Chapter 13 Attacking Smart Devices

Information in This Chapter

  • Selecting a Target Smart Device

  • Attacking a Smart Device

While smart meters are currently being rolled out to consumers, those interested in attacking smart meters are limited by their physical access to them. However, those targeting smart devices already have access to a plethora of devices that are only a click and credit card away. In Chapter 12, “Attacking Smart Meters,” we reviewed two methodologies that an attacker might use when targeting smart meters. In this chapter, we will utilize ISECOM's Open Source Security Testing Methodology Manual to attack an actual smart device. While we will not disclose any particular vulnerabilities in the targeted smart device, ...

Get Securing the Smart Grid now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.