Hackable? cover image

Protecting The Grid

Hackable?

00:00

Using Shodan to Get to the Devices

Using shodan, we can see that we can actually directly access it from shodan. And you can that this is fully unauthenticated. It has a the ability to change the user name and password right here. From he sr security set up, we can do administration including the systen logs and device logs. This is just one of thousands of devices world wide that we can access without any kind of authentication at all. We would not want to take it any further, certainly yet. But many of the types of interstintra structure that we've observed today our just representative of the type of things that you can find on the internet.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app