did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781718500907

Practical IoT Hacking The Definitive Guide to Attacking the Internet of Things

by ; ; ; ;
  • ISBN13:

    9781718500907

  • ISBN10:

    1718500904

  • Format: Paperback
  • Copyright: 2021-04-09
  • Publisher: No Starch Press
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $49.99 Save up to $1.50
  • Buy New
    $48.49
    Add to Cart Free Shipping Icon Free Shipping

    USUALLY SHIPS IN 3-5 BUSINESS DAYS

Supplemental Materials

What is included with this book?

Summary

Written by all-star security experts, Practical IoT Hacking is a quick-start conceptual guide to testing and exploiting IoT systems and devices.

Drawing from the real-life exploits of five highly regarded IoT security researchers, Practical IoT Hacking teaches you how to test IoT systems, devices, and protocols to mitigate risk.
 
The book begins by walking you through common threats and a threat modeling framework. You’ll develop a security testing methodology, discover the art of passive reconnaissance, and assess security on all layers of an IoT system. Next, you’ll perform VLAN hopping, crack MQTT authentication, abuse UPnP, develop an mDNS poisoner, and craft WS-Discovery attacks.
 
You’ll tackle both hardware hacking and radio hacking, with in-depth coverage of attacks against embedded IoT devices and RFID systems.
 
You’ll also learn how to:
  • Write a DICOM service scanner as an NSE module
  • Hack a microcontroller through the UART and SWD interfaces
  • Reverse engineer firmware and analyze mobile companion apps
  • Develop an NFC fuzzer using Proxmark3
  • Hack a smart home by jamming wireless alarms, playing back IP camera feeds, and controlling a smart treadmill
  •  
    The tools and devices you’ll use are affordable and readily available, so you can easily practice what you learn. Whether you’re a security researcher, IT team member, or hacking hobbyist, you’ll find Practical IoT Hacking indispensable in your efforts to hack all the things
     
    REQUIREMENTS: Basic knowledge of Linux command line, TCP/IP, and programming
     

    Author Biography

    Fotios (Fotis) Chantzis is laying the foundation for a safe and secure Artificial General Intelligence (AGI) at OpenAI. Previously, he worked as a principal information security engineer at Mayo Clinic, where he managed and conducted technical security assessments on medical devices, clinical support systems, and critical healthcare infrastructure.

    Ioannis Stais is a senior IT security researcher and head of red teaming at CENSUS S.A., a company that offers specialized cybersecurity services. He has participated in dozens of security assessment projects, including the assessment of communication protocols, web and mobile banking services, ATMs and point-of-sale systems, and critical medical appliances.

    Paulino Calderon is a published author and international speaker with over 12 years of experience in network and application security. When he isn't traveling to security conferences or consulting for Fortune 500 companies with Websec, a company he co-founded in 2011, he spends peaceful days enjoying the beach in Cozumel, Mexico.


    Evangelos Deirmentzoglou is an information security professional interested in solving security problems at scale. He led and structured the cybersecurity capability of the financial tech startup Revolut. A member of the open-source community since 2015, he has made multiple contributions to Nmap and Ncrack.

    Beau Woods is a cyber safety innovation fellow with the Atlantic Council and a leader with the I Am The Cavalry grassroots initiative. He is also the founder and CEO of Stratigos Security and sits on the board of several nonprofits. Beau is a published author and frequent public speaker.

    Table of Contents

    Preface

    Foreword

    Part One: The IoT Threat Landscape
    Chapter 1: The IoT Security World
    Chapter 2: Threat Modeling
    Chapter 3: A Security Testing Methodology

    Part Two: Network Hacking
    Chapter 4: Network Assessments
    Chapter 5: Analyzing Network Protocols
    Chapter 6: Exploiting Zero-configuration Networking

    Part Three: Hardware Hacking
    Chapter 7: UART and JTAG Exploitation
    Chapter 8: Hacking SPI and I2C
    Chapter 9: Firmware Hacking

    Part Four: Radio Hacking
    Chapter 10: Abusing RFID
    Chapter 11: Exploiting Bluetooth Low Energy
    Chapter 12: Wi-Fi Hacking
    Chapter 13: Exploiting LPWAN

    Part Five: Targeting the IoT Ecosystem
    Chapter 14: Attacking Mobile Applications
    Chapter 15: Hacking the “Smart” Home

    Appendix A: Tools for IoT Hacking

    Supplemental Materials

    What is included with this book?

    The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

    The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

    Rewards Program