BookShared
  • MEMBER AREA    
  • Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things

    (By Fotios Chantzis)

    Book Cover Watermark PDF Icon Read Ebook
    ×
    Size 26 MB (26,085 KB)
    Format PDF
    Downloaded 654 times
    Last checked 13 Hour ago!
    Author Fotios Chantzis
    “Book Descriptions: The definitive guide to hacking the world of the Internet of Things (IoT) -- Internet connected devices such as medical devices, home assistants, smart home appliances and more.

    Geared towards security researchers, IT teams, and penetration testers, application testers, developers, and IT administrators, this book teaches readers how to get started with hacking Internet connected devices. Readers dig deep into technical (and related legal) issues, as they learn what kinds of devices to use as hacking tools and which make the best targets. The authors, all experts in the field, cover the kinds of vulnerabilities found in IoT devices, explain how to exploit their network protocols, and how to leverage security flaws and certain hardware interfaces found in the physical devices themselves.

    The book begins with threat modeling and a security testing methodology, then covers how to attack hardware interfaces such as UART, I�C, SPI, JTAG / SWD and IoT network protocols like UPnP, WS-Discovery, mDNS, DNS-SD, RTSP / RTCP / RTP, LoRa / LoRaWAN, Wi-Fi / Wi-Fi Direct, RFID / NFC, BLE, MQTT, CDP and DICOM. Examples throughout offer custom code designed to demonstrate specific vulnerabilities and tools to help readers reproduce the attacks. Practical IoT Hacking is full of practical exercises and hands-on examples taken from the authors' own research that teach readers things like how to bypass the authentication of an STM32F103 device (black pill) through SWD; reverse firmware; exploit zero-configuration networking; use low-cost equipment to capture LoRa network traffic; analyze IoT companion mobile apps, take over and remotely control an Android based treadmill, jam wireless devices such as home alarm systems, hijack Bluetooth Low Energy connections and how to circumvent modern RFID and NFC enabled smart door locks.”

    Google Drive Logo DRIVE
    Book 1

    Bug Bounty Bootcamp

    ★★★★★

    Vickie Li

    Book 1

    The Smart Girl's Guide to Privacy: Practical Tips for Staying Safe Online

    ★★★★★

    Violet Blue

    Book 1

    Pentesting Azure Applications: The Definitive Guide to Testing and Securing Deployments

    ★★★★★

    Matt Burrough

    Book 1

    When They Win, You Win: Being a Great Manager Is Simpler Than You Think

    ★★★★★

    Russ Laraway

    Book 1

    How to Blow Up a Pipeline

    ★★★★★

    Andreas Malm

    Book 1

    Blitzed: Drugs in Nazi Germany

    ★★★★★

    Norman Ohler

    Book 1

    Kubernetes: Up & Running

    ★★★★★

    Kelsey Hightower

    Book 1

    Red Team Blues (Martin Hench #1)

    ★★★★★

    Cory Doctorow

    Book 1

    The Seven Principles for Making Marriage Work: A Practical Guide from the Country's Foremost Relationship Expert

    ★★★★★

    John M. Gottman

    Book 1

    Making Embedded Systems: Design Patterns for Great Software

    ★★★★★

    Elecia White

    Book 1

    Leviathan Falls (The Expanse, #9)

    ★★★★★

    James S.A. Corey

    Book 1

    The Rust Programming Language

    ★★★★★

    Steve Klabnik