Summary: | Currently, the growth of cybercrime and online attacks reflects the increase in the use of Internet of Things (IoT) devices. This has become a challenge as the use of IoT devices continues to grow and diversify in variety. It is challenging to cater to all security problems at once due to IoT devices have many designs and updates. These variations are likely to create security concerns, as there is currently no industry-wide standard for IoT device security. This situation raises security concerns. In addition, since IoT devices hold sensitive and personal information, they are susceptible to a variety of risks as attackers attempt to take advantage of the flaws that exist. As a consequence, ensuring the safety of all applications and devices connected to the IoT is crucial. This paper presents a project that executes penetration testing on a Raspberry Pi 4 that could act as an IoT device and a laptop running on Kali Linux as a hacking tool in order to determine the vulnerabilities of IoT devices. This project successfully conducted cyber-attacks against the exploitable vulnerabilities in the Raspberry Pi 4 acting as an IoT device by executing DoS attack, man-in-the-middle attack and brute force attack. Finally, this paper also presents a set of best practices for mitigating the cyber-attacks. © 2022 IEEE.
|