[Day 21] MQTT Have yourself a merry little webcam

Rahul Setrakian
2 min readDec 8, 2022

--

Greetings netizen. Today, we are here to solve the day “[Day 21] MQTT Have yourself a merry little webcam.”

IoT (Internet of Things) hacking refers to the practice of exploiting vulnerabilities in Internet of Things devices to gain unauthorized access or control over them. These devices include a wide range of products and devices that are connected to the internet and can be remotely accessed and controlled, such as smart home devices (such as thermostats, security cameras, and door locks), industrial control systems, medical devices, and more.

IoT hacking can take many forms, including:

  1. Gaining unauthorized access to an IoT device: This could involve using default passwords, guessing passwords, or exploiting vulnerabilities in the device’s software or hardware to gain access.
  2. Modifying the behavior of an IoT device: Once an attacker has gained access to an IoT device, they may be able to change its behavior or settings in ways that can have serious consequences. For example, an attacker might be able to change the temperature setting on a smart thermostat, or disable a security camera.
  3. Using an IoT device to gain access to other devices or systems: Once an attacker has gained access to an IoT device, they may be able to use it as a stepping stone to gain access to other devices or systems on the same network.

IoT hacking can pose serious risks to individuals, organizations, and society as a whole. It is important for IoT device users to be aware of these risks and to take steps to secure their devices, such as using strong passwords and keeping their devices up to date with the latest security patches.

Question & Answers:

  1. What port is Mosquitto running on?
    Answer: You can find the answers in our telegram community.
  2. Is the device/init topic enumerated by Nmap during a script scan of all ports? (y/n)
    Answer: You can find the answers in our telegram community.
  3. What Mosquitto version is the device using?
    Answer: You can find the answers in our telegram community.
  4. What flag is obtained from viewing the RTSP stream?
    Answer: You can find the answers in our telegram community.

Join the Community: https://telegram.me/NonymousCommunity

References:

https://tryhackme.com/room/adventofcyber4

--

--

Rahul Setrakian

I am Rahul Setrakian, a self-taught programmer looking to get into cybersecurity. I am passionate about programming and hacking.