|
Take a practioner’s approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture.
You’ll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE or ZigBee. You'll also learn to assess a device physically by opening it, looking at the PCB, and identifying the chipsets and interfaces. You'll then use that information to gain entry to the device or to perform other actions, such as dumping encryption keys and firmware.
As the IoT rises to one of the most popular tech trends, manufactures need to take necessary steps to secure devices and protect them from attackers. The IoT Hacker's Handbook breaks down the Internet of Things, exploits it, and reveals how these devices can be built securely.
What You’ll Learn
-
Perform a threat model of a real-world IoT device and locate all possible attacker entry points
-
Use reverse engineering of firmware binaries to identify security issues
-
Analyze,assess, and identify security issues in exploited ARM and MIPS based binaries
-
Sniff, capture, and exploit radio communication protocols, such as Bluetooth Low Energy (BLE), and ZigBee
Who This Book is For
Those interested in learning about IoT security, such as pentesters working in different domains, embedded device developers, or IT people wanting to move to an Internet of Things security role.
|
|
|
Designing Interfaces
Designing a good interface isn't easy. Users demand software that is well-behaved, good-looking, and easy to use. Your clients or managers demand originality and a short time to market. Your UI technology -- web applications, desktop software, even mobile devices -- may give you the tools you need, but little guidance on how to use them... | | Sams Teach Yourself Regular Expressions in 10 MinutesRegEx is supported in all major development environments (for use in editing and working with code) and will thus appeal to anyone using these tools. In addition, every JavaScript developer should be using RegEx, but most don't as it has never been taught to them properly before. Developers using ASP, C#, ColdFusion, Java JSP, PHP, Perl,... | | Combating Spyware in the EnterpriseSpyware is a term that in many ways has become a commonly used substitute for many other types of intrusions on a host.To compare it to something in the nontechnical world, it would be similar to asking someone for some aspirin, but in return getting acetaminophen, ibuprofen, or some other pain... |
Microsoft Systems Management Server 2.0 Training KitThis book has been developed for information system (IS) professionals who need to install, administer, and support Microsoft Systems Management Server 2.0 or who plan to take the related Microsoft Certified Professional exam 70-086, Implementing and Supporting Microsoft® Systems Management Server 2.0.
This book is more than ... | | Pragmatic Ajax: A Web 2.0 PrimerThis is a book about developing effective web applications. We’re not going to dance around this issue. Underneath everything else, this book is about XHTML, JavaScript, CSS, and standards that have been around for almost a decade now. Not only do we admit this truth, we embrace it. Just because these standards have been... | | Microsoft SQL Server 2000 Performance Optimization and Tuning HandbookMy last SQL Server performance book was aimed at SQL Server 6.5. When Microsoft released SQL Server 7.0 it was almost as if it were a new product. Although it was backward compatible in many areas with SQL Server 6.5, the architecture was very different. For starters, the on-disk structure was completely changed. The usage of files... |
|