The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things
暫譯: 物聯網駭客手冊:駭客實用指南

Aditya Gupta

  • The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things-preview-1
  • The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things-preview-2
  • The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things-preview-3
  • The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things-preview-4
  • The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things-preview-5
  • The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things-preview-6
  • The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things-preview-7
  • The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things-preview-8
  • The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things-preview-9
  • The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things-preview-10
The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things-preview-1

買這商品的人也買了...

相關主題

商品描述

Take a practioner’s approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture.  

 

You’ll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE or ZigBee. You'll also learn to assess a device physically by opening it, looking at the PCB, and identifying the chipsets and interfaces. You'll then use that information to gain entry to the device or to perform other actions, such as dumping encryption keys and firmware. 

 

As the IoT rises to one of the most popular tech trends, manufactures need to take necessary steps to secure devices and protect them from attackers. The IoT Hacker's Handbook breaks down the Internet of Things, exploits it, and reveals how these devices can be built securely.

 

What You’ll Learn

  • Perform a threat model of a real-world IoT device and locate all possible attacker entry points 
  • Use reverse engineering of firmware binaries to identify security issues 
  • Analyze,assess, and identify security issues in exploited ARM and MIPS based binaries
  • Sniff, capture, and exploit radio communication protocols, such as Bluetooth Low Energy (BLE), and ZigBee

 

Who This Book is For

 

Those interested in learning about IoT security, such as pentesters working in different domains, embedded device developers, or IT people wanting to move to an Internet of Things security role.

商品描述(中文翻譯)

採用實務者的方式分析物聯網 (IoT) 裝置及其面臨的安全問題。

您將回顧架構的核心組件,從硬體通訊介面,如 UART 和 SPI,到無線通訊協定,如 BLE 或 ZigBee。您還將學習如何通過拆解裝置、檢查 PCB,並識別晶片組和介面來進行物理評估。然後,您將利用這些資訊進入裝置或執行其他操作,例如提取加密金鑰和韌體。

隨著物聯網成為最受歡迎的科技趨勢之一,製造商需要採取必要措施來保護裝置,防止攻擊者入侵。《物聯網駭客手冊》深入解析物聯網,利用其漏洞,並揭示如何安全地構建這些裝置。

您將學到的內容:

- 對現實世界的 IoT 裝置進行威脅模型分析,並找出所有可能的攻擊者入侵點
- 使用韌體二進位檔的逆向工程來識別安全問題
- 分析、評估並識別在 ARM 和 MIPS 基礎的二進位檔中存在的安全問題
- 嗅探、捕獲並利用無線通訊協定,如藍牙低能耗 (BLE) 和 ZigBee

本書適合對 IoT 安全感興趣的人士,例如在不同領域工作的滲透測試人員、嵌入式裝置開發者,或希望轉向物聯網安全角色的 IT 人員。

作者簡介

Aditya Gupta is the founder and CEO of Attify, Inc. – a specialized security firm offering IoT penetration testing and security training on IoT Exploitation. Over the past couple of years, Aditya has performed in-depth research on the security of these devices including smart homes, medical devices, ICS and SCADA systems, and has spoken at numerous international security conferences teaching people about the insecurity in these platforms and how it can be exploited. Aditya is also the co-author of the IoT Pentesting Cookbook and the author of Learning Pentesting for Android Devices.

作者簡介(中文翻譯)

Aditya Gupta 是 Attify, Inc. 的創辦人兼執行長,這是一家專注於物聯網滲透測試和物聯網利用安全訓練的安全公司。在過去幾年中,Aditya 對這些設備的安全性進行了深入研究,包括智慧家庭、醫療設備、工業控制系統 (ICS) 和監控與數據採集系統 (SCADA)。他在許多國際安全會議上發表演講,教導人們這些平台的安全漏洞及其如何被利用。Aditya 也是《IoT Pentesting Cookbook》的共同作者,以及《Learning Pentesting for Android Devices》的作者。