This document discusses the legal, ethical, social, and professional challenges in ethical hacking of IoT protocols. It covers topics such as the necessity to impart security to constrained devices, authorization and authentication of devices, management of device updates, securing communication, ensuring data privacy, securing mobile, web, and cloud-based applications, and ensuring high availability.