Skip to Content
Internet of Things
book

Internet of Things

by Mayur Ramgir
June 2019
Intermediate to advanced
408 pages
17h 17m
English
Pearson Education India
Content preview from Internet of Things
How Do They Attack?
Since the IoT has experienced tremendous growth over the past few years; one hacking strategy
which is particularly prominent is the influx of DDoS campaigns. IoT devices primarily run
Unix and Linux-based operating systems. This makes it easier for the cybercriminals to trap
them with ELF (executable and linkable format) binaries. This format for files is commonly
found in the firmware of embedded systems. The delivery method of the cyberthreat mainly
looks to infect telnet or SSH (secure shell) network protocols. To hack them, they try multiple
strategies. For instance, they try to exploit hardcoded and default credentials. ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Internet of Things

Internet of Things

Simone Cirani, Gianluigi Ferrari, Marco Picone, Luca Veltri
Internet of Things

Internet of Things

Nasreddine Bouhaï, Imad Saleh
Internet of Things

Internet of Things

Maciej Kranz
Internet of Things

Internet of Things

Rajkumar Buyya, Amir Vahid Dastjerdi

Publisher Resources

ISBN: 9789353941529