Security through data

MAIN

  • Home
  • Alerts
  • Blog
  • Events
  • Incidents
  • Tutorials

FEATURED

  • AI
  • Privacy
  • Cryptocurrency
  • Blockchain
  • IoT
  • Deep Web
  • Threat Actors
  • Social Engineering
  • Phishing
  • Malware
  • E-Commerce
  • Deepfake
  • Quantum Computing

COMPANY

  • About us
  • Advertise
  • Legal & Policy
Cybermaterial
  • CATEGORIES
    • Cyber101
      • Definition
      • Quote
    • Document
      • Cheat Sheet
      • Paper
      • Report
    • Education
      • Certification
      • Course
    • Entertainment
      • Documentary
      • Game
      • Meme
      • Movie
      • TV Show
    • Learning
      • Book
      • Lexicon
      • Podcasts
      • Tutorials
    • Tool
      • Hardware
      • Software
No Result
View All Result
Contact Us
Cybermaterial
  • CATEGORIES
    • Cyber101
      • Definition
      • Quote
    • Document
      • Cheat Sheet
      • Paper
      • Report
    • Education
      • Certification
      • Course
    • Entertainment
      • Documentary
      • Game
      • Meme
      • Movie
      • TV Show
    • Learning
      • Book
      • Lexicon
      • Podcasts
      • Tutorials
    • Tool
      • Hardware
      • Software
No Result
View All Result
Contact Us
Cybermaterial
No Result
View All Result

BOOK: Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things

By Fotios Chantzis, Ioannis Stais  

in Book, Learning
1 min read

The book begins by walking you through common threats and a threat modeling framework. You’ll develop a security testing methodology, discover the art of passive reconnaissance, and assess security on all layers of an IoT system. Next, you’ll perform VLAN hopping, crack MQTT authentication, abuse UPnP, develop an mDNS poisoner, and craft WS-Discovery attacks.

Drawing from the real-life exploits of five highly regarded IoT security researchers, Practical IoT Hacking teaches you how to test IoT systems, devices, and protocols to mitigate risk.

The book begins by walking you through common threats and a threat modeling framework. You’ll develop a security testing methodology, discover the art of passive reconnaissance, and assess security on all layers of an IoT system. Next, you’ll perform VLAN hopping, crack MQTT authentication, abuse UPnP, develop an mDNS poisoner, and craft WS-Discovery attacks.

You’ll tackle both hardware hacking and radio hacking, with in-depth coverage of attacks against embedded IoT devices and RFID systems.

 

GET BOOK

Tags: BooksBooks IoTCiscoCybersecurityFotios ChantzisIoannis StaisIOT
28
VIEWS

More Books

Cyber Breach Response That Actually Works: Organizational Approach to Managing Residual Risk
Book

Cyber Breach Response That Actually Works: Organizational Approach to Managing Residual Risk

April 19, 2021

A cyber breach could cost your organization millions of dollars―in 2019, the average cost of a cyber breach for companies...

Dark Energy: Return to Becker Circle
Book

Dark Energy: Return to Becker Circle

April 16, 2021

Cybercrime doesn’t talk. It creeps in and destroys lives right under Gillian’s nose when a cryptojacking scheme lands her boss,...

Cloud DDoS Attack Dataset Creation using Private Cloud Security Testbed
Book

Cloud DDoS Attack Dataset Creation using Private Cloud Security Testbed

April 15, 2021

The main interest of this book is to understand the cloud computing environment, threats in the cloud, cloud DDoS attack...

MORE

Document

Hunting For PowerShell Abuse

January 25, 2021
APIs

Concur REST API v3

December 29, 2020
CISSP

BIT

March 16, 2021
Course

Deepfake Course

February 18, 2021
ADVERTISEMENT

Tags

Books Cybersecurity Hackers Malware Memes Movies Quantum Computing Report Software Word of the day

© 2021 | CyberMaterial | All rights reserved.

SECURITY THROUGH DATA

No Result
View All Result
  • Home
  • Alerts
  • Cyber Incidents
  • Blog
  • Events
  • Tutorials
  • Featured
    • AI
    • Privacy
    • Cryptocurrency
    • Blockchain
    • IoT
    • Deep Web
    • Threat Actors
    • Social Engineering
    • Deepfake
    • E-Commerce
    • Malware
    • Phishing
    • Quantum Computing

© 2020 CyberMaterial - Cyber Decoded.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.