

Buy anything from 5,000+ international stores. One checkout price. No surprise fees. Join 2M+ shoppers on Desertcart.
Desertcart purchases this item on your behalf and handles shipping, customs, and support to Kyrgyzstan.
Written by all-star security experts, Practical IoT Hacking is a quick-start conceptual guide to testing and exploiting IoT systems and devices. Drawing from the real-life exploits of five highly regarded IoT security researchers, Practical IoT Hacking teaches you how to test IoT systems, devices, and protocols to mitigate risk. The book begins by walking you through common threats and a threat modeling framework. You’ll develop a security testing methodology, discover the art of passive reconnaissance, and assess security on all layers of an IoT system. Next, you’ll perform VLAN hopping, crack MQTT authentication, abuse UPnP, develop an mDNS poisoner, and craft WS-Discovery attacks. You’ll tackle both hardware hacking and radio hacking, with in-depth coverage of attacks against embedded IoT devices and RFID systems. You’ll also learn how to: Write a DICOM service scanner as an NSE module Hack a microcontroller through the UART and SWD interfaces Reverse engineer firmware and analyze mobile companion apps Develop an NFC fuzzer using Proxmark3 Hack a smart home by jamming wireless alarms, playing back IP camera feeds, and controlling a smart treadmill The tools and devices you’ll use are affordable and readily available, so you can easily practice what you learn. Whether you’re a security researcher, IT team member, or hacking hobbyist, you’ll find Practical IoT Hacking indispensable in your efforts to hack all the things REQUIREMENTS: Basic knowledge of Linux command line, TCP/IP, and programming Review: IoT guide - Practical IoT Hacking, penned by a team of five highly regarded security researchers, is an indispensable, detailed blueprint for mastering modern connected device security. This guide addresses the urgent demands of the rapidly growing Internet of Things (IoT)—devices like smart cameras and speakers are often rushed to market without sufficient security testing. The book is geared toward an expert-level audience in digital hacking, immediately establishing a robust methodology for threat modeling. Despite its challenging nature, Practical IoT Hacking remains a powerful, five-star resource for tech professionals serious about a career in penetration testing. Practical IoT Hacking is the definitive blueprint for mastering modern connected device security. It directly addresses the urgent demands of the rapidly growing Internet of Things (IoT), where devices like smart cameras and speakers are often rushed to market without sufficient testing. Review: All OK. - All OK.





T**R
IoT guide
Practical IoT Hacking, penned by a team of five highly regarded security researchers, is an indispensable, detailed blueprint for mastering modern connected device security. This guide addresses the urgent demands of the rapidly growing Internet of Things (IoT)—devices like smart cameras and speakers are often rushed to market without sufficient security testing. The book is geared toward an expert-level audience in digital hacking, immediately establishing a robust methodology for threat modeling. Despite its challenging nature, Practical IoT Hacking remains a powerful, five-star resource for tech professionals serious about a career in penetration testing. Practical IoT Hacking is the definitive blueprint for mastering modern connected device security. It directly addresses the urgent demands of the rapidly growing Internet of Things (IoT), where devices like smart cameras and speakers are often rushed to market without sufficient testing.
C**N
All OK.
All OK.
C**O
Easy to grasp
Very clear to understand. Highly recommended.
P**T
A lot of information to get.
As I said a lot of information to learn. Will take time to get through it but good information.
J**O
This book should be in your personal library
This book is highly recommended. It shows you possible scenarios and technologies that you can find in an IoT environment, taking you from how the technologies works, which would be its main threats, as well methodologies, techniques, tools, gadgets, and everything you might need to exploit them, all this with real cases and practical examples. If you want to hack/secure IoT, this is the book you must have.
I**N
Should have included required hardware list at least at the beginning of the book
What's the point of finding out that you need to buy some device only when you get to a specific page? seems like the book isn't really focused on "practicality"
E**O
Buon libro
Molto interessante, utile
B**Z
Muy buen libro
Pedido entregado en la fecha indicada. Llegó en perfectas condiciones. El precio de este libro es algo elevado, pero en la línea de otros vendedores/tiendas, etc. Algo a destacar es que ofrecen dos opciones de compra, una la opción de libro para kindle, y la segunda opción, la clásica opción de libro en papel de tapa blanda. Totalmente recomendable.
う**E
DICOM
たまに満足に読めもしないのに英語の本を買ってしまいますが、この本を買ったのはしばらく前で、どうも、この本は邦訳が出た他のno starchの「Practical」シリーズの本を読んで、このシリーズが面白そうだったので買ったようです。 いつもどおりのno starchのマンガ的なイラストの表紙の本でサブカル的なGEEK向けの本だと思ってしまいがちですが例によって中身は至って真面目です。 ちょっとだけ読んだところでは、最初いきなり医療機器の話から始まっていて、IoTに医療機器が含まれることは完全に頭から漏れていたので目を開かされました。 医療機器の場合、攻撃を受けた機器の種類によっては致命的な事態も当然想定されるわけなので、IoTのセキュリティの対象としての医療機器の重要性に遅まきながら気付きました。 医療機器に関する部分以外については(良くは読んでいないので明言はできませんが)データハウスから出ている書名に「ハッキング」や「ハッカー」の文字が入っている本に同様の話は載っているかも知れませんが、医療機器の話はなかったと思うので、医療機器のセキュリティに関心があればお勧めしたいと思います。
J**R
Muito bom!!!
Livro perfeito para quem deseja entender mais sobre vulnerabilidades em IOT
A**S
Lectura obligada
En mi opinión es un libro excelente y en mi caso desquito su costo con los primeros 2 capitulos ya que son temas con los que estoy trabajando y tener un panorama de como crear modelados de amenazas para dispositivos IoT me sirvió bastante.
Trustpilot
3 weeks ago
1 month ago