Cargando…

Hacking connected cars : tactics, techniques, and procedures /

Chapter 3 Threat Modeling -- STRIDE Model -- Threat Modeling Using STRIDE -- VAST -- PASTA -- Stage 1: Define the Business and Security Objectives -- Stage 2: Define the Technical Scope -- Stage 3: Decompose the Application -- Stage 4: Identify Threat Agents -- Stage 5: Identify the Vulnerabilities...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Knight, Alissa (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Indianapolis, Indiana : John Wiley & Sons, Inc., [2020]
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBOOKCENTRAL_on1142524939
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cnu---unuuu
008 200307s2020 inu o 000 0 eng d
040 |a EBLCP  |b eng  |e rda  |e pn  |c EBLCP  |d RECBK  |d UKMGB  |d OCLCO  |d N$T  |d UKAHL  |d OCLCQ  |d OCLCF  |d YDXIT  |d DG1  |d OCLCQ  |d OCLCO  |d IEEEE  |d TEFOD  |d K6U  |d OCLCQ  |d UPM  |d OCLCQ  |d OCLCO  |d OCLCL 
015 |a GBC013531  |2 bnb 
016 7 |a 019690857  |2 Uk 
020 |a 9781119491774  |q (electronic bk. ;  |q oBook) 
020 |a 1119491770  |q (electronic bk. ;  |q oBook) 
020 |a 9781119491736  |q (electronic book) 
020 |a 1119491738  |q (electronic book) 
020 |a 9781119491781  |q (electronic book) 
020 |a 1119491789  |q (electronic book) 
020 |z 9781119491804  |q (paperback) 
024 7 |a 10.1002/9781119491774  |2 doi 
029 1 |a AU@  |b 000067253991 
029 1 |a UKMGB  |b 019690857 
035 |a (OCoLC)1142524939 
037 |a 9781119491736  |b Wiley 
037 |a 9820810  |b IEEE 
037 |a B847C5AB-35DB-47E6-A3FC-F92841002A03  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a TL152.8  |b .K65 2020 
082 0 4 |a 629.04/6  |2 23 
049 |a UAMI 
100 1 |a Knight, Alissa,  |e author. 
245 1 0 |a Hacking connected cars :  |b tactics, techniques, and procedures /  |c Alissa Knight. 
264 1 |a Indianapolis, Indiana :  |b John Wiley & Sons, Inc.,  |c [2020] 
300 |a 1 online resource (xxxiii, 238 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
505 8 |a Cover -- Title Page -- Copyright -- About the Author -- Acknowledgments -- Contents at a Glance -- Contents -- Foreword -- Foreword -- Introduction -- For Non-Automotive Experts -- Automotive Networking -- Target Audience -- How This Book Is Structured -- What's on the Website -- Summary -- Part I Tactics, Techniques, and Procedures -- Chapter 1 Pre-Engagement -- Penetration Testing Execution Standard -- Scope Definition -- Architecture -- Full Disclosure -- Release Cycles -- IP Addresses -- Source Code -- Wireless Networks -- Start and End Dates -- Hardware Unique Serial Numbers 
505 8 |a Rules of Engagement -- Timeline -- Testing Location -- Work Breakdown Structure -- Documentation Collection and Review -- Example Documents -- Project Management -- Conception and Initiation -- Definition and Planning -- Launch or Execution -- Performance/Monitoring -- Project Close -- Lab Setup -- Required Hardware and Software -- Laptop Setup -- Rogue BTS Option 1: OsmocomBB -- Rogue BTS Option 2: BladeRF + YateBTS -- Setting Up Your WiFi Pineapple Tetra -- Summary -- Chapter 2 Intelligence Gathering -- Asset Register -- Reconnaissance -- Passive Reconnaissance -- Active Reconnaissance 
520 |a Chapter 3 Threat Modeling -- STRIDE Model -- Threat Modeling Using STRIDE -- VAST -- PASTA -- Stage 1: Define the Business and Security Objectives -- Stage 2: Define the Technical Scope -- Stage 3: Decompose the Application -- Stage 4: Identify Threat Agents -- Stage 5: Identify the Vulnerabilities -- Stage 6: Enumerate the Exploits -- Stage 7: Perform Risk and Impact Analysis -- Summary -- Chapter 4 Vulnerability Analysis -- Passive and Active Analysis -- WiFi -- Bluetooth -- Summary -- Chapter 5 Exploitation -- Creating Your Rogue BTS -- Configuring NetworkinaPC 
505 8 |a Bringing Your Rogue BTS Online -- Hunting for the TCU -- When You Know the MSISDN of the TCU -- When You Know the IMSI of the TCU -- When You Don't Know the IMSI or MSISDN of the TCU -- Cryptanalysis -- Encryption Keys -- Impersonation Attacks -- Summary -- Chapter 6 Post Exploitation -- Persistent Access -- Creating a Reverse Shell -- Linux Systems -- Placing the Backdoor on the System -- Network Sniffing -- Infrastructure Analysis -- Examining the Network Interfaces -- Examining the ARP Cache -- Examining DNS -- Examining the Routing Table -- Identifying Services -- Fuzzing 
505 8 |a Filesystem Analysis -- Command-Line History -- Core Dump Files -- Debug Log Files -- Credentials and Certificates -- Over-the-Air Updates -- Summary -- Part II Risk Management -- Chapter 7 Risk Management -- Frameworks -- Establishing the Risk Management Program -- SAE J3061 -- ISO/SAE AWI 21434 -- HEAVENS -- Threat Modeling -- STRIDE -- PASTA -- TRIKE -- Summary -- Chapter 8 Risk-Assessment Frameworks -- HEAVENS -- Determining the Threat Level -- Determining the Impact Level -- Determining the Security Level -- EVITA -- Calculating Attack Potential -- Summary -- Chapter 9 PKI in Automotive 
500 |a VANET 
588 0 |a Online resource; title from digital title page (viewed on June 09, 2020). 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Automated vehicles. 
650 0 |a Automated vehicles  |x Security measures. 
650 0 |a Penetration testing (Computer security) 
650 6 |a Véhicules autonomes. 
650 6 |a Véhicules autonomes  |x Sécurité  |x Mesures. 
650 6 |a Tests d'intrusion. 
650 7 |a COMPUTERS  |x Security  |x Cryptography & Encryption.  |2 bisacsh 
650 7 |a Automated vehicles  |2 fast 
650 7 |a Penetration testing (Computer security)  |2 fast 
758 |i has work:  |a Hacking connected cars (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGp63Dv9h6qby7j8tFFvpd  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Knight, Alissa.  |t Hacking Connected Cars : Tactics, Techniques, and Procedures.  |d Newark : John Wiley & Sons, Incorporated, ©2020  |z 9781119491804 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=6119409  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH33784299 
938 |a Askews and Holts Library Services  |b ASKH  |n AH33784300 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6119409 
938 |a EBSCOhost  |b EBSC  |n 2378823 
938 |a Recorded Books, LLC  |b RECE  |n rbeEB00812470 
994 |a 92  |b IZTAP