ethical-hacker video for a penetration tester is assessing the security of an IoT-based smart home system and discovers that the devices use default credentials
A penetration tester is assessing the security of an IoT-based smart home system and discovers that the devices use default credentials and lack firmware updates. The tester warns that an attacker could easily gain access to these devices and use them for DDoS attacks, data theft, or even remote control of connected systems. Which type of attack is most commonly associated with exploiting vulnerable IoT devices?