SECURITY THROUGH DATA

CYBER 101

  • Blog
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Entertainment
  • FAQ

Cyber Risks

  • Alerts
  • Attackers
  • Incidents
  • Threats

Cyber Education

  • Books
  • Certifications
  • Courses
  • Definitions
  • Documents
  • Domains
  • Quotes
  • Tutorials
  • Trivia
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
No Result
View All Result

Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things

By Fotios Chantzis, Ioannis Stais  

1 min read
in Book, Learning

The book begins by walking you through common threats and a threat modeling framework. You’ll develop a security testing methodology, discover the art of passive reconnaissance, and assess security on all layers of an IoT system. Next, you’ll perform VLAN hopping, crack MQTT authentication, abuse UPnP, develop an mDNS poisoner, and craft WS-Discovery attacks.

Drawing from the real-life exploits of five highly regarded IoT security researchers, Practical IoT Hacking teaches you how to test IoT systems, devices, and protocols to mitigate risk.

The book begins by walking you through common threats and a threat modeling framework. You’ll develop a security testing methodology, discover the art of passive reconnaissance, and assess security on all layers of an IoT system. Next, you’ll perform VLAN hopping, crack MQTT authentication, abuse UPnP, develop an mDNS poisoner, and craft WS-Discovery attacks.

You’ll tackle both hardware hacking and radio hacking, with in-depth coverage of attacks against embedded IoT devices and RFID systems.

 

GET BOOK

*Disclaimer: As an Amazon Associate we earn from qualifying purchases.

Related

Tags: BooksBooks IoTCiscoCyber Professionals BooksCybersecurityExecutivesFotios ChantzisIoannis StaisIOT
7
VIEWS
ADVERTISEMENT

Related Posts

6 Books about Cryptography

6 Books about Cryptography

May 24, 2022
Practical Cryptography in Python: Learning Correct Cryptography by Example

Practical Cryptography in Python: Learning Correct Cryptography by Example

May 24, 2022
Understanding Cryptography: A Textbook for Students and Practitioners

Understanding Cryptography: A Textbook for Students and Practitioners

May 24, 2022
Real-World Cryptography

Real-World Cryptography

May 24, 2022

More Articles

Data leak affects about 3,000 NYC students and 100 employees, officials confirm

August 9, 2021

Deception Technology

January 12, 2022
Alerts

Adobe Releases Security Updates

February 8, 2022
Tool

Netwrix – GDPR Compliance Software

March 24, 2022
Alerts

Mozilla Releases Security Updates for Firefox

June 2, 2021
Quotes

“Government agencies and business…”

April 19, 2022
Tool

Elastic Security – Tools

March 16, 2022
Alerts

Samba Releases Security Update

January 11, 2022
Load More
ADVERTISEMENT

© 2022 | CyberMaterial | All rights reserved.

  • About us
  • Contact
  • Legal and Privacy Policy
No Result
View All Result
  • Cyber101
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Incidents
  • Cyber Education
    • Book
    • Certification
    • Course
    • Definition
    • Document
    • Quotes
    • Tutorials
  • Cyber Opportunities

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Posting....