Books > Computing & IT > Computer communications & networking > Network security
|
Buy Now
IoT Penetration Testing Cookbook (Paperback)
Loot Price: R1,212
Discovery Miles 12 120
|
|
IoT Penetration Testing Cookbook (Paperback)
Expected to ship within 10 - 15 working days
|
Over 80 recipes to master IoT security techniques. About This Book
* Identify vulnerabilities in IoT device architectures and firmware
using software and hardware pentesting techniques * Understand
radio communication analysis with concepts such as sniffing the air
and capturing radio signals * A recipe based guide that will teach
you to pentest new and unique set of IoT devices. Who This Book Is
For This book targets IoT developers, IoT enthusiasts, pentesters,
and security professionals who are interested in learning about IoT
security. Prior knowledge of basic pentesting would be beneficial.
What You Will Learn * Set up an IoT pentesting lab * Explore
various threat modeling concepts * Exhibit the ability to analyze
and exploit firmware vulnerabilities * Demonstrate the automation
of application binary analysis for iOS and Android using MobSF *
Set up a Burp Suite and use it for web app testing * Identify UART
and JTAG pinouts, solder headers, and hardware debugging * Get
solutions to common wireless protocols * Explore the mobile
security and firmware best practices * Master various advanced IoT
exploitation techniques and security automation In Detail IoT is an
upcoming trend in the IT industry today; there are a lot of IoT
devices on the market, but there is a minimal understanding of how
to safeguard them. If you are a security enthusiast or pentester,
this book will help you understand how to exploit and secure IoT
devices. This book follows a recipe-based approach, giving you
practical experience in securing upcoming smart devices. It starts
with practical recipes on how to analyze IoT device architectures
and identify vulnerabilities. Then, it focuses on enhancing your
pentesting skill set, teaching you how to exploit a vulnerable IoT
device, along with identifying vulnerabilities in IoT device
firmware. Next, this book teaches you how to secure embedded
devices and exploit smart devices with hardware techniques. Moving
forward, this book reveals advanced hardware pentesting techniques,
along with software-defined, radio-based IoT pentesting with Zigbee
and Z-Wave. Finally, this book also covers how to use new and
unique pentesting techniques for different IoT devices, along with
smart devices connected to the cloud. By the end of this book, you
will have a fair understanding of how to use different pentesting
techniques to exploit and secure various IoT devices. Style and
approach This recipe-based book will teach you how to use advanced
IoT exploitation and security automation.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
You might also like..
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.