Take a practioner’s approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture. You’ll review the architecture’s central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE or ZigBee. You’ll also learn to assess a device physicall y by opening it, looking at the PCB, and identifying the chipsets and interfaces. You’ll then use that information to gain entry to the device or to perform other actions, such as dumping encryption keys and firmware. As the IoT rises to one of the most popular tech trends, manufactures need to take necessary steps to secure devices and protect them from attackers. The IoT Hacker’s Handbook breaks down the Internet of Things, exploits it, and reveals how these devices can be built securely. What You’ll Learn Perform a threat model of a real-world IoT device and locate all possible attacker entry points Use reverse engineering of firmware binaries to identify security issues Analyze, assess, and identify security issues in exploited ARM and MIPS based binaries Sniff, capture, and exploit radio communication protocols, such as Bluetooth Low Energy (BLE), and ZigBee 采用实用者的方法分析物联网(IoT)设备和物联网架构面临的安全问题。 您将回顾架构的核心组件,从硬件通信接口(如UART和SPI)到无线电协议(如BLE或ZigBee)。您还将学习通过打开设备,查看PCB以及识别芯片组和接口来物理评估设备。然后,您将使用该信息进入设备或执行其他操作,例如转储加密密钥和固件。 随着物联网成为最受欢迎的技术趋势之一,制造商需要采取必要措施来保护设备并保护设备免受攻击者的攻击。物联网黑客手册打破了物联网,利用它,并揭示了如何安全地构建这些设备。 你将学到什么 执行真实世界物联网设备的威胁模型,找到所有可能的攻击者入口点 使用固件二进制文件的逆向工程来识别安全问题 分析,评估和识别已开发的基于ARM和MIPS的二进制文件中的安全问题 嗅探,捕获和利用无线电通信协议,例如蓝牙低功耗(BLE)和ZigBee y by opening it, looking at the PCB, and identifying the chipsets and interfaces. You’ll then use that information to gain entry to the device or to perform other actions, such as dumping encryption keys and firmware. As the IoT rises to one of the most popular tech trends, manufactures need to take necessary steps to secure devices and protect them from attackers. The IoT Hacker’s Handbook breaks down the Internet of Things, exploits it, and reveals how these devices can be built securely. What You’ll Learn Perform a threat model of a real-world IoT device and locate all possible attacker entry points Use reverse engineering of firmware binaries to identify security issues Analyze, assess, and identify security issues in exploited ARM and MIPS based binaries Sniff, capture, and exploit radio communication protocols, such as Bluetooth Low Energy (BLE), and ZigBee 采用实用者的方法分析物联网(IoT)设备和物联网架构面临的安全问题。 您将回顾架构的核心组件,从硬件通信接口(如UART和SPI)到无线电协议(如BLE或ZigBee)。您还将学习通过打开设备,查看PCB以及识别芯片组和接口来物理评估设备。然后,您将使用该信息进入设备或执行其他操作,例如转储加密密钥和固件。 随着物联网成为最受欢迎的技术趋势之一,制造商需要采取必要措施来保护设备并保护设备免受攻击者的攻击。物联网黑客手册打破了物联网,利用它,并揭示了如何安全地构建这些设备。 你将学到什么 执行真实世界物联网设备的威胁模型,找到所有可能的攻击者入口点 使用固件二进制文件的逆向工程来识别安全问题 分析,评估和识别已开发的基于ARM和MIPS的二进制文件中的安全问题 嗅探,捕获和利用无线电通信协议,例如蓝牙低功耗(BLE)和ZigBee