Threat Hunting Example: Something on Wifi Trying to Find an Something on The Internal Network

And people wonder why I segregate the Internet of Things

Teri Radichel
Cloud Security
Published in
5 min readApr 15, 2024

--

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

⚙️ Check out my series on Automating Cybersecurity Metrics. The Code.

🔒 Related Stories: OS and IoT Security | Network Security | Apple Mac Security

💻 Free Content on Jobs in Cybersecurity | ✉️ Sign up for the Email List

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Sometimes it’s frustrating when you live with a network security person. They lock all the things down and sometimes something inadvertently that you want to access. Or do you?

Maybe that thing you are trying to access is not in your best interest to visit…

So here’s some traffic on our network that indicates some device is compromised potentially and now I have to figure out which one.

Supposedly all the TVs are turned off and nothing is connected but are they really turned off? Or are they in standby mode and still have access to the network? I’m not sure.

In any case here’s what the traffic I’m seeing looks like right now.

By the way this is not through a UDM Pro. That’s off at the moment and I’m using a backup device which has less capability than a UDM Pro. I essentially…

--

--

Teri Radichel
Teri Radichel

Written by Teri Radichel

CEO 2nd Sight Lab | Penetration Testing & Assessments | AWS Hero | Masters of Infosec & Software Engineering | GSE 240 etc | IANS | SANS Difference Makers Award