Book description
- Perform a threat model of a real-world IoT device and locate all possible attacker entry points
- Use reverse engineering of firmware binaries to identify security issues
- Analyze,assess, and identify security issues in exploited ARM and MIPS based binaries
- Sniff, capture, and exploit radio communication protocols, such as Bluetooth Low Energy (BLE), and ZigBee
Table of contents
- Cover
- Front Matter
- 1. Internet of Things: A Primer
- 2. Performing an IoT Pentest
- 3. Analyzing Hardware
- 4. UART Communication
- 5. Exploitation Using I2C and SPI
- 6. JTAG Debugging and Exploitation
- 7. Firmware Reverse Engineering and Exploitation
- 8. Exploiting Mobile, Web, and Network for IoT
- 9. Software Defined Radio
- 10. Exploiting ZigBee and BLE
- Back Matter
Product information
- Title: The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things
- Author(s):
- Release date: March 2019
- Publisher(s): Apress
- ISBN: 9781484243008
You might also like
book
Gray Hat Hacking The Ethical Hacker's Handbook, Fifth Edition, 5th Edition
Cutting-edge techniques for finding and fixing critical security flaws Fortify your network and avert digital catastrophe …
book
Practical IoT Hacking
Drawing from the real-life exploits of five highly regarded IoT security researchers, Practical IoT Hacking teaches …
book
IoT Security
An up-to-date guide to an overview of authentication in the Internet of Things (IoT) The Internet …
book
Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition, 6th Edition
Up-to-date strategies for thwarting the latest, most insidious network attacks This fully updated, industry-standard security resource …