IoT and OT devices are commonly found in many of today’s networking and industrial environments. When performing reconnaissance and sniffing traffic across the network, the PenTester needs to look out for these devices; many of them are not designed with security in mind and can be a prime attack vector to gain access to the network.
Common protocols used by IoT devices include the following:
Common OT protocols include the following:
These are just a few examples of the more common protocols used by these devices. Being able to identify Iot/OT devices on a network will hopefully give the PenTester more options for potential attack vectors.