Practical hardware pentesting :: a guide to attacking embedded systems and protecting them against the most common hardware attacks /
Learn how to pentest your hardware with the most common attract techniques and patterns Key Features Explore various pentesting tools and techniques to secure your hardware infrastructure Protect your hardware by finding potential entry points like glitches Find the best practices for securely desig...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham :
Packt Publishing,
2021.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Learn how to pentest your hardware with the most common attract techniques and patterns Key Features Explore various pentesting tools and techniques to secure your hardware infrastructure Protect your hardware by finding potential entry points like glitches Find the best practices for securely designing your products Book DescriptionIf you're looking for hands-on introduction to pentesting that delivers, then Practical Hardware Pentesting is for you. This book will help you plan attacks, hack your embedded devices, and secure the hardware infrastructure. Throughout the book, you will see how a specific device works, explore the functional and security aspects, and learn how a system senses and communicates with the outside world. You'll set up a lab from scratch and then gradually work towards an advanced hardware lab-but you'll still be able to follow along with a basic setup. As you progress, you'll get to grips with the global architecture of an embedded system and sniff on-board traffic, learn how to identify and formalize threats to the embedded system, and understand its relationship with its ecosystem. You'll discover how to analyze your hardware and locate its possible system vulnerabilities before going on to explore firmware dumping, analysis, and exploitation. The reverse engineering chapter will get you thinking from an attacker point of view; you'll understand how devices are attacked, how they are compromised, and how you can harden a device against the most common hardware attack vectors. By the end of this book, you will be well-versed with security best practices and understand how they can be implemented to secure your hardware. What you will learn Perform an embedded system test and identify security critical functionalities Locate critical security components and buses and learn how to attack them Discover how to dump and modify stored information Understand and exploit the relationship between the firmware and hardware Identify and attack the security functions supported by the functional blocks of the device Develop an attack lab to support advanced device analysis and attacks Who this book is for If you're a researcher or a security professional who wants a comprehensive introduction into hardware security assessment, then this book is for you. Electrical engineers who want to understand the vulnerabilities of their devices and design them with security in mind will also find this book useful. You won't need any prior knowledge with hardware pentensting before you get started; everything you need is in the chapters. |
Beschreibung: | 1 online resource (382 pages) : illustrations |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 1789614198 9781789614190 |
Zugangseinschränkungen: | Legal Deposit; |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1253572834 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 210314s2021 enka ob 001 0 eng d | ||
040 | |a NLW |b eng |e pn |c NLW |d UKMGB |d OCLCO |d N$T |d OCLCQ |d EBLCP |d OCLCO |d OCLCQ |d IEEEE |d OCLCO |d OCLCL |d TMA |d OCLCQ | ||
015 | |a GBC1C2297 |2 bnb | ||
016 | 7 | |a 020160113 |2 Uk | |
020 | |a 1789614198 | ||
020 | |a 9781789614190 |q (electronic bk.) | ||
020 | |z 9781789619133 |q (print) | ||
035 | |a (OCoLC)1253572834 | ||
037 | |a 9781789614190 |b Packt Publishing Pvt. Ltd | ||
037 | |a 10162523 |b IEEE | ||
050 | 4 | |a QA76.9.A25 | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Valle, Jean-Georges, |e author. | |
245 | 1 | 0 | |a Practical hardware pentesting : |b a guide to attacking embedded systems and protecting them against the most common hardware attacks / |c Jean-Georges Valle. |
264 | 1 | |a Birmingham : |b Packt Publishing, |c 2021. | |
300 | |a 1 online resource (382 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
506 | 1 | |a Legal Deposit; |c Only available on premises controlled by the deposit library and to one user at any one time; |e The Legal Deposit Libraries (Non-Print Works) Regulations (UK). |5 WlAbNL | |
520 | |a Learn how to pentest your hardware with the most common attract techniques and patterns Key Features Explore various pentesting tools and techniques to secure your hardware infrastructure Protect your hardware by finding potential entry points like glitches Find the best practices for securely designing your products Book DescriptionIf you're looking for hands-on introduction to pentesting that delivers, then Practical Hardware Pentesting is for you. This book will help you plan attacks, hack your embedded devices, and secure the hardware infrastructure. Throughout the book, you will see how a specific device works, explore the functional and security aspects, and learn how a system senses and communicates with the outside world. You'll set up a lab from scratch and then gradually work towards an advanced hardware lab-but you'll still be able to follow along with a basic setup. As you progress, you'll get to grips with the global architecture of an embedded system and sniff on-board traffic, learn how to identify and formalize threats to the embedded system, and understand its relationship with its ecosystem. You'll discover how to analyze your hardware and locate its possible system vulnerabilities before going on to explore firmware dumping, analysis, and exploitation. The reverse engineering chapter will get you thinking from an attacker point of view; you'll understand how devices are attacked, how they are compromised, and how you can harden a device against the most common hardware attack vectors. By the end of this book, you will be well-versed with security best practices and understand how they can be implemented to secure your hardware. What you will learn Perform an embedded system test and identify security critical functionalities Locate critical security components and buses and learn how to attack them Discover how to dump and modify stored information Understand and exploit the relationship between the firmware and hardware Identify and attack the security functions supported by the functional blocks of the device Develop an attack lab to support advanced device analysis and attacks Who this book is for If you're a researcher or a security professional who wants a comprehensive introduction into hardware security assessment, then this book is for you. Electrical engineers who want to understand the vulnerabilities of their devices and design them with security in mind will also find this book useful. You won't need any prior knowledge with hardware pentensting before you get started; everything you need is in the chapters. | ||
505 | 0 | |a Table of Contents Setting Up Your Pentesting Lab and Ensuring Lab Safety Understanding Your Target Identifying the Components of Your Target Approaching and Planning the Test Our Main Attack Platform Sniffing and Attacking the Most Common Protocols Extracting and Manipulating Onboard Storage Attacking Wi-Fi, Bluetooth, and BLE Software-Defined Radio Attacks Accessing the Debug Interfaces Static Reverse Engineering and Analysis Dynamic Reverse Engineering Scoring and Reporting Your Vulnerabilities Wrapping It Up - Mitigations and Good Practices. | |
650 | 0 | |a Penetration testing (Computer security) |0 http://id.loc.gov/authorities/subjects/sh2011003137 | |
650 | 0 | |a Electronic digital computers |x Testing. | |
650 | 0 | |a Computer input-output equipment. |0 http://id.loc.gov/authorities/subjects/sh85029505 | |
650 | 0 | |a Computer security. |0 http://id.loc.gov/authorities/subjects/sh90001862 | |
650 | 6 | |a Tests d'intrusion. | |
650 | 6 | |a Ordinateurs |x Équipement d'entrée-sortie. | |
650 | 6 | |a Sécurité informatique. | |
650 | 7 | |a COMPUTERS |x Computerized Home & Entertainment. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x Networking. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Network Protocols. |2 bisacsh | |
650 | 7 | |a Computer input-output equipment |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Electronic digital computers |x Testing |2 fast | |
650 | 7 | |a Penetration testing (Computer security) |2 fast | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2803908 |3 Volltext |
938 | |a ProQuest Ebook Central |b EBLB |n EBL6824400 | ||
938 | |a EBSCOhost |b EBSC |n 2803908 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1253572834 |
---|---|
_version_ | 1816882544898998272 |
adam_text | |
any_adam_object | |
author | Valle, Jean-Georges |
author_facet | Valle, Jean-Georges |
author_role | aut |
author_sort | Valle, Jean-Georges |
author_variant | j g v jgv |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Table of Contents Setting Up Your Pentesting Lab and Ensuring Lab Safety Understanding Your Target Identifying the Components of Your Target Approaching and Planning the Test Our Main Attack Platform Sniffing and Attacking the Most Common Protocols Extracting and Manipulating Onboard Storage Attacking Wi-Fi, Bluetooth, and BLE Software-Defined Radio Attacks Accessing the Debug Interfaces Static Reverse Engineering and Analysis Dynamic Reverse Engineering Scoring and Reporting Your Vulnerabilities Wrapping It Up - Mitigations and Good Practices. |
ctrlnum | (OCoLC)1253572834 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05707cam a2200589 i 4500</leader><controlfield tag="001">ZDB-4-EBA-on1253572834</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |||||||||||</controlfield><controlfield tag="008">210314s2021 enka ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">NLW</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">NLW</subfield><subfield code="d">UKMGB</subfield><subfield code="d">OCLCO</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">EBLCP</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IEEEE</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">TMA</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBC1C2297</subfield><subfield code="2">bnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">020160113</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1789614198</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781789614190</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781789619133</subfield><subfield code="q">(print)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1253572834</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">9781789614190</subfield><subfield code="b">Packt Publishing Pvt. Ltd</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">10162523</subfield><subfield code="b">IEEE</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Valle, Jean-Georges,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Practical hardware pentesting :</subfield><subfield code="b">a guide to attacking embedded systems and protecting them against the most common hardware attacks /</subfield><subfield code="c">Jean-Georges Valle.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham :</subfield><subfield code="b">Packt Publishing,</subfield><subfield code="c">2021.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (382 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="506" ind1="1" ind2=" "><subfield code="a">Legal Deposit;</subfield><subfield code="c">Only available on premises controlled by the deposit library and to one user at any one time;</subfield><subfield code="e">The Legal Deposit Libraries (Non-Print Works) Regulations (UK).</subfield><subfield code="5">WlAbNL</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Learn how to pentest your hardware with the most common attract techniques and patterns Key Features Explore various pentesting tools and techniques to secure your hardware infrastructure Protect your hardware by finding potential entry points like glitches Find the best practices for securely designing your products Book DescriptionIf you're looking for hands-on introduction to pentesting that delivers, then Practical Hardware Pentesting is for you. This book will help you plan attacks, hack your embedded devices, and secure the hardware infrastructure. Throughout the book, you will see how a specific device works, explore the functional and security aspects, and learn how a system senses and communicates with the outside world. You'll set up a lab from scratch and then gradually work towards an advanced hardware lab-but you'll still be able to follow along with a basic setup. As you progress, you'll get to grips with the global architecture of an embedded system and sniff on-board traffic, learn how to identify and formalize threats to the embedded system, and understand its relationship with its ecosystem. You'll discover how to analyze your hardware and locate its possible system vulnerabilities before going on to explore firmware dumping, analysis, and exploitation. The reverse engineering chapter will get you thinking from an attacker point of view; you'll understand how devices are attacked, how they are compromised, and how you can harden a device against the most common hardware attack vectors. By the end of this book, you will be well-versed with security best practices and understand how they can be implemented to secure your hardware. What you will learn Perform an embedded system test and identify security critical functionalities Locate critical security components and buses and learn how to attack them Discover how to dump and modify stored information Understand and exploit the relationship between the firmware and hardware Identify and attack the security functions supported by the functional blocks of the device Develop an attack lab to support advanced device analysis and attacks Who this book is for If you're a researcher or a security professional who wants a comprehensive introduction into hardware security assessment, then this book is for you. Electrical engineers who want to understand the vulnerabilities of their devices and design them with security in mind will also find this book useful. You won't need any prior knowledge with hardware pentensting before you get started; everything you need is in the chapters.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Table of Contents Setting Up Your Pentesting Lab and Ensuring Lab Safety Understanding Your Target Identifying the Components of Your Target Approaching and Planning the Test Our Main Attack Platform Sniffing and Attacking the Most Common Protocols Extracting and Manipulating Onboard Storage Attacking Wi-Fi, Bluetooth, and BLE Software-Defined Radio Attacks Accessing the Debug Interfaces Static Reverse Engineering and Analysis Dynamic Reverse Engineering Scoring and Reporting Your Vulnerabilities Wrapping It Up - Mitigations and Good Practices.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2011003137</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic digital computers</subfield><subfield code="x">Testing.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer input-output equipment.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85029505</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh90001862</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Tests d'intrusion.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Ordinateurs</subfield><subfield code="x">Équipement d'entrée-sortie.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Computerized Home & Entertainment.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">Networking.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Network Protocols.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer input-output equipment</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Electronic digital computers</subfield><subfield code="x">Testing</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2803908</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL6824400</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">2803908</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-on1253572834 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:30:18Z |
institution | BVB |
isbn | 1789614198 9781789614190 |
language | English |
oclc_num | 1253572834 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (382 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | Packt Publishing, |
record_format | marc |
spelling | Valle, Jean-Georges, author. Practical hardware pentesting : a guide to attacking embedded systems and protecting them against the most common hardware attacks / Jean-Georges Valle. Birmingham : Packt Publishing, 2021. 1 online resource (382 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Includes bibliographical references and index. Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK). WlAbNL Learn how to pentest your hardware with the most common attract techniques and patterns Key Features Explore various pentesting tools and techniques to secure your hardware infrastructure Protect your hardware by finding potential entry points like glitches Find the best practices for securely designing your products Book DescriptionIf you're looking for hands-on introduction to pentesting that delivers, then Practical Hardware Pentesting is for you. This book will help you plan attacks, hack your embedded devices, and secure the hardware infrastructure. Throughout the book, you will see how a specific device works, explore the functional and security aspects, and learn how a system senses and communicates with the outside world. You'll set up a lab from scratch and then gradually work towards an advanced hardware lab-but you'll still be able to follow along with a basic setup. As you progress, you'll get to grips with the global architecture of an embedded system and sniff on-board traffic, learn how to identify and formalize threats to the embedded system, and understand its relationship with its ecosystem. You'll discover how to analyze your hardware and locate its possible system vulnerabilities before going on to explore firmware dumping, analysis, and exploitation. The reverse engineering chapter will get you thinking from an attacker point of view; you'll understand how devices are attacked, how they are compromised, and how you can harden a device against the most common hardware attack vectors. By the end of this book, you will be well-versed with security best practices and understand how they can be implemented to secure your hardware. What you will learn Perform an embedded system test and identify security critical functionalities Locate critical security components and buses and learn how to attack them Discover how to dump and modify stored information Understand and exploit the relationship between the firmware and hardware Identify and attack the security functions supported by the functional blocks of the device Develop an attack lab to support advanced device analysis and attacks Who this book is for If you're a researcher or a security professional who wants a comprehensive introduction into hardware security assessment, then this book is for you. Electrical engineers who want to understand the vulnerabilities of their devices and design them with security in mind will also find this book useful. You won't need any prior knowledge with hardware pentensting before you get started; everything you need is in the chapters. Table of Contents Setting Up Your Pentesting Lab and Ensuring Lab Safety Understanding Your Target Identifying the Components of Your Target Approaching and Planning the Test Our Main Attack Platform Sniffing and Attacking the Most Common Protocols Extracting and Manipulating Onboard Storage Attacking Wi-Fi, Bluetooth, and BLE Software-Defined Radio Attacks Accessing the Debug Interfaces Static Reverse Engineering and Analysis Dynamic Reverse Engineering Scoring and Reporting Your Vulnerabilities Wrapping It Up - Mitigations and Good Practices. Penetration testing (Computer security) http://id.loc.gov/authorities/subjects/sh2011003137 Electronic digital computers Testing. Computer input-output equipment. http://id.loc.gov/authorities/subjects/sh85029505 Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Tests d'intrusion. Ordinateurs Équipement d'entrée-sortie. Sécurité informatique. COMPUTERS Computerized Home & Entertainment. bisacsh COMPUTERS Security Networking. bisacsh COMPUTERS Networking Network Protocols. bisacsh Computer input-output equipment fast Computer security fast Electronic digital computers Testing fast Penetration testing (Computer security) fast FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2803908 Volltext |
spellingShingle | Valle, Jean-Georges Practical hardware pentesting : a guide to attacking embedded systems and protecting them against the most common hardware attacks / Table of Contents Setting Up Your Pentesting Lab and Ensuring Lab Safety Understanding Your Target Identifying the Components of Your Target Approaching and Planning the Test Our Main Attack Platform Sniffing and Attacking the Most Common Protocols Extracting and Manipulating Onboard Storage Attacking Wi-Fi, Bluetooth, and BLE Software-Defined Radio Attacks Accessing the Debug Interfaces Static Reverse Engineering and Analysis Dynamic Reverse Engineering Scoring and Reporting Your Vulnerabilities Wrapping It Up - Mitigations and Good Practices. Penetration testing (Computer security) http://id.loc.gov/authorities/subjects/sh2011003137 Electronic digital computers Testing. Computer input-output equipment. http://id.loc.gov/authorities/subjects/sh85029505 Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Tests d'intrusion. Ordinateurs Équipement d'entrée-sortie. Sécurité informatique. COMPUTERS Computerized Home & Entertainment. bisacsh COMPUTERS Security Networking. bisacsh COMPUTERS Networking Network Protocols. bisacsh Computer input-output equipment fast Computer security fast Electronic digital computers Testing fast Penetration testing (Computer security) fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh2011003137 http://id.loc.gov/authorities/subjects/sh85029505 http://id.loc.gov/authorities/subjects/sh90001862 |
title | Practical hardware pentesting : a guide to attacking embedded systems and protecting them against the most common hardware attacks / |
title_auth | Practical hardware pentesting : a guide to attacking embedded systems and protecting them against the most common hardware attacks / |
title_exact_search | Practical hardware pentesting : a guide to attacking embedded systems and protecting them against the most common hardware attacks / |
title_full | Practical hardware pentesting : a guide to attacking embedded systems and protecting them against the most common hardware attacks / Jean-Georges Valle. |
title_fullStr | Practical hardware pentesting : a guide to attacking embedded systems and protecting them against the most common hardware attacks / Jean-Georges Valle. |
title_full_unstemmed | Practical hardware pentesting : a guide to attacking embedded systems and protecting them against the most common hardware attacks / Jean-Georges Valle. |
title_short | Practical hardware pentesting : |
title_sort | practical hardware pentesting a guide to attacking embedded systems and protecting them against the most common hardware attacks |
title_sub | a guide to attacking embedded systems and protecting them against the most common hardware attacks / |
topic | Penetration testing (Computer security) http://id.loc.gov/authorities/subjects/sh2011003137 Electronic digital computers Testing. Computer input-output equipment. http://id.loc.gov/authorities/subjects/sh85029505 Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Tests d'intrusion. Ordinateurs Équipement d'entrée-sortie. Sécurité informatique. COMPUTERS Computerized Home & Entertainment. bisacsh COMPUTERS Security Networking. bisacsh COMPUTERS Networking Network Protocols. bisacsh Computer input-output equipment fast Computer security fast Electronic digital computers Testing fast Penetration testing (Computer security) fast |
topic_facet | Penetration testing (Computer security) Electronic digital computers Testing. Computer input-output equipment. Computer security. Tests d'intrusion. Ordinateurs Équipement d'entrée-sortie. Sécurité informatique. COMPUTERS Computerized Home & Entertainment. COMPUTERS Security Networking. COMPUTERS Networking Network Protocols. Computer input-output equipment Computer security Electronic digital computers Testing |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2803908 |
work_keys_str_mv | AT vallejeangeorges practicalhardwarepentestingaguidetoattackingembeddedsystemsandprotectingthemagainstthemostcommonhardwareattacks |