Chapter 13 Attacking Smart Devices
Information in This Chapter
Selecting a Target Smart Device
Attacking a Smart Device
While smart meters are currently being rolled out to consumers, those interested in attacking smart meters are limited by their physical access to them. However, those targeting smart devices already have access to a plethora of devices that are only a click and credit card away. In Chapter 12, “Attacking Smart Meters,” we reviewed two methodologies that an attacker might use when targeting smart meters. In this chapter, we will utilize ISECOM's Open Source Security Testing Methodology Manual to attack an actual smart device. While we will not disclose any particular vulnerabilities in the targeted smart device, ...