Chapter 12–New Surface Threats

Hacking IoT Firmware

Hacking IoT devices is similar to hacking any other IT web site or application. However, there are many more attack surfaces, which we will describe in this next section. The obvious difference is the vast footprint of vulnerable devices – the diversity of things. In addition to this explosion of potential targets have also come increasingly large areas of surface to attack.

Previously security practitioners were reasonably comfortable with the traditional highly fortified bordered network, and then along came IP mobility and BYOD and that turned traditional security blueprints into waste paper. Consequently, more flexible borderless network architectures were required that could accommodate ...

Get IoT Security Issues now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.