Fotios (Fotis) Chantzis is laying the foundation for a safe and secure Artificial General Intelligence (AGI) at OpenAI.
Meer over de auteursPractical Iot Hacking
The Definitive Guide to Attacking the Internet of Things
Paperback Engels 2020 1e druk 9781718500907Samenvatting
Drawing from the real-life exploits of five highly regarded IoT security researchers, Practical IoT Hacking teaches you how to test IoT systems, devices, and protocols to mitigate risk.
The book begins by walking you through common threats and a threat modeling framework. You’ll develop a security testing methodology, discover the art of passive reconnaissance, and assess security on all layers of an IoT system. Next, you’ll perform VLAN hopping, crack MQTT authentication, abuse UPnP, develop an mDNS poisoner, and craft WS-Discovery attacks.
You’ll tackle both hardware hacking and radio hacking, with in-depth coverage of attacks against embedded IoT devices and RFID systems.
You’ll also learn how to:
- Write a DICOM service scanner as an NSE module
- Hack a microcontroller through the UART and SWD interfaces
- Reverse engineer firmware and analyze mobile companion apps
- Develop an NFC fuzzer using Proxmark3
- Hack a smart home by jamming wireless alarms, playing back IP camera feeds, and controlling a smart treadmill
The tools and devices you’ll use are affordable and readily available, so you can easily practice what you learn. You can also download this book’s code examples at https://github.com/practical-iot-hacking.
Whether you’re a security researcher, IT team member, or hacking hobbyist, you’ll find Practical IoT Hacking indispensable in your efforts to hack all the things
REQUIREMENTS: Basic knowledge of Linux command line, TCP/IP, and programming
Specificaties
Lezersrecensies
Over Ioannis Stais
Over Paulino Calderon
Over Evangelos Deirmentzoglou
Over Beau Woods
Inhoudsopgave
Foreword
Part One: The IoT Threat Landscape
Chapter 1: The IoT Security World
Chapter 2: Threat Modeling
Chapter 3: A Security Testing Methodology
Part Two: Network Hacking
Chapter 4: Network Assessments
Chapter 5: Analyzing Network Protocols
Chapter 6: Exploiting Zero-configuration Networking
Part Three: Hardware Hacking
Chapter 7: UART, JTAG, and SWD Exploitation
Chapter 8: Hacking SPI and I2C
Chapter 9: Firmware Hacking
Part Four: Radio Hacking
Chapter 10: Short Range Radio: Abusing RFID
Chapter 11: Bluetooth Low Energy
Chapter 12: Medium Range Radio: Hacking Wi-Fi
Chapter 13: Long Range Radio: LPWAN
Part Five: Targeting the IoT Ecosystem
Chapter 14: Attacking Mobile Applications
Chapter 15: Hacking the Smart Home
Appendix A: Tools for IoT Hacking
View the Copyright Page
View the detailed Table of Contents
View the Index
Rubrieken
- advisering
- algemeen management
- coaching en trainen
- communicatie en media
- economie
- financieel management
- inkoop en logistiek
- internet en social media
- it-management / ict
- juridisch
- leiderschap
- marketing
- mens en maatschappij
- non-profit
- ondernemen
- organisatiekunde
- personal finance
- personeelsmanagement
- persoonlijke effectiviteit
- projectmanagement
- psychologie
- reclame en verkoop
- strategisch management
- verandermanagement
- werk en loopbaan