The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things

Aditya Gupta

  • The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things-preview-1
  • The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things-preview-2
  • The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things-preview-3
  • The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things-preview-4
  • The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things-preview-5
  • The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things-preview-6
  • The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things-preview-7
  • The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things-preview-8
  • The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things-preview-9
  • The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things-preview-10
The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things-preview-1

買這商品的人也買了...

商品描述

Take a practioner’s approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture.  

 

You’ll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE or ZigBee. You'll also learn to assess a device physically by opening it, looking at the PCB, and identifying the chipsets and interfaces. You'll then use that information to gain entry to the device or to perform other actions, such as dumping encryption keys and firmware. 

 

As the IoT rises to one of the most popular tech trends, manufactures need to take necessary steps to secure devices and protect them from attackers. The IoT Hacker's Handbook breaks down the Internet of Things, exploits it, and reveals how these devices can be built securely.

 

What You’ll Learn

  • Perform a threat model of a real-world IoT device and locate all possible attacker entry points 
  • Use reverse engineering of firmware binaries to identify security issues 
  • Analyze,assess, and identify security issues in exploited ARM and MIPS based binaries
  • Sniff, capture, and exploit radio communication protocols, such as Bluetooth Low Energy (BLE), and ZigBee

 

Who This Book is For

 

Those interested in learning about IoT security, such as pentesters working in different domains, embedded device developers, or IT people wanting to move to an Internet of Things security role.

商品描述(中文翻譯)

以實踐者的方式來分析物聯網(IoT)設備和物聯網架構所面臨的安全問題。

您將審查架構的核心組件,從硬體通訊介面,如UART和SPI,到無線通訊協議,如BLE或ZigBee。您還將學習通過打開設備,查看PCB並識別芯片組和介面來評估設備的物理特性。然後,您將使用這些信息來進入設備或執行其他操作,例如轉儲加密金鑰和固件。

隨著物聯網成為最受歡迎的技術趨勢之一,製造商需要採取必要的措施來保護設備並防止受到攻擊。《物聯網駭客手冊》對物聯網進行了分解,並揭示了如何安全地構建這些設備。

您將學到什麼:

- 對現實世界的物聯網設備進行威脅模型,並找到所有可能的攻擊者入口點
- 使用固件二進制逆向工程來識別安全問題
- 分析、評估和識別被利用的基於ARM和MIPS的二進制文件中的安全問題
- 嗅探、捕獲和利用無線通訊協議,如藍牙低功耗(BLE)和ZigBee

適合閱讀對象:

對物聯網安全感興趣的人,例如在不同領域工作的測試人員、嵌入式設備開發人員或希望轉向物聯網安全角色的IT人員。

作者簡介

Aditya Gupta is the founder and CEO of Attify, Inc. – a specialized security firm offering IoT penetration testing and security training on IoT Exploitation. Over the past couple of years, Aditya has performed in-depth research on the security of these devices including smart homes, medical devices, ICS and SCADA systems, and has spoken at numerous international security conferences teaching people about the insecurity in these platforms and how it can be exploited. Aditya is also the co-author of the IoT Pentesting Cookbook and the author of Learning Pentesting for Android Devices.

作者簡介(中文翻譯)

Aditya Gupta是Attify公司的創始人兼首席執行官,該公司是一家專門提供物聯網滲透測試和物聯網攻擊安全培訓的安全公司。在過去的幾年中,Aditya對這些設備的安全性進行了深入研究,包括智能家居、醫療設備、工業控制系統和監控系統,並在眾多國際安全會議上發表演講,教授人們有關這些平台的不安全性以及如何利用它們。Aditya還是《物聯網滲透測試食譜》的合著者,以及《學習Android設備滲透測試》的作者。