Sale!

Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things

Add your review

Original price was: $59.99.Current price is: $47.59.

Original price was: $59.99.Current price is: $47.59.

Sale!

Note: Prices may fluctuate as sellers adjust them regularly. You'll see the latest price at final checkout.
Add to wishlistAdded to wishlistRemoved from wishlist 0
Add to compare



Written by all-star security experts, Practical IoT Hacking is a quick-start conceptual guide to testing and exploiting IoT systems and devices.
Drawing from the real-life exploits of five highly regarded IoT security researchers, Practical IoT Hacking teaches you how to test IoT systems, devices, and protocols to mitigate risk.
The book begins by walking you through common threats and a threat modeling framework. You’ll develop a security testing methodology, discover the art of passive reconnaissance, and assess security on all layers of an IoT system. Next, you’ll perform VLAN hopping, crack MQTT authentication, abuse UPnP, develop an mDNS poisoner, and craft WS-Discovery attacks.
You’ll tackle both hardware hacking and radio hacking, with in-depth coverage of attacks against embedded IoT devices and RFID systems.
You’ll also learn how to:
Write a DICOM service scanner as an NSE moduleHack a microcontroller through the UART and SWD interfacesReverse engineer firmware and analyze mobile companion appsDevelop an NFC fuzzer using Proxmark3Hack a smart home by jamming wireless alarms, playing back IP camera feeds, and controlling a smart treadmill
The tools and devices you’ll use are affordable and readily available, so you can easily practice what you learn. Whether you’re a security researcher, IT team member, or hacking hobbyist, you’ll find Practical IoT Hacking indispensable in your efforts to hack all the things
REQUIREMENTS: Basic knowledge of Linux command line, TCP/IP, and programming
From the Publisher

Copy of Practical IoT Hacking on black background with No Starch Press logoCopy of Practical IoT Hacking on black background with No Starch Press logo

Spread of Practical IoT Hacking on yellow backgroundSpread of Practical IoT Hacking on yellow background

‘Hits the Mark’

“I recommend this book to anyone technical who manufactures IoT devices or anyone with IoT devices in their homes or enterprise. At a time when securing our systems and protecting our information has never been more important, this book hits the mark.”

—Dave Kennedy, founder of TrustedSec, Binary Defense

Copies of Practical IoT Hacking on black backgroundCopies of Practical IoT Hacking on black background

‘A Precious Resource’

“This book is everything you would want to learn from the subject masters—it is an authoritative and a precious resource that both IoT security researchers and developers will want keep close by. I recommend this book for anyone interested in making IoT more secure.”

—John Moor, Managing Director, IoT Security Foundation

Spread of Practical IoT Hacking on yellow backgroundSpread of Practical IoT Hacking on yellow background

‘Superbly Approachable’

The authors are immediately credible on the topic, the content is superbly approachable, and it’s obvious this book and its readers will have a meaningful positive impact on the topic.”

—Robert M. Lee, CEO and Co-Founder of Dragos, Inc. and Senior SANS Instructor

About the Authors

Fotios (Fotis) Chantzis (@ithilgore) is laying the foundation for a safe and secure Artificial General Intelligence (AGI) at OpenAI. Previously, he worked as a principal information security engineer at Mayo Clinic, where he managed and conducted technical security assessments on medical devices, clinical support systems, and critical healthcare infrastructure. He has been a member of the core Nmap development team since 2009, when he wrote Ncrack under the mentorship of Gordon “Fyodor” Lyon, the original author of Nmap, during the Google Summer of Code. He later worked as a mentor for the Nmap project during the Google Summer of Code 2016 and 2017 and has authored a video course about Nmap. His research on network security includes exploiting the TCP Persist Timer (you can find his paper on the topic published in Phrack #66) and inventing a stealthy port scanning attack by abusing XMPP. Fotis has presented at notable security conferences, including DEF CON. Highlights of his work can be found at his site sock-raw.org.

Ioannis Stais (@Einstais) is a senior IT security researcher and head of red teaming at CENSUS S.A., a company that offers specialized cybersecurity services to customers worldwide. Ioannis has participated in more than 100 security assessment projects, including the assessment of communication protocols, web and mobile banking services, NFC payment systems, ATMs and point-of-sale systems, critical medical appliances, and MDM solutions. He holds a master’s degree in computer systems technology from the University of Athens. His research currently focuses on the development of machine learning algorithms for improving vulnerability research, the enhancement of fuzzing frameworks, and an exploration of the current threats in mobile and web applications. He has presented his research at security conferences such as Black Hat Europe, Troopers NGI, and Security BSides Athens.

Paulino Calderon (@calderpwn) is a published author and international speaker with over 12 years of experience in network and application security. When he isn’t traveling to security conferences or consulting for Fortune 500 companies with Websec, a company he co-founded in 2011, he spends peaceful days enjoying the beach in Cozumel, Mexico. He loves open source software and has contributed to many projects, including Nmap, Metasploit, OWASP Mobile Security Testing Guide (MSTG), OWASP Juice Shop, and OWASP IoT Goat.

Evangelos Deirmentzoglou (@edeirme) is an information security professional interested in solving security problems at scale. He led and structured the cybersecurity capability of the financial tech startup Revolut. A member of the open source community since 2015, he has made multiple contributions to Nmap and Ncrack. He is currently researching a cybersecurity PhD focusing on source code analysis, which he has previously applied for many major US technology vendors, Fortune 500 companies, and financial and medical institutions.

Beau Woods (@beauwoods) is a cyber safety innovation fellow with the Atlantic Council and a leader with the I Am The Cavalry grassroots initiative. He is also the founder and CEO of Stratigos Security and sits on the board of several nonprofits. In his work, which bridges the gap between the security research and public policy communities, he ensures that any connected technology able to impact human safety is worthy of our trust. He formerly served as an entrepreneur in residence with the US FDA and a managing principal consultant at Dell SecureWorks. He has spent the past several years consulting with the energy, healthcare, automotive, aviation, rail, and IoT industries, as well as with cybersecurity researchers, US and international policymakers, and the White House. Beau is a published author and frequent public speaker.

Who Should Read This Book

No two people share identical backgrounds and experience. Yet analyzing IoT devices requires skills spanning nearly every domain of expertise, because these devices combine computing power and connectivity into every facet of our world. We can’t predict which parts of this book each person will find the most compelling. But we believe that making this knowledge available to a broad population gives them power to have greater control over their increasingly digitizing world.

This book is initially for hackers (sometimes called security researchers), although we expect that it will be useful to others as well, such as the following individuals:

• A security researcher might use this book as a reference for experimenting with an IoT ecosystem’s unfamiliar protocols, data structures, components, and concepts.

• An enterprise sysadmin or network engineer might learn how to better protect their environment and their organization’s assets.

• A product manager for an IoT device might discover new requirements their customers will assume are already present and build them in, reducing cost and the time it takes the product to reach the market.

• A security assessor might discover a new set of skills to better serve their clients.

• A curious student might find knowledge that will catapult them into a rewarding career of protecting people.

This book was written assuming the reader already has some familiarity with Linux command line basics, TCP/IP networking concepts, and coding.

No Starch Press logo. A black circle with a white iron with a star in the centerNo Starch Press logo. A black circle with a white iron with a star in the center

About the Publisher

No Starch Press has published the finest in geek entertainment since 1994, creating both timely and timeless titles like Python Crash Course, Python for Kids, How Linux Works, and Hacking: The Art of Exploitation. An independent, San Francisco-based publishing company, No Starch Press focuses on a curated list of well-crafted books that make a difference. They publish on many topics, including computer programming, cybersecurity, operating systems, and LEGO. The titles have personality, the authors are passionate experts, and all the content goes through extensive editorial and technical reviews. Long known for its fun, fearless approach to technology, No Starch Press has earned wide support from STEM enthusiasts worldwide.

Publisher ‏ : ‎ No Starch Press
Publication date ‏ : ‎ April 9, 2021
Language ‏ : ‎ English
Print length ‏ : ‎ 464 pages
ISBN-10 ‏ : ‎ 1718500904
ISBN-13 ‏ : ‎ 978-1718500907
Item Weight ‏ : ‎ 1.99 pounds
Dimensions ‏ : ‎ 7.05 x 1.18 x 9.25 inches
Best Sellers Rank: #442,912 in Books (See Top 100 in Books) #192 in Computer Hacking #253 in Cloud Computing (Books) #294 in Computer Network Security
Customer Reviews: 4.7 4.7 out of 5 stars (221) var dpAcrHasRegisteredArcLinkClickAction; P.when(‘A’, ‘ready’).execute(function(A) { if (dpAcrHasRegisteredArcLinkClickAction !== true) { dpAcrHasRegisteredArcLinkClickAction = true; A.declarative( ‘acrLink-click-metrics’, ‘click’, { “allowLinkDefault”: true }, function (event) { if (window.ue) { ue.count(“acrLinkClickCount”, (ue.count(“acrLinkClickCount”) || 0) + 1); } } ); } }); P.when(‘A’, ‘cf’).execute(function(A) { A.declarative(‘acrStarsLink-click-metrics’, ‘click’, { “allowLinkDefault” : true }, function(event){ if(window.ue) { ue.count(“acrStarsLinkWithPopoverClickCount”, (ue.count(“acrStarsLinkWithPopoverClickCount”) || 0) + 1); } }); });

11 reviews for Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things

0.0 out of 5
0
0
0
0
0
Write a review
Show all Most Helpful Highest Rating Lowest Rating
  1. Tyler Granger

    IoT guide
    Practical IoT Hacking, penned by a team of five highly regarded security researchers, is an indispensable, detailed blueprint for mastering modern connected device security. This guide addresses the urgent demands of the rapidly growing Internet of Things (IoT)—devices like smart cameras and speakers are often rushed to market without sufficient security testing. The book is geared toward an expert-level audience in digital hacking, immediately establishing a robust methodology for threat modeling. Despite its challenging nature, Practical IoT Hacking remains a powerful, five-star resource for tech professionals serious about a career in penetration testing. Practical IoT Hacking is the definitive blueprint for mastering modern connected device security. It directly addresses the urgent demands of the rapidly growing Internet of Things (IoT), where devices like smart cameras and speakers are often rushed to market without sufficient testing.

    Helpful(0) Unhelpful(0)You have already voted this
  2. Cliente Amazon

    All OK.
    All OK.

    Helpful(0) Unhelpful(0)You have already voted this
  3. Choochoo

    Easy to grasp
    Very clear to understand. Highly recommended.

    Helpful(0) Unhelpful(0)You have already voted this
  4. Pat

    A lot of information to get.
    As I said a lot of information to learn. Will take time to get through it but good information.

    Helpful(0) Unhelpful(0)You have already voted this
  5. Juan Jacobo Tibaquira Murillo

    This book should be in your personal library
    This book is highly recommended. It shows you possible scenarios and technologies that you can find in an IoT environment, taking you from how the technologies works, which would be its main threats, as well methodologies, techniques, tools, gadgets, and everything you might need to exploit them, all this with real cases and practical examples. If you want to hack/secure IoT, this is the book you must have.

    Helpful(0) Unhelpful(0)You have already voted this
  6. Idan

    Should have included required hardware list at least at the beginning of the book
    What’s the point of finding out that you need to buy some device only when you get to a specific page?seems like the book isn’t really focused on “practicality”

    Helpful(0) Unhelpful(0)You have already voted this
  7. Beatriz

    Pedido entregado en la fecha indicada. Llegó en perfectas condiciones. El precio de este libro es algo elevado, pero en la línea de otros vendedores/tiendas, etc. Algo a destacar es que ofrecen dos opciones de compra, una la opción de libro para kindle, y la segunda opción, la clásica opción de libro en papel de tapa blanda. Totalmente recomendable.

    Helpful(0) Unhelpful(0)You have already voted this
  8. うみねこcafe

    たまに満足に読めもしないのに英語の本を買ってしまいますが、この本を買ったのはしばらく前で、どうも、この本は邦訳が出た他のno starchの「Practical」シリーズの本を読んで、このシリーズが面白そうだったので買ったようです。いつもどおりのno starchのマンガ的なイラストの表紙の本でサブカル的なGEEK向けの本だと思ってしまいがちですが例によって中身は至って真面目です。ちょっとだけ読んだところでは、最初いきなり医療機器の話から始まっていて、IoTに医療機器が含まれることは完全に頭から漏れていたので目を開かされました。医療機器の場合、攻撃を受けた機器の種類によっては致命的な事態も当然想定されるわけなので、IoTのセキュリティの対象としての医療機器の重要性に遅まきながら気付きました。医療機器に関する部分以外については(良くは読んでいないので明言はできませんが)データハウスから出ている書名に「ハッキング」や「ハッカー」の文字が入っている本に同様の話は載っているかも知れませんが、医療機器の話はなかったと思うので、医療機器のセキュリティに関心があればお勧めしたいと思います。

    Helpful(0) Unhelpful(0)You have already voted this
  9. Julio Becker

    Livro perfeito para quem deseja entender mais sobre vulnerabilidades em IOT

    Helpful(0) Unhelpful(0)You have already voted this
  10. Alberto Cardenas

    En mi opinión es un libro excelente y en mi caso desquito su costo con los primeros 2 capitulos ya que son temas con los que estoy trabajando y tener un panorama de como crear modelados de amenazas para dispositivos IoT me sirvió bastante.

    Helpful(0) Unhelpful(0)You have already voted this
  11. Kirito Yuuki

    It’s little updated and I would like to start reading when I’m not busy doing other important things first.😎

    Helpful(0) Unhelpful(0)You have already voted this

    Add a review

    Your email address will not be published. Required fields are marked *

    Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things
    Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things

    Original price was: $59.99.Current price is: $47.59.

    bestdealsavvy.com
    Logo
    Register New Account
    Compare items
    • Total (0)
    Compare
    0
    Shopping cart