Cargando…

Abusing the Internet of things : blackouts, freakouts, and stakeouts /

Annotation

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Dhanjani, Nitesh (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Sebastopol, CA : O'Reilly, [2015]
Edición:First edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ii 4500
001 OR_ocn918841518
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu|||unuuu
008 150817s2015 cau o 001 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d N$T  |d YDXCP  |d IDEBK  |d UMI  |d CDX  |d OCLCF  |d TEFOD  |d EBLCP  |d DEBBG  |d DEBSZ  |d COO  |d LVT  |d OCLCQ  |d VT2  |d OCLCA  |d CEF  |d NTG  |d WYU  |d UAB  |d UKAHL  |d OCLCQ  |d OCLCO  |d OCLCQ 
019 |a 919204804  |a 924034097 
020 |a 9781491902936  |q electronic bk. 
020 |a 1491902930  |q electronic bk. 
020 |a 9781491902929  |q electronic bk. 
020 |a 1491902922  |q electronic bk. 
020 |z 9781491902332 
020 |a 1491902337 
020 |a 9781491902332 
020 |a 9781491902899 
020 |a 1491902892 
029 1 |a DEBBG  |b BV043020145 
029 1 |a DEBSZ  |b 455697140 
029 1 |a GBVCP  |b 882846671 
029 1 |a AU@  |b 000067109659 
029 1 |a AU@  |b 000056951883 
035 |a (OCoLC)918841518  |z (OCoLC)919204804  |z (OCoLC)924034097 
037 |a CL0500000635  |b Safari Books Online 
037 |a A1B95C8C-81E0-4D28-BC20-9B0A4FB15828  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.9.A25  |b D43 2015eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Dhanjani, Nitesh,  |e author. 
245 1 0 |a Abusing the Internet of things :  |b blackouts, freakouts, and stakeouts /  |c Nitesh Dhanjani. 
250 |a First edition. 
264 1 |a Sebastopol, CA :  |b O'Reilly,  |c [2015] 
300 |a 1 online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Vendor-supplied metadata. 
500 |a Includes index. 
505 0 |a Copyright -- Table of Contents -- Foreword -- Preface -- Who This Book Is For -- How to Use This Book -- Conventions Used in This Book -- Using Code Examples -- Safari® Books Online -- How to Contact Us -- Acknowledgments -- Chapter 1. Lights Out-Hacking Wireless Lightbulbs to Cause Sustained Blackouts -- Why hue? -- Controlling Lights via the Website Interface -- Information Leakage -- Drive-by Blackouts -- Weak Password Complexity and Password Leaks -- Controlling Lights Using the iOS App -- Stealing the Token from a Mobile Device -- Malware Can Cause Perpetual Blackouts. 
505 8 |a Changing Lightbulb State -- If This Then That (IFTTT) -- Conclusion -- Chapter 2. Electronic Lock Picking-Abusing Door Locks to Compromise Physical Security -- Hotel Door Locks and Magnetic Stripes -- The Onity Door Lock -- The Magnetic Stripe -- The Programming Port -- Security Issues -- Vendor Response -- The Case of Z-Wave-Enabled Door Locks -- Z-Wave Protocol and Implementation Analysis -- Exploiting Key-Exchange Vulnerability -- Bluetooth Low Energy and Unlocking via Mobile Apps -- Understanding Weaknesses in BLE and Using Packet-Capture Tools -- Kevo Mobile App Insecurities -- Conclusion. 
505 8 |a Chapter 3. Assaulting the Radio Nurse-Breaching Baby Monitors and One Other Thing -- The Foscam Incident -- Foscam Vulnerabilities Exposed by Researchers -- Using Shodan to Find Baby Monitors Exposed on the Internet -- Exploiting Default Credentials -- Exploiting Dynamic DNS -- The Foscam Saga Continues -- The Belkin WeMo Baby Monitor -- Bad Security by Design -- Malware Gone Wild -- Some Things Never Change: The WeMo Switch -- Conclusion -- Chapter 4. Blurred Lines-When the Physical Space Meets the Virtual Space -- SmartThings -- Hijacking Credentials -- Abusing the Physical Graph. 
505 8 |a SmartThings SSL Certificate Validation Vulnerability -- Interoperability with Insecurity Leads to{u2026}Insecurity -- SmartThings and hue Lighting -- SmartThings and the WeMo Switch -- Conclusion -- Chapter 5. The Idiot Box-Attacking "Smart" Televisions -- The TOCTTOU Attack -- The Samsung LExxB650 Series -- The Exploit -- You Call That Encryption? -- Understanding XOR -- I call it Encraption -- Understanding and Exploiting the App World -- Decrypting Firmware -- Cursory Exploration of the Operating System -- Remotely Exploiting a Samsung Smart TV -- Inspecting Your Own Smart TV (and Other IoT Devices) 
505 8 |a Say Hello to the WiFi Pineapple Mark V -- Capturing credentials and stripping TLS -- Conclusion -- Chapter 6. Connected Car Security Analysis-From Gas to Fully Electric -- The Tire Pressure Monitoring System (TPMS) -- Reversing TPMS Communication -- Eavesdropping and Privacy Implications -- Spoofing Alerts -- Exploiting Wireless Connectivity -- Injecting CAN Data -- Bluetooth Vulnerabilities -- Vulnerabilities in Telematics -- Significant Attack Surface -- The Tesla Model S -- Locate and Steal a Tesla the Old-Fashioned Way -- Social Engineering Tesla Employees and the Quest for Location Privacy. 
520 8 |a Annotation  |b "This book is a marvellous thing: an important intervention in the policy debate about information security and a practical text for people trying to improve the situation." Cory Doctorowauthor, co-editor of Boing BoingA future with billions of connected "things" includes monumental security concerns. This practical book explores how malicious attackers can abuse popular IoT-based devices, including wireless LED lightbulbs, electronic door locks, baby monitors, smart TVs, and connected cars.If you re part of a team creating applications for Internet-connected devices, this guide will help you explore security solutions. You ll not only learn how to uncover vulnerabilities in existing IoT devices, but also gain deeper insight into an attacker s tactics.Analyze the design, architecture, and security issues of wireless lighting systemsUnderstand how to breach electronic door locks and their wireless mechanismsExamine security design flaws in remote-controlled baby monitorsEvaluate the security design of a suite of IoT-connected home productsScrutinize security vulnerabilities in smart TVsExplore research into security weaknesses in smart carsDelve into prototyping techniques that address security in initial designsLearn plausible attacks scenarios based on how people will likely use IoT devices" 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 6 |a Sécurité informatique. 
650 7 |a COMPUTERS / Internet / Security  |2 bisacsh 
650 7 |a COMPUTERS / Networking / Security  |2 bisacsh 
650 7 |a COMPUTERS / Security / General  |2 bisacsh 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
776 0 8 |i Print version:  |a Dhanjani, Nitesh.  |t Abusing the Internet of things : blackouts, freakouts, and stakeouts.  |d Sebastopol, California : O'Reilly Media, 2015  |z 9781491902332 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781491902899/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH29154705 
938 |a Askews and Holts Library Services  |b ASKH  |n AH29154706 
938 |a EBSCOhost  |b EBSC  |n 1052393 
938 |a YBP Library Services  |b YANK  |n 12576511 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis32375461 
938 |a Coutts Information Services  |b COUT  |n 32375461 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL3564578 
994 |a 92  |b IZTAP