- Main
- Computers - Networking
- Practical IoT Hacking: The Definitive...
Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things
Chantzis, Fotios, Stais, Ioannis, Calderon, Paulino, Deirmentzoglou, Evangelos, Woods, BeauAvez-vous aimé ce livre?
Quelle est la qualité du fichier téléchargé?
Veuillez télécharger le livre pour apprécier sa qualité
Quelle est la qualité des fichiers téléchargés?
Written by all-star security experts, Practical IoT Hacking is a quick-start conceptual guide to testing and exploiting IoT systems and devices.
Drawing from the real-life exploits of five highly regarded IoT security researchers, Practical IoT Hacking teaches you how to test IoT systems, devices, and protocols to mitigate risk.
The book begins by walking you through common threats and a threat modeling framework. You’ll develop a security testing methodology, discover the art of passive reconnaissance, and assess security on all layers of an IoT system. Next, you’ll perform VLAN hopping, crack MQTT authentication, abuse UPnP, develop an mDNS poisoner, and craft WS-Discovery attacks.
You’ll tackle both hardware hacking and radio hacking, with in-depth coverage of attacks against embedded IoT devices and RFID systems.
You’ll also learn how to:
REQUIREMENTS: Basic knowledge of Linux command line, TCP/IP, and programming
Drawing from the real-life exploits of five highly regarded IoT security researchers, Practical IoT Hacking teaches you how to test IoT systems, devices, and protocols to mitigate risk.
The book begins by walking you through common threats and a threat modeling framework. You’ll develop a security testing methodology, discover the art of passive reconnaissance, and assess security on all layers of an IoT system. Next, you’ll perform VLAN hopping, crack MQTT authentication, abuse UPnP, develop an mDNS poisoner, and craft WS-Discovery attacks.
You’ll tackle both hardware hacking and radio hacking, with in-depth coverage of attacks against embedded IoT devices and RFID systems.
You’ll also learn how to:
- Write a DICOM service scanner as an NSE module
- Hack a microcontroller through the UART and SWD interfaces
- Reverse engineer firmware and analyze mobile companion apps
- Develop an NFC fuzzer using Proxmark3
- Hack a smart home by jamming wireless alarms, playing back IP camera feeds, and controlling a smart treadmill
REQUIREMENTS: Basic knowledge of Linux command line, TCP/IP, and programming
This book is primarily intended for hackers (sometimes referred to as security researchers), although others are expected to find it useful, such as the following: real security researchers, corporate system administrators or network engineers, product managers, security evaluators, and curious students!
Catégories:
Année:
2021
Editeur::
No Starch Press
Langue:
english
Pages:
464
ISBN 10:
1718500904
ISBN 13:
9781718500907
Fichier:
PDF, 15.63 MB
Vos balises:
IPFS:
CID , CID Blake2b
english, 2021
Lire en ligne
- Télécharger
- pdf 15.63 MB Current page
- Checking other formats...
- Convertir en
- Débloquer la conversion des fichiers de plus de 8 MoPremium
Vous souhaitez ajouter une librairie ? Contactez-nous à support@z-lib.do
Le fichier sera envoyé à votre adresse de courriel dans 1 à 5 minutes.
Dans 1-5 minutes, le fichier sera delivré à votre compte Telegram.
Note : Assurez-vous que vous avez lié votre compte au bot Telegram de Z-Library.
Dans 1-5 minutes, le fichier sera delivré à votre appareil Kindle.
Remarque: vous devez valider chaque livre avant de l'envoyer à Kindle. Veuillez vérifier votre messagerie pour voir le mail avec la confirmation par Amazon Kindle Support.
La conversion en est effectuée
La conversion en a échoué
Avantages du statut Premium
- Envoyez aux e-lecteurs
- Limite de téléchargement augmentée
- Convertissez des fichiers
- Plus de résultats de recherche
- Autres avantages