reklama - zainteresowany?

Abusing the Internet of Things. Blackouts, Freakouts, and Stakeouts - Helion

Abusing the Internet of Things. Blackouts, Freakouts, and Stakeouts
ebook
Autor: Nitesh Dhanjani
ISBN: 978-14-919-0292-9
stron: 296, Format: ebook
Data wydania: 2015-08-13
Księgarnia: Helion

Cena książki: 152,15 zł (poprzednio: 176,92 zł)
Oszczędzasz: 14% (-24,77 zł)

Dodaj do koszyka Abusing the Internet of Things. Blackouts, Freakouts, and Stakeouts

This book is a marvellous thing: an important intervention in the policy debate about information security and a practical text for people trying to improve the situation.

— Cory Doctorow
author, co-editor of Boing Boing

A future with billions of connected "things" includes monumental security concerns. This practical book explores how malicious attackers can abuse popular IoT-based devices, including wireless LED lightbulbs, electronic door locks, baby monitors, smart TVs, and connected cars.

If you’re part of a team creating applications for Internet-connected devices, this guide will help you explore security solutions. You’ll not only learn how to uncover vulnerabilities in existing IoT devices, but also gain deeper insight into an attacker’s tactics.

  • Analyze the design, architecture, and security issues of wireless lighting systems
  • Understand how to breach electronic door locks and their wireless mechanisms
  • Examine security design flaws in remote-controlled baby monitors
  • Evaluate the security design of a suite of IoT-connected home products
  • Scrutinize security vulnerabilities in smart TVs
  • Explore research into security weaknesses in smart cars
  • Delve into prototyping techniques that address security in initial designs
  • Learn plausible attacks scenarios based on how people will likely use IoT devices

Dodaj do koszyka Abusing the Internet of Things. Blackouts, Freakouts, and Stakeouts

 

Osoby które kupowały "Abusing the Internet of Things. Blackouts, Freakouts, and Stakeouts", wybierały także:

  • Windows Media Center. Domowe centrum rozrywki
  • Ruby on Rails. Ćwiczenia
  • DevOps w praktyce. Kurs video. Jenkins, Ansible, Terraform i Docker
  • Przywództwo w Å›wiecie VUCA. Jak być skutecznym liderem w niepewnym Å›rodowisku
  • Scrum. O zwinnym zarzÄ…dzaniu projektami. Wydanie II rozszerzone

Dodaj do koszyka Abusing the Internet of Things. Blackouts, Freakouts, and Stakeouts

Spis treści

Abusing the Internet of Things. Blackouts, Freakouts, and Stakeouts eBook -- spis treści

  • Foreword
  • Preface
    • Who This Book Is For
    • How to Use This Book
    • Conventions Used in This Book
    • Using Code Examples
    • Safari Books Online
    • How to Contact Us
    • Acknowledgments
  • 1. Lights OutHacking Wireless Lightbulbs to Cause Sustained Blackouts
    • Why hue?
    • Controlling Lights via the Website Interface
      • Information Leakage
      • Drive-by Blackouts
      • Weak Password Complexity and Password Leaks
    • Controlling Lights Using the iOS App
      • Stealing the Token from a Mobile Device
      • Malware Can Cause Perpetual Blackouts
    • Changing Lightbulb State
    • If This Then That (IFTTT)
    • Conclusion
  • 2. Electronic Lock PickingAbusing Door Locks to Compromise Physical Security
    • Hotel Door Locks and Magnetic Stripes
      • The Onity Door Lock
      • The Magnetic Stripe
      • The Programming Port
      • Security Issues
        • Microcontroller vulnerability
        • Master keycode in lock memory
        • Unencrypted spare cards
      • Vendor Response
    • The Case of Z-Wave-Enabled Door Locks
      • Z-Wave Protocol and Implementation Analysis
      • Exploiting Key-Exchange Vulnerability
    • Bluetooth Low Energy and Unlocking via Mobile Apps
      • Understanding Weaknesses in BLE and Using Packet-Capture Tools
      • Kevo Mobile App Insecurities
    • Conclusion
  • 3. Assaulting the Radio NurseBreaching Baby Monitors and One Other Thing
    • The Foscam Incident
      • Foscam Vulnerabilities Exposed by Researchers
      • Using Shodan to Find Baby Monitors Exposed on the Internet
      • Exploiting Default Credentials
      • Exploiting Dynamic DNS
      • The Foscam Saga Continues
    • The Belkin WeMo Baby Monitor
      • Bad Security by Design
      • Malware Gone Wild
    • Some Things Never Change: The WeMo Switch
    • Conclusion
  • 4. Blurred LinesWhen the Physical Space Meets the Virtual Space
    • SmartThings
      • Hijacking Credentials
        • Single-factor authentication
        • Clear-text password reset link
      • Abusing the Physical Graph
      • SmartThings SSL Certificate Validation Vulnerability
    • Interoperability with Insecurity Leads toInsecurity
      • SmartThings and hue Lighting
      • SmartThings and the WeMo Switch
    • Conclusion
  • 5. The Idiot BoxAttacking Smart Televisions
    • The TOCTTOU Attack
      • The Samsung LExxB650 Series
      • The Exploit
    • You Call That Encryption?
      • Understanding XOR
      • I call it Encraption
    • Understanding and Exploiting the App World
      • Decrypting Firmware
      • Cursory Exploration of the Operating System
      • Remotely Exploiting a Samsung Smart TV
    • Inspecting Your Own Smart TV (and Other IoT Devices)
      • Say Hello to the WiFi Pineapple Mark V
      • Capturing credentials and stripping TLS
    • Conclusion
  • 6. Connected Car Security AnalysisFrom Gas to Fully Electric
    • The Tire Pressure Monitoring System (TPMS)
      • Reversing TPMS Communication
      • Eavesdropping and Privacy Implications
      • Spoofing Alerts
    • Exploiting Wireless Connectivity
      • Injecting CAN Data
      • Bluetooth Vulnerabilities
      • Vulnerabilities in Telematics
      • Significant Attack Surface
    • The Tesla Model S
      • Locate and Steal a Tesla the Old-Fashioned Way
      • Social Engineering Tesla Employees and the Quest for Location Privacy
      • Handing Out Keys to Strangers
      • Or Just Borrow Someones Phone
      • Additional Information and Potential Low-Hanging Fruit
      • AutoPilot and the Autonomous Car
    • Conclusion
  • 7. Secure PrototypinglittleBits and cloudBit
    • Introducing the cloudBit Starter Kit
      • Setting Up the cloudBit
      • Designing the SMS Doorbell
      • Oops, We Forgot the Button!
    • Security Evaluation
      • WiFi Insecurity, Albeit Brief
      • Sneaking in Command Execution
      • One Token to Rule them All
      • Beware of Hardware Debug Interfaces
    • Abuse Cases in the Context of Threat Agents
      • Nation-States, Including the NSA
      • Terrorists
      • Criminal Organizations
      • Disgruntled or Nosy Employees
      • Hacktivists
      • Vandals
      • Cyberbullies
      • Predators
    • Bug Bounty Programs
    • Conclusion
  • 8. Securely Enabling Our FutureA Conversation on Upcoming Attack Vectors
    • The Thingbots Have Arrived
    • The Rise of the Drones
    • Cross-Device Attacks
    • Hearing Voices
    • IoT Cloud Infrastructure Attacks
    • Backdoors
    • The Lurking Heartbleed
    • Diluting the Medical Record
    • The Data Tsunami
    • Targeting Smart Cities
    • Interspace Communication Will Be a Ripe Target
    • The Dangers of Superintelligence
    • Conclusion
  • 9. Two ScenariosIntentions and Outcomes
    • The Cost of a Free Beverage
      • Theres a Party at Ruby Skye
      • Leveraging the BuzzWord
      • The Board Meeting
      • What Went Wrong?
    • A Case of Anger, Denial, and Self-Destruction
      • The Benefit of LifeThings
      • Social Engineering Customer Support by Caller ID Spoofing
      • The (In)Secure Token
      • Total Ownership
      • The Demise of LifeThings
    • Conclusion
  • Index

Dodaj do koszyka Abusing the Internet of Things. Blackouts, Freakouts, and Stakeouts

Code, Publish & WebDesing by CATALIST.com.pl



(c) 2005-2024 CATALIST agencja interaktywna, znaki firmowe należą do wydawnictwa Helion S.A.