IoT Security: Abusing Smart Lighting Systems

WellBacklitAmericium avatar
WellBacklitAmericium
·
·
Download

Start Quiz

Study Flashcards

15 Questions

What is the main limitation of the Guardian Ear, the first baby monitoring system based on Radio Waves?

Limited by the range of radio waves at that time

Why are modern baby monitoring systems using WiFi considered to be at risk of eavesdropping?

They can be accessed remotely from anywhere in the world

What was reported about the vulnerability of Foscam baby monitors at the "Hack in the Box" conference?

Attackers can obtain username and password once the IP address is known

How can Shodan search engine help in finding vulnerable Foscam baby monitors over the internet?

By querying Shodan with information from the HTTP response

What protocol do Foscam devices use to update their hostname mapping?

User Datagram Protocol (UDP)

How do attackers abuse their knowledge of Foscam devices' hostname ranges?

To conduct phishing attacks by querying ns1.myfoscam.org

What is the purpose of the SLS hand-shake step 3?

To prove that you have physical access to the bridge

What does the Access-Control-Allow-Origin header in the server response indicate?

The victim's ability to visit a website from their local network

What is the purpose of the Smart Lighting System (SLS) hand-shake step 2?

To find your bridge and associate it with your account

What is the SLS hand-shake step 1 about?

Creating a user account

Which component sends a POST request during the SLS hand-shake process?

Philips Bridge

What is the vulnerability associated with the SLS server response header?

Access-Control-Allow-Origin allowing local network website capture

What is the purpose of the Philips Bridge in the Smart Lighting System (SLS) hand-shake?

To prove physical access to the bridge

What does Step 3 of the SLS hand-shake involve?

Website sends Setup Complete message to backend

What does Step 2 of SLS hand-shake involve?

Finding your bridge and associating it with your account

Learn about the vulnerabilities in Smart Lighting Systems, including the hand-shake process, and potential risks associated with Baby Monitors and IoT devices. This lecture covers topics related to IoT security and potential exploits in smart home devices.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

IoT Security Quiz
5 questions

IoT Security Quiz

ReputableSerpentine avatar
ReputableSerpentine
IoT Security Infrastructure Quiz
3 questions
IoT Security and Hacking Quiz
10 questions
IoT Devices and Sensors Quiz
12 questions

IoT Devices and Sensors Quiz

StimulativeMahoganyObsidian avatar
StimulativeMahoganyObsidian
Use Quizgecko on...
Browser
Browser