29 Sep
2016
29 Sep
'16
1:38 a.m.
On Wed, Sep 28, 2016 at 1:43 PM, Steve Kinney <admin@pilobilus.net> wrote:
Things. MITM the vendor's connection and collect them as they pass?
Abusing the vendor, that's one way.
Send connection requests to Things at whole IP address ranges and see who answers?
This is done... zmap.io scans.io . IPv6 makes full scan pointless, but discovering actual ranges/ip in use, based on collecting metadata beforehand for targeted scans, will happen. At least so long as it remains profitable effort.