githubEdit

IoT Protocols

Security testing for IoT communication protocols - MQTT, CoAP, Zigbee, Z-Wave, BLE, and LoRaWAN.

Skill Level: Advanced Prerequisites: Networking, RF basics, embedded systems

MQTT (Message Queuing Telemetry Transport)

Overview

- Port: 1883 (plain), 8883 (TLS)
- Publish/Subscribe model
- Used in: Smart home, ICS/SCADA, sensors
- Broker-based architecture

Discovery

# Scan for MQTT brokers
nmap -p 1883,8883 --script mqtt-subscribe target.com

# Shodan
shodan search "port:1883 mqtt"

# Check for anonymous access
mosquitto_sub -h target.com -t '#' -v

# Expected output (if vulnerable):
# home/sensors/temperature 23.5
# home/door/status locked
# devices/camera/feed [binary data]

Enumeration

Attacks

Tools

CoAP (Constrained Application Protocol)

Overview

Discovery

Enumeration

Attacks

Zigbee

Overview

Hardware Requirements

Sniffing

Attacks

Security Issues

Z-Wave

Overview

Hardware

Attacks

S0 Key Extraction

BLE (Bluetooth Low Energy)

Overview

Scanning

Enumeration

Attacks

Common Vulnerabilities

LoRaWAN

Overview

Hardware

Security Architecture

Attacks

General IoT Testing Tools

Last updated

Was this helpful?