reklama - zainteresowany?

Practical Hardware Pentesting, Second edition. Learn attack and defense techniques for embedded systems in IoT and other devices - Second Edition - Helion

Practical Hardware Pentesting, Second edition. Learn attack and defense techniques for embedded systems in IoT and other devices - Second Edition
ebook
Autor: Jean-Georges Valle
Tytuł oryginału: Practical Hardware Pentesting, Second edition. Learn attack and defense techniques for embedded systems in IoT and other devices - Second Edition
ISBN: 9781803242682
stron: 449, Format: ebook
Data wydania: 2024-10-01
Księgarnia: Helion

Cena książki: 139,00 zł

Dodaj do koszyka Practical Hardware Pentesting, Second edition. Learn attack and defense techniques for embedded systems in IoT and other devices - Second Edition

Practical Hardware Pentesting, Second Edition, is an example-driven guide that will help you plan attacks, hack your embedded devices, and secure the hardware infrastructure.

Throughout the book, you’ll explore the functional and security aspects of a device and learn how a system senses and communicates with the outside world. You’ll set up a lab from scratch and gradually work towards an advanced hardware lab.

The first part of this book will get you attacking the software of an embedded device. This will get you thinking from an attacker point of view; you’ll understand how devices are attacked, compromised, and how you can harden a device against the most common hardware attack vectors. As you progress, you’ll get to grips with the global architecture of an embedded system and sniff on-board traffic, learn how to identify and formalize threats to the embedded system, and understand its relationship with its ecosystem. This 2nd Edition covers real-world examples featuring various devices like smart TVs, baby monitors, or pacemakers, you’ll discover how to analyze hardware and locate its possible vulnerabilities before going on to explore firmware dumping, analysis, and exploitation.

By the end of this book, you’ll and understand how to implement best practices to secure your hardware.

Dodaj do koszyka Practical Hardware Pentesting, Second edition. Learn attack and defense techniques for embedded systems in IoT and other devices - Second Edition

 

Osoby które kupowały "Practical Hardware Pentesting, Second edition. Learn attack and defense techniques for embedded systems in IoT and other devices - Second Edition", wybierały także:

  • Biologika Sukcesji Pokoleniowej. Sezon 2. Za
  • Biologika Sukcesji Pokoleniowej. Sezon I.
  • Windows Media Center. Domowe centrum rozrywki
  • PodrÄ™cznik startupu. Budowa wielkiej firmy krok po kroku
  • Ruby on Rails. Ćwiczenia

Dodaj do koszyka Practical Hardware Pentesting, Second edition. Learn attack and defense techniques for embedded systems in IoT and other devices - Second Edition

Spis treści

Practical Hardware Pentesting, Second edition. Learn attack and defense techniques for embedded systems in IoT and other devices - Second Edition eBook -- spis treści

  • 1. Setting Up Your Pentesting Lab and Ensuring Lab Safety
  • 2. Our Main Attack Platform
  • 3. Sniffing and Attacking the Most Common Protocols
  • 4. Extracting and Manipulating Onboard Storage
  • 5. Attacking Wi-Fi, Bluetooth, and BLE
  • 6. Attacking phone connected devices
  • 7. Software-Defined Radio Attacks
  • 8. Accessing the Debug Interfaces
  • 9. Static Reverse Engineering and Analysis
  • 10. Dynamic Reverse Engineering
  • 11. Scoring and Reporting Your Vulnerabilities
  • 12. Understanding Your Target
  • 13. Identifying the Components of Your Target
  • 14. Approaching and Planning the Test
  • 15. Wrapping It Up – Mitigations and Good Practices

Dodaj do koszyka Practical Hardware Pentesting, Second edition. Learn attack and defense techniques for embedded systems in IoT and other devices - Second Edition

Code, Publish & WebDesing by CATALIST.com.pl



(c) 2005-2024 CATALIST agencja interaktywna, znaki firmowe należą do wydawnictwa Helion S.A.