- Main
- Computers - Networking
- Practical IoT Hacking: The Definitive...
Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things
Chantzis, Fotios, Stais, Ioannis, Calderon, Paulino, Deirmentzoglou, Evangelos, Woods, BeauBu kitabı ne kadar beğendiniz?
İndirilen dosyanın kalitesi nedir?
Kalitesini değerlendirmek için kitabı indirin
İndirilen dosyaların kalitesi nedir?
Written by all-star security experts, Practical IoT Hacking is a quick-start conceptual guide to testing and exploiting IoT systems and devices.
Drawing from the real-life exploits of five highly regarded IoT security researchers, Practical IoT Hacking teaches you how to test IoT systems, devices, and protocols to mitigate risk.
The book begins by walking you through common threats and a threat modeling framework. You’ll develop a security testing methodology, discover the art of passive reconnaissance, and assess security on all layers of an IoT system. Next, you’ll perform VLAN hopping, crack MQTT authentication, abuse UPnP, develop an mDNS poisoner, and craft WS-Discovery attacks.
You’ll tackle both hardware hacking and radio hacking, with in-depth coverage of attacks against embedded IoT devices and RFID systems.
You’ll also learn how to:
REQUIREMENTS: Basic knowledge of Linux command line, TCP/IP, and programming
Drawing from the real-life exploits of five highly regarded IoT security researchers, Practical IoT Hacking teaches you how to test IoT systems, devices, and protocols to mitigate risk.
The book begins by walking you through common threats and a threat modeling framework. You’ll develop a security testing methodology, discover the art of passive reconnaissance, and assess security on all layers of an IoT system. Next, you’ll perform VLAN hopping, crack MQTT authentication, abuse UPnP, develop an mDNS poisoner, and craft WS-Discovery attacks.
You’ll tackle both hardware hacking and radio hacking, with in-depth coverage of attacks against embedded IoT devices and RFID systems.
You’ll also learn how to:
- Write a DICOM service scanner as an NSE module
- Hack a microcontroller through the UART and SWD interfaces
- Reverse engineer firmware and analyze mobile companion apps
- Develop an NFC fuzzer using Proxmark3
- Hack a smart home by jamming wireless alarms, playing back IP camera feeds, and controlling a smart treadmill
REQUIREMENTS: Basic knowledge of Linux command line, TCP/IP, and programming
This book is primarily intended for hackers (sometimes referred to as security researchers), although others are expected to find it useful, such as the following: real security researchers, corporate system administrators or network engineers, product managers, security evaluators, and curious students!
Kategoriler:
Yıl:
2021
Yayımcı:
No Starch Press
Dil:
english
Sayfalar:
464
ISBN 10:
1718500904
ISBN 13:
9781718500907
Dosya:
PDF, 15.63 MB
Etiketleriniz:
IPFS:
CID , CID Blake2b
english, 2021
İndir (pdf, 15.63 MB)
- Checking other formats...
- Dönüşme yap
- 8 MB'tan büyük dosyaların dönüştürülmesine izin verinPremium
Bir kitap dükkanı eklemek ister misiniz? Bize support@z-lib.fm adresinden ulaşın
Dosya 1-5 dakika içinde e-postanıza teslim edilecektir.
Dosya 1-5 dakika içinde Telegram hesabınıza teslim edilecektir.
Not: Hesabınızı Z-Library Telegram botuna bağladığınızdan emin olun.
Dosya 1-5 dakika içinde Kindle cihazınıza teslim edilecektir.
Not: Kindle'a gönderdiğiniz her kitabı doğrulamanız gerekir. Amazon Kindle Support'tan gelen bir onay e-postası için e-posta gelen kutunuzu kontrol edin.
'e dönüştürme devam ediyor
dosyasına dönüştürme başarısız oldu
Premium statüsünün avantajları
- E-okuyuculara gönderin
- Arttırılmış indirme limiti
- Dosyaları dönüştürün
- Diğer arama sonuçları
- Diğer avantajları