- Main
- Computers - Networking
- Practical IoT Hacking: The Definitive...
Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things
Chantzis, Fotios, Stais, Ioannis, Calderon, Paulino, Deirmentzoglou, Evangelos, Woods, BeauBu kitabı nə dərəcədə bəyəndiniz?
Yüklənmiş faylın keyfiyyəti necədir?
Kitabın keyfiyyətini qiymətləndirə bilmək üçün onu yükləyin
Yüklənmiş faylların keyfiyyəti necədir?
Written by all-star security experts, Practical IoT Hacking is a quick-start conceptual guide to testing and exploiting IoT systems and devices.
Drawing from the real-life exploits of five highly regarded IoT security researchers, Practical IoT Hacking teaches you how to test IoT systems, devices, and protocols to mitigate risk.
The book begins by walking you through common threats and a threat modeling framework. You’ll develop a security testing methodology, discover the art of passive reconnaissance, and assess security on all layers of an IoT system. Next, you’ll perform VLAN hopping, crack MQTT authentication, abuse UPnP, develop an mDNS poisoner, and craft WS-Discovery attacks.
You’ll tackle both hardware hacking and radio hacking, with in-depth coverage of attacks against embedded IoT devices and RFID systems.
You’ll also learn how to:
REQUIREMENTS: Basic knowledge of Linux command line, TCP/IP, and programming
Drawing from the real-life exploits of five highly regarded IoT security researchers, Practical IoT Hacking teaches you how to test IoT systems, devices, and protocols to mitigate risk.
The book begins by walking you through common threats and a threat modeling framework. You’ll develop a security testing methodology, discover the art of passive reconnaissance, and assess security on all layers of an IoT system. Next, you’ll perform VLAN hopping, crack MQTT authentication, abuse UPnP, develop an mDNS poisoner, and craft WS-Discovery attacks.
You’ll tackle both hardware hacking and radio hacking, with in-depth coverage of attacks against embedded IoT devices and RFID systems.
You’ll also learn how to:
- Write a DICOM service scanner as an NSE module
- Hack a microcontroller through the UART and SWD interfaces
- Reverse engineer firmware and analyze mobile companion apps
- Develop an NFC fuzzer using Proxmark3
- Hack a smart home by jamming wireless alarms, playing back IP camera feeds, and controlling a smart treadmill
REQUIREMENTS: Basic knowledge of Linux command line, TCP/IP, and programming
This book is primarily intended for hackers (sometimes referred to as security researchers), although others are expected to find it useful, such as the following: real security researchers, corporate system administrators or network engineers, product managers, security evaluators, and curious students!
Kateqoriyalar:
İl:
2021
Nəşriyyat:
No Starch Press
Dil:
english
Səhifələr:
464
ISBN 10:
1718500904
ISBN 13:
9781718500907
Fayl:
PDF, 15.63 MB
Sizin teqləriniz:
IPFS:
CID , CID Blake2b
english, 2021
Yüklə (pdf, 15.63 MB)
- Checking other formats...
- Çevirmək
- 8 MB-dən böyük faylların çevrilməsi funksiyasını blokdan azad edinPremium
Kitab mağazasını əlavə etmək istəyirsiniz? Bizimlə support@z-lib.fm ilə əlaqə saxlayın
1-5 dəqiqə ərzində e-poçtunuz bərpa olunacadır.
1-5 dəqiqə ərzində fayl sizin Telegram akkauntunuza çatdırılacaq.
Diqqət: Hesabınızı Z-Library Telegram botuna bağladığınızdan əmin olun.
1-5 dəqiqə ərzində fayl Kindle cihazınıza çatdırılacaq.
Qeyd: Kindle-yə göndərdiyiniz hər kitabı verifikasiyadan keçirməlisiniz. Amazon Kindle Support-dan təsdiq məktubunu aldığınıza dair e-poçt ünvanınızı yoxlayın.
formatına konvertasiya yerinə yetirilir
formatına konvertasiya baş tutmadı
Premium statusun üstünlükləri
- Elektron oxuculara göndərin
- Artırılmış yükləmə limiti
- Faylları çevirin
- Daha çox axtarış nəticəsi
- Digər üstünlüklər