Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things

Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things

Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things

Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things

Paperback

$49.99 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores

Related collections and offers


Overview

Written by all-star security experts, Practical IoT Hacking is a quick-start conceptual guide to testing and exploiting IoT systems and devices.

Drawing from the real-life exploits of five highly regarded IoT security researchers, Practical IoT Hacking teaches you how to test IoT systems, devices, and protocols to mitigate risk.

The book begins by walking you through common threats and a threat modeling framework. You’ll develop a security testing methodology, discover the art of passive reconnaissance, and assess security on all layers of an IoT system. Next, you’ll perform VLAN hopping, crack MQTT authentication, abuse UPnP, develop an mDNS poisoner, and craft WS-Discovery attacks.

You’ll tackle both hardware hacking and radio hacking, with in-depth coverage of attacks against embedded IoT devices and RFID systems.

You’ll also learn how to:
  • Write a DICOM service scanner as an NSE module
  • Hack a microcontroller through the UART and SWD interfaces
  • Reverse engineer firmware and analyze mobile companion apps
  • Develop an NFC fuzzer using Proxmark3
  • Hack a smart home by jamming wireless alarms, playing back IP camera feeds, and controlling a smart treadmill

  • The tools and devices you’ll use are affordable and readily available, so you can easily practice what you learn. Whether you’re a security researcher, IT team member, or hacking hobbyist, you’ll find Practical IoT Hacking indispensable in your efforts to hack all the things

    REQUIREMENTS: Basic knowledge of Linux command line, TCP/IP, and programming

    Product Details

    ISBN-13: 9781718500907
    Publisher: No Starch Press
    Publication date: 04/09/2021
    Pages: 464
    Sales rank: 1,077,741
    Product dimensions: 7.10(w) x 9.10(h) x 1.30(d)

    About the Author

    Fotios (Fotis) Chantzis is laying the foundation for a safe and secure Artificial General Intelligence (AGI) at OpenAI. Previously, he worked as a principal information security engineer at Mayo Clinic, where he managed and conducted technical security assessments on medical devices, clinical support systems, and critical healthcare infrastructure.

    Ioannis Stais is a senior IT security researcher and head of red teaming at CENSUS S.A., a company that offers specialized cybersecurity services. He has participated in dozens of security assessment projects, including the assessment of communication protocols, web and mobile banking services, ATMs and point-of-sale systems, and critical medical appliances.

    Paulino Calderon is a published author and international speaker with over 12 years of experience in network and application security. When he isn't traveling to security conferences or consulting for Fortune 500 companies with Websec, a company he co-founded in 2011, he spends peaceful days enjoying the beach in Cozumel, Mexico.


    Evangelos Deirmentzoglou is an information security professional interested in solving security problems at scale. He led and structured the cybersecurity capability of the financial tech startup Revolut. A member of the open-source community since 2015, he has made multiple contributions to Nmap and Ncrack.

    Beau Woods is a cyber safety innovation fellow with the Atlantic Council and a leader with the I Am The Cavalry grassroots initiative. He is also the founder and CEO of Stratigos Security and sits on the board of several nonprofits. Beau is a published author and frequent public speaker.

    Table of Contents

    Preface

    Foreword

    Part One: The IoT Threat Landscape
    Chapter 1: The IoT Security World
    Chapter 2: Threat Modeling
    Chapter 3: A Security Testing Methodology

    Part Two: Network Hacking
    Chapter 4: Network Assessments
    Chapter 5: Analyzing Network Protocols
    Chapter 6: Exploiting Zero-configuration Networking

    Part Three: Hardware Hacking
    Chapter 7: UART, JTAG, and SWD Exploitation
    Chapter 8: Hacking SPI and I2C
    Chapter 9: Firmware Hacking

    Part Four: Radio Hacking
    Chapter 10: Abusing RFID
    Chapter 11: Exploiting Bluetooth Low Energy
    Chapter 12: Wi-Fi Hacking
    Chapter 13: Exploiting LPWAN

    Part Five: Targeting the IoT Ecosystem
    Chapter 14: Attacking Mobile Applications
    Chapter 15: Hacking the “Smart” Home

    Appendix A: Tools for IoT Hacking
    From the B&N Reads Blog

    Customer Reviews