Abusing the Internet of Things

(Rick Simeone) #1
ISBN: 978-1-491-90233-

US $49.99 CAN $57.

“This book should serve as a
wakeup call that if security does
not become a priority when
building these devices, this new
‘Internet of Things’ will soon
become the ‘Internet of
Dangerous Things.'”
—Kevin DePeugh
VP of Cyber Security, Kaiser Permanente

“This book is a must-read for anyone
involved with securing smart
homes and IoT devices... Nitesh has
generously shared his vast technical
know-how and the security
industry should study this book and
take his warnings to heart.”
—Ryan Naraine
head of Kaspersky Research Center, USA

“This text is packed with practical
examples of the insecurity of
everyday devices, described not in
the language of theory, but in the
inescapable truth of code, packet
captures, and observable effects.”
—Richard Bejtlich
chief security strategist, FireEye

Internet / Security

Twitter: @oreillymedia
facebook.com/oreilly
oreilly.com

Abusing the Internet of Things


Blackouts, Freakouts, and Stakeouts


A future with billions of connected “things” includes monumental security
concerns. This practical book explores how malicious attackers can abuse
popular IoT-based devices, including wireless LED lightbulbs, electronic
door locks, baby monitors, smart TVs, and connected cars.
If you’re part of a team creating applications for Internet-connected
devices, this guide will help you explore security solutions. You’ll not
only learn how to uncover vulnerabilities in existing IoT devices, but also
gain deeper insight into an attacker’s tactics.

■ Analyze the design, architecture, and security issues of wireless
lighting systems
■ Understand how to breach electronic door locks and their
wireless mechanisms
■ Examine security design flaws in remote-controlled baby
monitors
■ Evaluate the security design of a suite of IoT-connected
home products
■ Scrutinize security vulnerabilities in smart TVs
■ Explore research into security weaknesses in smart cars
■ Delve into prototyping techniques that address security in
initial designs
■ Learn plausible attack scenarios based on how people will
likely use IoT devices

Nitesh Dhanjani is a well-known security researcher, author, and
speaker. He’s the author of Hacking: The Next Generation (O’Reilly),
Network Security Tools (O’Reilly), and HackNotes: Linux and Unix
Security (Osborne McGraw-Hill). Media outlets such as CNN, Reuters,
MSNBC, and Forbes have reported on Dhanjani’s work.

http://www.allitebooks.com

Free download pdf