Practical hardware pentesting: a guide to attacking embedded systems and protecting them against the most common hardware attacks
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Birmingham ; Mumbai
Packt
März 2021
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | xiii, 361 Seiten Illustrationen 24 cm |
ISBN: | 9781789619133 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV047565420 | ||
003 | DE-604 | ||
005 | 20220330 | ||
007 | t | ||
008 | 211028s2021 a||| b||| 00||| eng d | ||
020 | |a 9781789619133 |c Pb.: £37.99 |9 978-1-78961-913-3 | ||
035 | |a (OCoLC)1289777912 | ||
035 | |a (DE-599)BVBBV047565420 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-739 | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Valle, Jean-Georges |e Verfasser |0 (DE-588)1240873972 |4 aut | |
245 | 1 | 0 | |a Practical hardware pentesting |b a guide to attacking embedded systems and protecting them against the most common hardware attacks |c Jean-Georges Valle |
264 | 1 | |a Birmingham ; Mumbai |b Packt |c März 2021 | |
300 | |a xiii, 361 Seiten |b Illustrationen |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Penetrationstest |0 (DE-588)4825817-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Hardware |0 (DE-588)4023422-8 |2 gnd |9 rswk-swf |
653 | 0 | |a Penetration testing (Computer security) | |
653 | 0 | |a Electronic digital computers / Testing | |
653 | 0 | |a Computer input-output equipment | |
653 | 0 | |a Computer security | |
653 | 0 | |a Computer input-output equipment | |
653 | 0 | |a Computer security | |
653 | 0 | |a Electronic digital computers / Testing | |
653 | 0 | |a Penetration testing (Computer security) | |
689 | 0 | 0 | |a Hardware |0 (DE-588)4023422-8 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Penetrationstest |0 (DE-588)4825817-9 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032940781&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-032940781 |
Datensatz im Suchindex
_version_ | 1804182894580596736 |
---|---|
adam_text | Table of Contents Preface Section 1: Getting to Know the Hardware 1 Setting Up Your Pentesting Lab and Ensuring Lab Safety Prerequisites - the basics you will need 4 Languages Hardware-related skills System configuration Setting up a general lab Safety 5 5 5 7 8 Approach to buying test equipment Home lab versus company lab Approaching instrument selection What to buy, what it does, and when to buy it 9 9 10 11 Small tools and equipment Renting versus buying 21 23 The component pantry 23 The pantry itself The stock 23 24 Sample labs 25 Beginner Amateur Pro 25 26 27 Summary Questions 27 28 2 Understanding Your Target The CPU block 30 The storage block 34 CPU roles Common embedded systems architectures 30 RAM Program storage Storing data 34 34 35 31
ii Table of Contents The power block 35 The power block from a pentesting point of view 35 The networking blocks 36 Common networking protocols in embedded systems 36 The sensor blocks 41 Analog sensors Digital sensors 41 42 The actuator blocks The interface blocks Summary Questions Further reading 42 43 43 44 44 5 Identifying the Components of Your Target Technical requirements Harvesting information reading the manual 46 Taking a system analysis approach For our Furby manual 47 Continuing system exploration - identifying and putting components in the diagram 54 47 Opening the Furby 54 47 Manipulating the system 54 Dismantling the Furby Identifying chips 55 55 Harvesting information — researching on the internet 49 For the Furby 49 Starting the system diagram 52 For our Furby 53 Chips in the Furby 56 Identifying unmarked/mysterious chips 59 Furby — the mystery meat 61 The borders of functional blocks 68 Summary Questions 68 69 4 Approaching and Planning the Test The STRIDE methodology Finding the crown jewels in the assessed system 72 74 Security properties - what do we expect? 77 Communication Maintenance 78 78 System integrity and self-testing 79 Protection of secrets or security elements 79 Reaching the crown jewels how do we create impacts? 80 STRIDE through the components to compromise properties For the example system ֊ the Furby 80 82 Planning the test 85
Table of Contents iii Balancing your scenarios 85 Questions 91 Summary 91 Further reading 91 Section 2: Attacking the Hardware 5 Our Main Attack Platform Technical requirements Introduction to the bluepill board 96 A board to do what? What is it? 97 97 Why C and not Arduino? 98 The documentation Memory-projected registers 99 100 The toolchain The compilation process Driving the compilation 97 100 101 102 Flashing the chip Putting it into practice for the bluepill Introduction to C Operators Types The dreaded pointer Preprocessor directives Functions Summary Questions Further reading 104 104 106 107 108 109 110 111 112 112 112 б Sniffing and Attacking the Most Common Protocols Technical requirements Hardware 114 Understanding UART 134 114 Mode of operation Sniffing UART Injecting UART UART - man in the middle 135 137 137 138 Understanding D1W 139 Mode of operation Sniffing D1W Injecting D1W D1W - man in the middle 139 141 141 142 Understanding I2C 115 Mode of operation Sniffing I2C Injecting I2C I2C man in the middle 115 123 128 128 Understanding SPI 129 Mode of operation Sniffing SPI Injecting SPI SPI - man in the middle 130 132 133 133 Summary Questions 142 143
iv Table of Contents 7 Extracting and Manipulating Onboard Storage Technical requirements Finding the data EEPROMs EMMC and NAND/NOR Flash Hard drives, SSDs, and other storage mediums Extracting the data 146 146 146 147 147 148 On-chip firmware Onboard storage - specific interfaces 148 149 Onboard storage - common interfaces 149 Understanding unknown storage structures 151 Unknown storage formats 151 Well-known storage formats Let s look for storage in our Furby 152 153 Mounting filesystems Repacking Summary Questions Further reading 159 160 161 161 161 8 Attacking Wi-Fi, Bluetoothi, and BLE Technical requirements Basics of networking Networking in embedded systems using Wi-Fi Selecting Wi-Fi hardware Creating our access point Creating the access point and the basic network services Networking in embedded systems using Bluetooth 164 164 165 165 165 Bluetooth basics Discovering Bluetooth 169 171 Native Linux Bluetooth tools - looking into the joystick crash Sniffing the ВТ activity on your host 175 178 Sniffing raw ВТ BLE 179 182 Summary Questions 188 188 190 Understanding and selecting the hardware 191 190 Looking into a radio device 166 169 У Software-Defined Radio Attacks Technical requirements Introduction to arbitrary radio/SDR 192
Table of Contents v Receiving the signal - a look at antennas 192 Looking into the radio spectrum!94 Finding back the data 198 Identifying modulations - a didactic example 200 AM/ASK 201 FM/FSK 202 PM/PSK 203 MSK 204 Getting back to our signal 205 Demodulating the signal 206 Clock Recovery MM 210 WPCR 211 Sending it back Summary Questions 212 212 213 Section 3: Attacking the Software 10 Accessing the Debug interfaces Technical requirements Debugging/programming protocols - What are they and what are they used for? 218 218 Legitimate usage 218 Using JTAG to attack a system 219 Finding the pins 224 The PCB plays nicely 225 A bit harder 228 Very hard -JTAGulating 228 Using OpenOCD 231 Installing OpenOCD 232 The adapter file 233 The target file 234 Practical case Summary Questions 240 246 247 11 Static Reverse Engineering and Analysis Technical requirements Executable formats Understanding operating system formats Dump formats and memory images 250 250 251 256 Dump structure - the bluepill as an example Analyzing firmware introduction to Ghidra Getting to know Ghidra with a very simple ARM Linux executable 257 258 258
vi Table of Contents Going into second gear - Ghidra on raw binaries for the STM32 First identification pass Reversing our target function 268 272 Summary Questions 277 278 279 12 Dynamic Reverse Engineering Technical requirements 282 What is dynamic reverse engineering and why do it? 282 Leveraging OpenOCD and GDB 283 Exploring the most useful ARM instructions GDB? But... I know nothing about it! First Ghidra inspection 297 Reversing the expected password Of course, I aced the test 297 307 Understanding ARM assembly - a primer General information and syntax 285 287 288 Using dynamic reverse engineering - an example Summary Questions 291 296 308 308 13 Scoring and Reporting Your Vulnerabilities Scoring your vulnerabilities 312 Being understandable to everyone 316 Building your report template Usage of language in a report 316 317 Report quality When engineers do not want to re-engineer Summary Questions 318 319 322 322 14 Wrapping It Up - Mitigations and Good Practices Industry good practices - what are they and where to find them 324 Common problems and their mitigations 328 324 Establishing a trust relationship between the backend and a device 328 The CIS benchmarks 327 Storing secrets and confidential data 330 NIST hardware security guidelines 328 OWASP loT top 10
Table of Contents vii Cryptographic applications in sensitive applications 330 JTAG, bootloaders, and serial/UART interfaces 331 What about now? Self-teaching and your first project 332 333 Closing words Assessments Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5 Chapter 6 Chapter 7 335 335 336 338 338 340 341 Other Books You May Enjoy Index Chapter 8 Chapter 9 Chapter 10 Chapter 11 Chapter 12 Chapter 13 341 342 342 343 344 345
|
adam_txt |
Table of Contents Preface Section 1: Getting to Know the Hardware 1 Setting Up Your Pentesting Lab and Ensuring Lab Safety Prerequisites - the basics you will need 4 Languages Hardware-related skills System configuration Setting up a general lab Safety 5 5 5 7 8 Approach to buying test equipment Home lab versus company lab Approaching instrument selection What to buy, what it does, and when to buy it 9 9 10 11 Small tools and equipment Renting versus buying 21 23 The component pantry 23 The pantry itself The stock 23 24 Sample labs 25 Beginner Amateur Pro 25 26 27 Summary Questions 27 28 2 Understanding Your Target The CPU block 30 The storage block 34 CPU roles Common embedded systems architectures 30 RAM Program storage Storing data 34 34 35 31
ii Table of Contents The power block 35 The power block from a pentesting point of view 35 The networking blocks 36 Common networking protocols in embedded systems 36 The sensor blocks 41 Analog sensors Digital sensors 41 42 The actuator blocks The interface blocks Summary Questions Further reading 42 43 43 44 44 5 Identifying the Components of Your Target Technical requirements Harvesting information reading the manual 46 Taking a system analysis approach For our Furby manual 47 Continuing system exploration - identifying and putting components in the diagram 54 47 Opening the Furby 54 47 Manipulating the system 54 Dismantling the Furby Identifying chips 55 55 Harvesting information — researching on the internet 49 For the Furby 49 Starting the system diagram 52 For our Furby 53 Chips in the Furby 56 Identifying unmarked/mysterious chips 59 Furby — the mystery meat 61 The borders of functional blocks 68 Summary Questions 68 69 4 Approaching and Planning the Test The STRIDE methodology Finding the crown jewels in the assessed system 72 74 Security properties - what do we expect? 77 Communication Maintenance 78 78 System integrity and self-testing 79 Protection of secrets or security elements 79 Reaching the crown jewels how do we create impacts? 80 STRIDE through the components to compromise properties For the example system ֊ the Furby 80 82 Planning the test 85
Table of Contents iii Balancing your scenarios 85 Questions 91 Summary 91 Further reading 91 Section 2: Attacking the Hardware 5 Our Main Attack Platform Technical requirements Introduction to the bluepill board 96 A board to do what? What is it? 97 97 Why C and not Arduino? 98 The documentation Memory-projected registers 99 100 The toolchain The compilation process Driving the compilation 97 100 101 102 Flashing the chip Putting it into practice for the bluepill Introduction to C Operators Types The dreaded pointer Preprocessor directives Functions Summary Questions Further reading 104 104 106 107 108 109 110 111 112 112 112 б Sniffing and Attacking the Most Common Protocols Technical requirements Hardware 114 Understanding UART 134 114 Mode of operation Sniffing UART Injecting UART UART - man in the middle 135 137 137 138 Understanding D1W 139 Mode of operation Sniffing D1W Injecting D1W D1W - man in the middle 139 141 141 142 Understanding I2C 115 Mode of operation Sniffing I2C Injecting I2C I2C man in the middle 115 123 128 128 Understanding SPI 129 Mode of operation Sniffing SPI Injecting SPI SPI - man in the middle 130 132 133 133 Summary Questions 142 143
iv Table of Contents 7 Extracting and Manipulating Onboard Storage Technical requirements Finding the data EEPROMs EMMC and NAND/NOR Flash Hard drives, SSDs, and other storage mediums Extracting the data 146 146 146 147 147 148 On-chip firmware Onboard storage - specific interfaces 148 149 Onboard storage - common interfaces 149 Understanding unknown storage structures 151 Unknown storage formats 151 Well-known storage formats Let's look for storage in our Furby 152 153 Mounting filesystems Repacking Summary Questions Further reading 159 160 161 161 161 8 Attacking Wi-Fi, Bluetoothi, and BLE Technical requirements Basics of networking Networking in embedded systems using Wi-Fi Selecting Wi-Fi hardware Creating our access point Creating the access point and the basic network services Networking in embedded systems using Bluetooth 164 164 165 165 165 Bluetooth basics Discovering Bluetooth 169 171 Native Linux Bluetooth tools - looking into the joystick crash Sniffing the ВТ activity on your host 175 178 Sniffing raw ВТ BLE 179 182 Summary Questions 188 188 190 Understanding and selecting the hardware 191 190 Looking into a radio device 166 169 У Software-Defined Radio Attacks Technical requirements Introduction to arbitrary radio/SDR 192
Table of Contents v Receiving the signal - a look at antennas 192 Looking into the radio spectrum!94 Finding back the data 198 Identifying modulations - a didactic example 200 AM/ASK 201 FM/FSK 202 PM/PSK 203 MSK 204 Getting back to our signal 205 Demodulating the signal 206 Clock Recovery MM 210 WPCR 211 Sending it back Summary Questions 212 212 213 Section 3: Attacking the Software 10 Accessing the Debug interfaces Technical requirements Debugging/programming protocols - What are they and what are they used for? 218 218 Legitimate usage 218 Using JTAG to attack a system 219 Finding the pins 224 The PCB "plays nicely" 225 A bit harder 228 Very hard -JTAGulating 228 Using OpenOCD 231 Installing OpenOCD 232 The adapter file 233 The target file 234 Practical case Summary Questions 240 246 247 11 Static Reverse Engineering and Analysis Technical requirements Executable formats Understanding operating system formats Dump formats and memory images 250 250 251 256 Dump structure - the bluepill as an example Analyzing firmware introduction to Ghidra Getting to know Ghidra with a very simple ARM Linux executable 257 258 258
vi Table of Contents Going into second gear - Ghidra on raw binaries for the STM32 First identification pass Reversing our target function 268 272 Summary Questions 277 278 279 12 Dynamic Reverse Engineering Technical requirements 282 What is dynamic reverse engineering and why do it? 282 Leveraging OpenOCD and GDB 283 Exploring the most useful ARM instructions GDB? But. I know nothing about it! First Ghidra inspection 297 Reversing the expected password Of course, I aced the test 297 307 Understanding ARM assembly - a primer General information and syntax 285 287 288 Using dynamic reverse engineering - an example Summary Questions 291 296 308 308 13 Scoring and Reporting Your Vulnerabilities Scoring your vulnerabilities 312 Being understandable to everyone 316 Building your report template Usage of language in a report 316 317 Report quality When engineers do not want to re-engineer Summary Questions 318 319 322 322 14 Wrapping It Up - Mitigations and Good Practices Industry good practices - what are they and where to find them 324 Common problems and their mitigations 328 324 Establishing a trust relationship between the backend and a device 328 The CIS benchmarks 327 Storing secrets and confidential data 330 NIST hardware security guidelines 328 OWASP loT top 10
Table of Contents vii Cryptographic applications in sensitive applications 330 JTAG, bootloaders, and serial/UART interfaces 331 What about now? Self-teaching and your first project 332 333 Closing words Assessments Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5 Chapter 6 Chapter 7 335 335 336 338 338 340 341 Other Books You May Enjoy Index Chapter 8 Chapter 9 Chapter 10 Chapter 11 Chapter 12 Chapter 13 341 342 342 343 344 345 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Valle, Jean-Georges |
author_GND | (DE-588)1240873972 |
author_facet | Valle, Jean-Georges |
author_role | aut |
author_sort | Valle, Jean-Georges |
author_variant | j g v jgv |
building | Verbundindex |
bvnumber | BV047565420 |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)1289777912 (DE-599)BVBBV047565420 |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01966nam a2200457 c 4500</leader><controlfield tag="001">BV047565420</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220330 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">211028s2021 a||| b||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781789619133</subfield><subfield code="c">Pb.: £37.99</subfield><subfield code="9">978-1-78961-913-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1289777912</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047565420</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Valle, Jean-Georges</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1240873972</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Practical hardware pentesting</subfield><subfield code="b">a guide to attacking embedded systems and protecting them against the most common hardware attacks</subfield><subfield code="c">Jean-Georges Valle</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham ; Mumbai</subfield><subfield code="b">Packt</subfield><subfield code="c">März 2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xiii, 361 Seiten</subfield><subfield code="b">Illustrationen</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hardware</subfield><subfield code="0">(DE-588)4023422-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Electronic digital computers / Testing</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer input-output equipment</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer input-output equipment</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Electronic digital computers / Testing</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Hardware</subfield><subfield code="0">(DE-588)4023422-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032940781&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032940781</subfield></datafield></record></collection> |
id | DE-604.BV047565420 |
illustrated | Illustrated |
index_date | 2024-07-03T18:28:28Z |
indexdate | 2024-07-10T09:14:48Z |
institution | BVB |
isbn | 9781789619133 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032940781 |
oclc_num | 1289777912 |
open_access_boolean | |
owner | DE-706 DE-739 |
owner_facet | DE-706 DE-739 |
physical | xiii, 361 Seiten Illustrationen 24 cm |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | Packt |
record_format | marc |
spelling | Valle, Jean-Georges Verfasser (DE-588)1240873972 aut Practical hardware pentesting a guide to attacking embedded systems and protecting them against the most common hardware attacks Jean-Georges Valle Birmingham ; Mumbai Packt März 2021 xiii, 361 Seiten Illustrationen 24 cm txt rdacontent n rdamedia nc rdacarrier Computersicherheit (DE-588)4274324-2 gnd rswk-swf Penetrationstest (DE-588)4825817-9 gnd rswk-swf Hardware (DE-588)4023422-8 gnd rswk-swf Penetration testing (Computer security) Electronic digital computers / Testing Computer input-output equipment Computer security Hardware (DE-588)4023422-8 s Computersicherheit (DE-588)4274324-2 s Penetrationstest (DE-588)4825817-9 s DE-604 Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032940781&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Valle, Jean-Georges Practical hardware pentesting a guide to attacking embedded systems and protecting them against the most common hardware attacks Computersicherheit (DE-588)4274324-2 gnd Penetrationstest (DE-588)4825817-9 gnd Hardware (DE-588)4023422-8 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4825817-9 (DE-588)4023422-8 |
title | Practical hardware pentesting a guide to attacking embedded systems and protecting them against the most common hardware attacks |
title_auth | Practical hardware pentesting a guide to attacking embedded systems and protecting them against the most common hardware attacks |
title_exact_search | Practical hardware pentesting a guide to attacking embedded systems and protecting them against the most common hardware attacks |
title_exact_search_txtP | Practical hardware pentesting a guide to attacking embedded systems and protecting them against the most common hardware attacks |
title_full | Practical hardware pentesting a guide to attacking embedded systems and protecting them against the most common hardware attacks Jean-Georges Valle |
title_fullStr | Practical hardware pentesting a guide to attacking embedded systems and protecting them against the most common hardware attacks Jean-Georges Valle |
title_full_unstemmed | Practical hardware pentesting a guide to attacking embedded systems and protecting them against the most common hardware attacks Jean-Georges Valle |
title_short | Practical hardware pentesting |
title_sort | practical hardware pentesting a guide to attacking embedded systems and protecting them against the most common hardware attacks |
title_sub | a guide to attacking embedded systems and protecting them against the most common hardware attacks |
topic | Computersicherheit (DE-588)4274324-2 gnd Penetrationstest (DE-588)4825817-9 gnd Hardware (DE-588)4023422-8 gnd |
topic_facet | Computersicherheit Penetrationstest Hardware |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032940781&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT vallejeangeorges practicalhardwarepentestingaguidetoattackingembeddedsystemsandprotectingthemagainstthemostcommonhardwareattacks |