Written by all-star security experts, Practical IoT Hacking is a quick-start conceptual guide to testing and exploiting IoT systems and devices.
Drawing from the real-life exploits of five highly regarded IoT security researchers, Practical IoT Hacking teaches you how to test IoT systems, devices, and protocols to mitigate risk.
The book begins by walking you through common threats and a threat modeling framework. You’ll develop a security testing methodology, discover the art of passive reconnaissance, and assess security on all layers of an IoT system. Next, you’ll perform VLAN hopping, crack MQTT authentication, abuse UPnP, develop an mDNS poisoner, and craft WS-Discovery attacks.
You’ll tackle both hardware hacking and radio hacking, with in-depth coverage of attacks against embedded IoT devices and RFID systems.
You’ll also learn how
The tools and devices you’ll use are affordable and readily available, so you can easily practice what you learn. Whether you’re a security researcher, IT team member, or hacking hobbyist, you’ll find Practical IoT Hacking indispensable in your efforts to hack all the things
Basic knowledge of Linux command line, TCP/IP, and programming
I heard that companies like Hikvision and Huawei circumvent a lot of cybersecurity rules to call home to China with data. This is troublesome.
I enjoyed this book as it offered some great ways to see how these devices are easily hacked, and how to lock down and harden your own IoT systems - even prevent them from calling home.
I really enjoyed this book, and would highly recommend for any in cybersecurity or DIY IoT electonics.
A good introduction into all things IoT-Hacking. This feels like a collection of introduction/walk-through articles, as they are from the same source they're better integrated (and you have more guidance) than searching for web articles (although web articles might be more up to date sometimes).
The BLE parts were excellent, the mobile application part felt hurried (but then, it's just an introduction and should give you hints were to research more yourself) and slightly outdated. LorA could have been more thorough (but that might just be my own interest).
Nice one. I’m more into software engineering and distributed systems, but have an interest in stuff like that.
So, for me, it was an interesting read. Especially, where the author begins showing use cases of breaching into a network device or reverse engineering a firmware. It was done with all technical details on how would the process of hacking would look like.
Sure, this is just a book with a limited page count. So there are several use cases for each domain. But that’s enough just to grasp on how hacking is possible in IoT world. Liked it.
Favorite chapters were the threat modeling and VLAN hopping. Very well detailed and provides insight on how threat modeling frameworks could be applied medical IoT devices (which we can then apply to the DICOM packet capturing exercise). My favorite exercise would probably be the mDNS poisoning attack since networking is always fun