Practical IoT Hacking: The Definitive Guide to Attacking the Internet of ThingsThe definitive guide to hacking the world of the Internet of Things (IoT) -- Internet connected devices such as medical devices, home assistants, smart home appliances and more. Drawing from the real-life exploits of five highly regarded IoT security researchers, Practical IoT Hacking teaches you how to test IoT systems, devices, and protocols to mitigate risk. The book begins by walking you through common threats and a threat modeling framework. You’ll develop a security testing methodology, discover the art of passive reconnaissance, and assess security on all layers of an IoT system. Next, you’ll perform VLAN hopping, crack MQTT authentication, abuse UPnP, develop an mDNS poisoner, and craft WS-Discovery attacks. You’ll tackle both hardware hacking and radio hacking, with in-depth coverage of attacks against embedded IoT devices and RFID systems. You’ll also learn how to: • Write a DICOM service scanner as an NSE module • Hack a microcontroller through the UART and SWD interfaces • Reverse engineer firmware and analyze mobile companion apps • Develop an NFC fuzzer using Proxmark3 • Hack a smart home by jamming wireless alarms, playing back IP camera feeds, and controlling a smart treadmill The tools and devices you’ll use are affordable and readily available, so you can easily practice what you learn. Whether you’re a security researcher, IT team member, or hacking hobbyist, you’ll find Practical IoT Hacking indispensable in your efforts to hack all the things REQUIREMENTS: Basic knowledge of Linux command line, TCP/IP, and programming |
Other editions - View all
Common terms and phrases
analyze Android application Arduino attack authentication binary black pill bytes camera Chapter client clone components configuration connect control server create credentials debugging default device’s DICOM dissector emulator encryption Endian example exploit extract FIRMADYNE firmware following command function GATTTool hacking hardware header Heltec host identify infusion pump install interface IoT devices IoT security IoT systems IP address JTAG layer Linux LoRa LoRaWAN MAC address man-in-the-middle attacks mDNS memory microcontroller MIFARE module MQTT Ncrack Nmap node open source OpenWrt operating system option output packet parameter password payload perform pins port Probe protocol Proxmark3 radio request RFID RFID tag router scan script serial specific strcmp target threat tool traffic UART update UPnP username UUID VLAN vulnerabilities Wi-Fi wireless Wireshark WS-Discovery