CEH Module 18: IoT and OT Hacking
Have you ever wondered how your smart home devices, like your voice-activated assistant, smart thermostat, or even your connected refrigerator, work seamlessly together? These devices are all part of the Internet of Things (IoT), a network of interconnected gadgets that make our lives more convenient by gathering and sharing data. However, while IoT devices offer immense benefits, they also introduce new security challenges.

In Module 18: IoT and OT Hacking of the Certified Ethical Hacker (CEH) program, we explore the interesting yet risky world of IoT (Internet of Things) and OT (Operational Technology) hacking. As we add more smart devices into our homes and workplaces—like voice assistants, smart appliances, and industrial control systems—the chances of cyber threats targeting these systems increase. Recent studies, such as the “2024 Unit 42 IoT Threat Report” by Palo Alto Networks, show a massive increase in attacks on IoT devices.
Additionally, more industries are using IoT and OT technologies to improve efficiency, which means there’s an even greater need to ensure these technologies are secure. This module helps you understand the vulnerabilities in these systems and how to defend against potential attacks, emphasizing the need to always be ahead in cybersecurity.
Concepts of IoT Hacking
The IoT (Internet of Things) or IoE (Internet of Everything) represents a world where millions of devices, such as automobiles, watches, and building automation, sense and react, talking to us and each other. We can say that it is a network of interconnected devices with IP addresses and the capability to sense and collect data, which makes our lives more efficient by gathering and sharing data.
How IoT work?
- Sensing Technology: Sensors are the eyes and ears of IoT devices. These sensors are embedded in devices designed to detect and evaluate different data types, such as temperature, humidity, pressure, or movement. For example, your smartphone is full of sensors—it has a GPS to track location, an accelerometer to detect movement, and even a light sensor to adjust the screen brightness based on your conditions. These sensors constantly gather information and are key components in making IoT devices smart.
- IoT Gateway: Once the sensor collects data, it needs to send this information somewhere to be processed. This is where the IoT gateway comes in. The gateway acts like a translator, allowing different devices to communicate with each other. It connects the IoT device (like your smart thermostat) to the Internet. This connection enables the data to be sent securely over the Internet to the next component.
- Cloud Server/Data Storage: After the data is sent through the gateway, it reaches the cloud server, a storage facility. Here, all the data collected from various IoT devices is stored and analyzed. The cloud processes the data to provide useful insights. For example, it analyzes temperature data from your thermostat to learn your heating preferences and make automatic adjustments.
- Remote Control Using Mobile Apps: The cloud isn’t just about storage; it also enables remote control of your IoT devices. This is where mobile applications come in. With an application on your smartphone or tablet, you can access your devices anywhere. For example, if you’re away from home and want to adjust your thermostat, you can use the application to change the temperature. The application communicates with the cloud server, which sends a command back through the gateway to the device, making the change you requested.
IoT Architecture
- Edge Technology Layer: This is the foundation layer where sensors and devices are located. It gathers data from the physical environment, such as temperature or motion.
- Access Gateway Layer: This layer acts as a bridge between devices and the network. It processes and translates data from different devices, ensuring smooth communication across the network.
- Internet Layer: The main communication pathway for data transfer. It connects different devices and systems, enabling data to flow between them, such as from a smart device to the cloud.
- Middleware Layer: This layer sits between the hardware and application layers, managing data and devices. It handles tasks like data filtering, analysis, and security, ensuring that only relevant information is processed and acted upon.
- Application Layer: The top layer where users interact with IoT services. It provides applications and services tailored to various needs, like healthcare monitoring or smart home controls.
IoT Communication Models
The Internet of Things (IoT) links multiple devices, allowing them to communicate and share data. There are several communication models in IoT, each designed for different scenarios and needs.
- Device-to-Device Communication Model: Devices talk directly to each other without using the Internet. They use wireless protocols like ZigBee, Z-Wave, or Bluetooth. For example, a smart light bulb and a smart switch interact directly to turn lights on or off.
- Device-to-Cloud Model: Devices communicate directly with a cloud server over the Internet. This is often done using Wi-Fi, Ethernet, or cellular networks. For example, a smart thermostat sends data to the cloud, allowing remote access and control via a smartphone application.
- Device-to-Gateway Model: IoT devices first connect to an intermediary device called a gateway (like a smartphone or a hub). The gateway then sends data to the cloud. This model enhances security and improves data management efficiency. For example, a fitness tracker sends data to a smartphone (gateway), which forwards it to the cloud for analysis.
- Back-End Data-Sharing Model: This model extends the Device-to-Cloud model by allowing data stored in the cloud to be accessed by authorized third parties. This is particularly useful for broader analysis and data sharing across multiple platforms. For example, Smart energy meters upload data to the cloud, where it’s analyzed for energy usage patterns and cost-saving strategies.
To be Continued…
IoT Device Hacking
Master CEH with InfosecTrain
Ethical hacking involves a detailed and multi-step process that demands a strong understanding of cybersecurity and relevant certifications. Professionals looking to enhance their skills in security assessments and network design can benefit greatly from ethical hacking courses, such as the Certified Ethical Hacker (CEH) certification training offered by InfosecTrain. This training provides learners with the expertise and knowledge needed to legally and ethically test and protect an organization’s systems, allowing them to find vulnerabilities before cybercriminals can exploit them.
TRAINING CALENDAR of Upcoming Batches For CEH v13
| Start Date | End Date | Start - End Time | Batch Type | Training Mode | Batch Status | |
|---|---|---|---|---|---|---|
| 06-Dec-2025 | 11-Jan-2026 | 09:00 - 13:00 IST | Weekend | Online | [ Open ] | |
| 13-Dec-2025 | 18-Jan-2026 | 19:00 - 23:00 IST | Weekend | Online | [ Open ] | |
| 03-Jan-2026 | 08-Feb-2026 | 19:00 - 23:00 IST | Weekend | Online | [ Open ] | |
| 17-Jan-2026 | 01-Mar-2026 | 09:00 - 13:00 IST | Weekend | Online | [ Open ] | |
| 07-Feb-2026 | 15-Mar-2026 | 19:00 - 23:00 IST | Weekend | Online | [ Open ] |
