Since the IoT has experienced tremendous growth over the past few years; one hacking strategy
which is particularly prominent is the influx of DDoS campaigns. IoT devices primarily run
Unix and Linux-based operating systems. This makes it easier for the cybercriminals to trap
them with ELF (executable and linkable format) binaries. This format for files is commonly
found in the firmware of embedded systems. The delivery method of the cyberthreat mainly
looks to infect telnet or SSH (secure shell) network protocols. To hack them, they try multiple
strategies. For instance, they try to exploit hardcoded and default credentials. ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month, and much more.