIs
Weak auth
Improper certificate validation

3. BUFFER OVERFLOWS

Cause
Unsafe memory handling
No bounds checking

4. INJECTION ATTACKS

Type
Command injection
SQL injection
XML injection

CLOUD & BACKEND ATTACKS


1. API ABUSE

Issue
Weak authentication
Broken authorization
Excessive privileges

2. DATA BREACHES

Cause
Misconfigured cloud storage
Weak access controls

3. ACCOUNT TAKEOVER

Vector
Credential stuffing
Phishing

BOTNET-BASED IoT ATTACKS (EXAM FAVORITE)


IoT BOTNET — DEFINITION

Term Definition
IoT Botnet A network of compromised IoT devices controlled by an attacker

MIRAI BOTNET (MUST MEMORIZE)

Feature
Targets IoT devices
Uses default credentials
Performs DDoS attacks
Scans Telnet/SSH

MEMORY HOOK:
Mirai = IoT DDoS


OTHER IoT BOTNETS (RECOGNITION)

Botnet
Reaper
Hajime
Bashlite
Mozi

IoT DDoS ATTACK FLOW (STEP LOGIC)

  1. Attacker scans for vulnerable IoT devices

  2. Compromises devices using default credentials

  3. Installs bot malware

  4. Botnet receives C2 commands

  5. Devices flood target with traffic

MEMORY HOOK:
Scan → Infect → Control → Flood


SUPPLY CHAIN ATTACKS (IMPORTANT)

Attack
Compromised firmware
Malicious updates
Third-party library backdoors

MEMORY HOOK:
Trust vendor = risk


IoT PRIVACY THREATS

Threat
Location tracking
Audio/video surveillance
Behavioral profiling

OBJECTIVE 02 — EXAM MEMORY BLOCK

IoT threats target devices, networks, software, and cloud components.
Default credentials, weak encryption, and insecure interfaces are primary weaknesses.
Botnets like Mirai exploit IoT at scale for DDoS attacks.
Physical access and firmware attacks enable persistent compromise.


OBJECTIVE 02 — STATUS

Item Status
Device attacks COMPLETE
Network attacks COMPLETE
Software attacks COMPLETE
Cloud attacks COMPLETE
Botnets COMPLETE
Exam alignment EXACT