Every time you hook up a poorly-protected device to your network, you run the risk that crooks will find it, probe it, attack it, exploit it and – if things end badly – use it as a toehold to dig into your digital life. Criminals who figure out how to commandeer a vulnerable device inside your network can use that device to map out, scan and attack your laptop – the one you’re using right now to work from home – as if they were right there beside you.
If you’ve ever played around with internet of thing (IoT) devices, for example, you’ll probably know that many of them are based on the Linux kernel and the open-source system software that typically forms the core of any Linux distribution. Indeed, even the tiniest and most stripped-down devices often include not only special purpose software tailored to that device, but also a host of standard Unix command-line utilities that are the same as, or similar to, the tools you will find in any penetration tester’s toolbox.
For example, a device such as a webcam or smart speaker usually doesn’t just contain audio and video processing code. You’ll probably also find one or more command shells. Shells such as bash, lash, ash or dash make it easy to run command scripts to automate system management tasks.
Then, there could be LAN and wireless configuration programs. Tools such as ifconfig, ip, iwlist and iwconfig make it straightforward to map out and configure network settings. You may also find downloader tools and programs such as curl and wget can be used not only for downloading files over the internet, but also for uploading stolen data to outside websites, typically just with a single command.
هذه القصة مأخوذة من طبعة December 2020 من Voice and Data.
ابدأ النسخة التجريبية المجانية من Magzter GOLD لمدة 7 أيام للوصول إلى آلاف القصص المتميزة المنسقة وأكثر من 9,000 مجلة وصحيفة.
بالفعل مشترك ? تسجيل الدخول
هذه القصة مأخوذة من طبعة December 2020 من Voice and Data.
ابدأ النسخة التجريبية المجانية من Magzter GOLD لمدة 7 أيام للوصول إلى آلاف القصص المتميزة المنسقة وأكثر من 9,000 مجلة وصحيفة.
بالفعل مشترك? تسجيل الدخول
Data discomfort: Why India's data connectivity speeds are falling
India is one of the world’s biggest markets for 5G Internet services, but that has come at the cost of connectivity speed—at least for now
A full-stack mission to orbit
With its all-in-one model, Dhruva Space is merging satellite design, launch, and support under one roof to streamline India's space-tech future
5G dreams: A tech revolution hits roadblocks
India's swift 5G rollout encounters hurdles as operators struggle to monetise their investment, with sluggish consumer and enterprise adoption stalling growth
Empowering India's next-gen business pathways
Cloud, data centres, and 5G form a powerful trio, shaping India’s digital future with scalable infrastructure, seamless connectivity, and rapid innovation
Interconnected technologies, unlocking enterprise growth potential
The synergy of AI, IoT, and 5G is transforming business operations, enabling smarter decision-making and paving the way for scalable, data-driven growth
Beyond the 5G horizon, a new era of user expectations
Telecom experts explore a future beyond 5G, revealing how Al, loT, and secure infrastructure will transform industries and meet rising user demands
Unfolding India’s digital journey beyond 5G
India’s telecom leaders envision a future of next-gen connectivity, aiming for a digitally inclusive landscape driven by innovation and sustainable growth
Digital infrastructure: not the Achilles' heel but the jugular
As cyber threats intensify, digital infrastructure faces rising risks, demanding vigilant, multi-layered defences to ensure resilience for the future.
BUILDING SMARTER HIGHWAYS IN TELECOM'S NEW DIGITAL FRONTIER
Autonomous networks enable telcos to streamline operations, enhance services, and reduce costs, driving efficiency in a data-driven, hyperconnected world
Pre-zero data dreams: Are AI smartphones leading the way?
Artificial Intelligence can unlock personalised insights, ushering in a new era of data-driven experiences that anticipate user needs before they are expressed.