Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things
The definitive guide to hacking the world of the Internet of Things (IoT) -- Internet connected devices such as medical devices, home assistants, smart home appliances and more.

Drawing from the real-life exploits of five highly regarded IoT security researchers, Practical IoT Hacking teaches you how to test IoT systems, devices, and protocols to mitigate risk.
 
The book begins by walking you through common threats and a threat modeling framework. You’ll develop a security testing methodology, discover the art of passive reconnaissance, and assess security on all layers of an IoT system. Next, you’ll perform VLAN hopping, crack MQTT authentication, abuse UPnP, develop an mDNS poisoner, and craft WS-Discovery attacks.
 
You’ll tackle both hardware hacking and radio hacking, with in-depth coverage of attacks against embedded IoT devices and RFID systems.
 
You’ll also learn how to:

   • Write a DICOM service scanner as an NSE module
   • Hack a microcontroller through the UART and SWD interfaces
   • Reverse engineer firmware and analyze mobile companion apps
   • Develop an NFC fuzzer using Proxmark3
   • Hack a smart home by jamming wireless alarms, playing back IP camera feeds, and controlling a smart treadmill 
The tools and devices you’ll use are affordable and readily available, so you can easily practice what you learn. Whether you’re a security researcher, IT team member, or hacking hobbyist, you’ll find Practical IoT Hacking indispensable in your efforts to hack all the things
 
REQUIREMENTS: Basic knowledge of Linux command line, TCP/IP, and programming
 
1138071016
Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things
The definitive guide to hacking the world of the Internet of Things (IoT) -- Internet connected devices such as medical devices, home assistants, smart home appliances and more.

Drawing from the real-life exploits of five highly regarded IoT security researchers, Practical IoT Hacking teaches you how to test IoT systems, devices, and protocols to mitigate risk.
 
The book begins by walking you through common threats and a threat modeling framework. You’ll develop a security testing methodology, discover the art of passive reconnaissance, and assess security on all layers of an IoT system. Next, you’ll perform VLAN hopping, crack MQTT authentication, abuse UPnP, develop an mDNS poisoner, and craft WS-Discovery attacks.
 
You’ll tackle both hardware hacking and radio hacking, with in-depth coverage of attacks against embedded IoT devices and RFID systems.
 
You’ll also learn how to:

   • Write a DICOM service scanner as an NSE module
   • Hack a microcontroller through the UART and SWD interfaces
   • Reverse engineer firmware and analyze mobile companion apps
   • Develop an NFC fuzzer using Proxmark3
   • Hack a smart home by jamming wireless alarms, playing back IP camera feeds, and controlling a smart treadmill 
The tools and devices you’ll use are affordable and readily available, so you can easily practice what you learn. Whether you’re a security researcher, IT team member, or hacking hobbyist, you’ll find Practical IoT Hacking indispensable in your efforts to hack all the things
 
REQUIREMENTS: Basic knowledge of Linux command line, TCP/IP, and programming
 
35.99 In Stock
Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things

Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things

Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things

Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things

eBook

$35.99 

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

The definitive guide to hacking the world of the Internet of Things (IoT) -- Internet connected devices such as medical devices, home assistants, smart home appliances and more.

Drawing from the real-life exploits of five highly regarded IoT security researchers, Practical IoT Hacking teaches you how to test IoT systems, devices, and protocols to mitigate risk.
 
The book begins by walking you through common threats and a threat modeling framework. You’ll develop a security testing methodology, discover the art of passive reconnaissance, and assess security on all layers of an IoT system. Next, you’ll perform VLAN hopping, crack MQTT authentication, abuse UPnP, develop an mDNS poisoner, and craft WS-Discovery attacks.
 
You’ll tackle both hardware hacking and radio hacking, with in-depth coverage of attacks against embedded IoT devices and RFID systems.
 
You’ll also learn how to:

   • Write a DICOM service scanner as an NSE module
   • Hack a microcontroller through the UART and SWD interfaces
   • Reverse engineer firmware and analyze mobile companion apps
   • Develop an NFC fuzzer using Proxmark3
   • Hack a smart home by jamming wireless alarms, playing back IP camera feeds, and controlling a smart treadmill 
The tools and devices you’ll use are affordable and readily available, so you can easily practice what you learn. Whether you’re a security researcher, IT team member, or hacking hobbyist, you’ll find Practical IoT Hacking indispensable in your efforts to hack all the things
 
REQUIREMENTS: Basic knowledge of Linux command line, TCP/IP, and programming
 

Product Details

ISBN-13: 9781718500914
Publisher: No Starch Press
Publication date: 03/23/2021
Sold by: Penguin Random House Publisher Services
Format: eBook
Pages: 464
File size: 34 MB
Note: This product may take a few minutes to download.

About the Author

Fotios (Fotis) Chantzis is laying the foundation for a safe and secure Artificial General Intelligence (AGI) at OpenAI. Previously, he worked as a principal information security engineer at Mayo Clinic, where he managed and conducted technical security assessments on medical devices, clinical support systems, and critical healthcare infrastructure.

Ioannis Stais is a senior IT security researcher and head of red teaming at CENSUS S.A., a company that offers specialized cybersecurity services. He has participated in dozens of security assessment projects, including the assessment of communication protocols, web and mobile banking services, ATMs and point-of-sale systems, and critical medical appliances.

Paulino Calderon is a published author and international speaker with over 12 years of experience in network and application security. When he isn't traveling to security conferences or consulting for Fortune 500 companies with Websec, a company he co-founded in 2011, he spends peaceful days enjoying the beach in Cozumel, Mexico.


Evangelos Deirmentzoglou is an information security professional interested in solving security problems at scale. He led and structured the cybersecurity capability of the financial tech startup Revolut. A member of the open-source community since 2015, he has made multiple contributions to Nmap and Ncrack.

Beau Woods is a cyber safety innovation fellow with the Atlantic Council and a leader with the I Am The Cavalry grassroots initiative. He is also the founder and CEO of Stratigos Security and sits on the board of several nonprofits. Beau is a published author and frequent public speaker.

Table of Contents

Preface

Foreword

Part One: The IoT Threat Landscape
Chapter 1: The IoT Security World
Chapter 2: Threat Modeling
Chapter 3: A Security Testing Methodology

Part Two: Network Hacking
Chapter 4: Network Assessments
Chapter 5: Analyzing Network Protocols
Chapter 6: Exploiting Zero-configuration Networking

Part Three: Hardware Hacking
Chapter 7: UART, JTAG, and SWD Exploitation
Chapter 8: Hacking SPI and I2C
Chapter 9: Firmware Hacking

Part Four: Radio Hacking
Chapter 10: Abusing RFID
Chapter 11: Exploiting Bluetooth Low Energy
Chapter 12: Wi-Fi Hacking
Chapter 13: Exploiting LPWAN

Part Five: Targeting the IoT Ecosystem
Chapter 14: Attacking Mobile Applications
Chapter 15: Hacking the “Smart” Home

Appendix A: Tools for IoT Hacking
From the B&N Reads Blog

Customer Reviews