IoT Protocols
MQTT (Message Queuing Telemetry Transport)
Overview
- Port: 1883 (plain), 8883 (TLS)
- Publish/Subscribe model
- Used in: Smart home, ICS/SCADA, sensors
- Broker-based architectureDiscovery
# Scan for MQTT brokers
nmap -p 1883,8883 --script mqtt-subscribe target.com
# Shodan
shodan search "port:1883 mqtt"
# Check for anonymous access
mosquitto_sub -h target.com -t '#' -v
# Expected output (if vulnerable):
# home/sensors/temperature 23.5
# home/door/status locked
# devices/camera/feed [binary data]Enumeration
Attacks
Tools
CoAP (Constrained Application Protocol)
Overview
Discovery
Enumeration
Attacks
Zigbee
Overview
Hardware Requirements
Sniffing
Attacks
Security Issues
Z-Wave
Overview
Hardware
Attacks
S0 Key Extraction
BLE (Bluetooth Low Energy)
Overview
Scanning
Enumeration
Attacks
Common Vulnerabilities
LoRaWAN
Overview
Hardware
Security Architecture
Attacks
General IoT Testing Tools
Related Topics
Last updated
Was this helpful?