Jump to ratings and reviews
Rate this book

Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things

Rate this book
Written by all-star security experts, Practical IoT Hacking is a quick-start conceptual guide to testing and exploiting IoT systems and devices.

Drawing from the real-life exploits of five highly regarded IoT security researchers, Practical IoT Hacking teaches you how to test IoT systems, devices, and protocols to mitigate risk.

The book begins by walking you through common threats and a threat modeling framework. You’ll develop a security testing methodology, discover the art of passive reconnaissance, and assess security on all layers of an IoT system. Next, you’ll perform VLAN hopping, crack MQTT authentication, abuse UPnP, develop an mDNS poisoner, and craft WS-Discovery attacks.

You’ll tackle both hardware hacking and radio hacking, with in-depth coverage of attacks against embedded IoT devices and RFID systems.

You’ll also learn how

The tools and devices you’ll use are affordable and readily available, so you can easily practice what you learn. Whether you’re a security researcher, IT team member, or hacking hobbyist, you’ll find Practical IoT Hacking indispensable in your efforts to hack all the things

Basic knowledge of Linux command line, TCP/IP, and programming

464 pages, Paperback

Published April 9, 2021

32 people are currently reading
229 people want to read

About the author

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
16 (39%)
4 stars
20 (48%)
3 stars
5 (12%)
2 stars
0 (0%)
1 star
0 (0%)
Displaying 1 - 5 of 5 reviews
Profile Image for Ben.
2,734 reviews228 followers
January 14, 2023
Hacking Back

I heard that companies like Hikvision and Huawei circumvent a lot of cybersecurity rules to call home to China with data.
This is troublesome.

I enjoyed this book as it offered some great ways to see how these devices are easily hacked, and how to lock down and harden your own IoT systems - even prevent them from calling home.

I really enjoyed this book, and would highly recommend for any in cybersecurity or DIY IoT electonics.

4.8/5
Profile Image for Andreas Happe.
Author 1 book3 followers
January 25, 2022
A good introduction into all things IoT-Hacking. This feels like a collection of introduction/walk-through articles, as they are from the same source they're better integrated (and you have more guidance) than searching for web articles (although web articles might be more up to date sometimes).

The BLE parts were excellent, the mobile application part felt hurried (but then, it's just an introduction and should give you hints were to research more yourself) and slightly outdated. LorA could have been more thorough (but that might just be my own interest).

Overall great IoT introduction.
Profile Image for Eugene ghaiklor Obrezkov.
119 reviews2 followers
October 3, 2025
Nice one. I’m more into software engineering and distributed systems, but have an interest in stuff like that.

So, for me, it was an interesting read. Especially, where the author begins showing use cases of breaching into a network device or reverse engineering a firmware. It was done with all technical details on how would the process of hacking would look like.

Sure, this is just a book with a limited page count. So there are several use cases for each domain. But that’s enough just to grasp on how hacking is possible in IoT world. Liked it.
Profile Image for jamin.
13 reviews
August 18, 2022
Favorite chapters were the threat modeling and VLAN hopping. Very well detailed and provides insight on how threat modeling frameworks could be applied medical IoT devices (which we can then apply to the DICOM packet capturing exercise). My favorite exercise would probably be the mDNS poisoning attack since networking is always fun
Profile Image for Carter.
597 reviews
January 5, 2022
Another book on hacking, modifying and understanding embedded systems, this time with a discussion on RF and wired network protocols.
Displaying 1 - 5 of 5 reviews

Can't find what you're looking for?

Get help and learn more about the design.