Practical Hardware Pentesting - A Guide to Attacking Embedded Systems and Protecting Them Against the Most Common Hardware Attacks
1789619130, 9781789619133
Explore embedded systems pentesting by applying the most common attack techniques and patterns.
Key Features: - Learn v
Table of contents : Getting to Know the Hardware - 1 Setting Up Your Pentesting Lab and Ensuring Lab Safety - 3 Understanding Your Target - 29 Identifying the Components of Your Target - 45 Approaching and Planning the Test - 71 Attacking the Hardware - 93 Our Main Attack Platform - 95 Sniffing and Attacking the Most Common Protocols - 113 Attacking the Software - 215 Accessing the Debug Interfaces - 217 Static Reverse Engineering and Analysis - 249 Dynamic Reverse Engineering - 281 Scoring and Reporting Your Vulnerabilities - 311 Wrapping It Up Mitigations and Good Practices - 323 Assessments - 335 Other Books You May Enjoy - 348 Extracting and Manipulating Onboard Storage - 145 Attacking WiFi Bluetooth and BLE - 163 SoftwareDefined Radio Attacks - 189