Coverart for item
The Resource Abusing the Internet of things : blackouts, freakouts, and stakeouts, Nitesh Dhanjani, (electronic book)

Abusing the Internet of things : blackouts, freakouts, and stakeouts, Nitesh Dhanjani, (electronic book)

Label
Abusing the Internet of things : blackouts, freakouts, and stakeouts
Title
Abusing the Internet of things
Title remainder
blackouts, freakouts, and stakeouts
Statement of responsibility
Nitesh Dhanjani
Creator
Subject
Language
eng
Member of
Cataloging source
AU-PeEL
http://library.link/vocab/creatorName
Dhanjani, Nitesh
Dewey number
005.8
LC call number
QA76.9.A25 -- .D436 2015eb
Nature of contents
dictionaries
http://library.link/vocab/subjectName
  • Computer networks
  • Computer crimes
  • Internet of things
Label
Abusing the Internet of things : blackouts, freakouts, and stakeouts, Nitesh Dhanjani, (electronic book)
Instantiates
Publication
Contents
  • Copyright -- Table of Contents -- Foreword -- Preface -- Who This Book Is For -- How to Use This Book -- Conventions Used in This Book -- Using Code Examples -- Safari® Books Online -- How to Contact Us -- Acknowledgments -- Chapter 1. Lights Out-Hacking Wireless Lightbulbs to Cause Sustained Blackouts -- Why hue? -- Controlling Lights via the Website Interface -- Information Leakage -- Drive-by Blackouts -- Weak Password Complexity and Password Leaks -- Controlling Lights Using the iOS App -- Stealing the Token from a Mobile Device -- Malware Can Cause Perpetual Blackouts
  • Changing Lightbulb State -- If This Then That (IFTTT) -- Conclusion -- Chapter 2. Electronic Lock Picking-Abusing Door Locks to Compromise Physical Security -- Hotel Door Locks and Magnetic Stripes -- The Onity Door Lock -- The Magnetic Stripe -- The Programming Port -- Security Issues -- Vendor Response -- The Case of Z-Wave-Enabled Door Locks -- Z-Wave Protocol and Implementation Analysis -- Exploiting Key-Exchange Vulnerability -- Bluetooth Low Energy and Unlocking via Mobile Apps -- Understanding Weaknesses in BLE and Using Packet-Capture Tools -- Kevo Mobile App Insecurities -- Conclusion
  • Chapter 3. Assaulting the Radio Nurse-Breaching Baby Monitors and One Other Thing -- The Foscam Incident -- Foscam Vulnerabilities Exposed by Researchers -- Using Shodan to Find Baby Monitors Exposed on the Internet -- Exploiting Default Credentials -- Exploiting Dynamic DNS -- The Foscam Saga Continues -- The Belkin WeMo Baby Monitor -- Bad Security by Design -- Malware Gone Wild -- Some Things Never Change: The WeMo Switch -- Conclusion -- Chapter 4. Blurred Lines-When the Physical Space Meets the Virtual Space -- SmartThings -- Hijacking Credentials -- Abusing the Physical Graph
  • SmartThings SSL Certificate Validation Vulnerability -- Interoperability with Insecurity Leads to{u2026}Insecurity -- SmartThings and hue Lighting -- SmartThings and the WeMo Switch -- Conclusion -- Chapter 5. The Idiot Box-Attacking "Smart" Televisions -- The TOCTTOU Attack -- The Samsung LExxB650 Series -- The Exploit -- You Call That Encryption? -- Understanding XOR -- I call it Encraption -- Understanding and Exploiting the App World -- Decrypting Firmware -- Cursory Exploration of the Operating System -- Remotely Exploiting a Samsung Smart TV -- Inspecting Your Own Smart TV (and Other IoT Devices)
  • Say Hello to the WiFi Pineapple Mark V -- Capturing credentials and stripping TLS -- Conclusion -- Chapter 6. Connected Car Security Analysis-From Gas to Fully Electric -- The Tire Pressure Monitoring System (TPMS) -- Reversing TPMS Communication -- Eavesdropping and Privacy Implications -- Spoofing Alerts -- Exploiting Wireless Connectivity -- Injecting CAN Data -- Bluetooth Vulnerabilities -- Vulnerabilities in Telematics -- Significant Attack Surface -- The Tesla Model S -- Locate and Steal a Tesla the Old-Fashioned Way -- Social Engineering Tesla Employees and the Quest for Location Privacy
  • Handing Out Keys to Strangers
Control code
PURCH EBC3564578
Dimensions
unknown
Extent
1 online resource (291 p.)
Form of item
electronic
Governing access note
There is no limit to the number of simultaneous users but there is a limit of 325 uses (cumulative between all users) in each 12 month period, from the date of purchase. Library staff are alerted when the remaining number of uses is low and will decide whether to buy another copy.Printing is restricted to 20% of the total pages of the ebook, per patron. Copying and pasting is restricted to 5% of the total pages of the ebook, per person. However, printing and copy and paste permissions in excess of this may be granted by some publishers
Isbn
9781491902936
Specific material designation
remote
Label
Abusing the Internet of things : blackouts, freakouts, and stakeouts, Nitesh Dhanjani, (electronic book)
Publication
Contents
  • Copyright -- Table of Contents -- Foreword -- Preface -- Who This Book Is For -- How to Use This Book -- Conventions Used in This Book -- Using Code Examples -- Safari® Books Online -- How to Contact Us -- Acknowledgments -- Chapter 1. Lights Out-Hacking Wireless Lightbulbs to Cause Sustained Blackouts -- Why hue? -- Controlling Lights via the Website Interface -- Information Leakage -- Drive-by Blackouts -- Weak Password Complexity and Password Leaks -- Controlling Lights Using the iOS App -- Stealing the Token from a Mobile Device -- Malware Can Cause Perpetual Blackouts
  • Changing Lightbulb State -- If This Then That (IFTTT) -- Conclusion -- Chapter 2. Electronic Lock Picking-Abusing Door Locks to Compromise Physical Security -- Hotel Door Locks and Magnetic Stripes -- The Onity Door Lock -- The Magnetic Stripe -- The Programming Port -- Security Issues -- Vendor Response -- The Case of Z-Wave-Enabled Door Locks -- Z-Wave Protocol and Implementation Analysis -- Exploiting Key-Exchange Vulnerability -- Bluetooth Low Energy and Unlocking via Mobile Apps -- Understanding Weaknesses in BLE and Using Packet-Capture Tools -- Kevo Mobile App Insecurities -- Conclusion
  • Chapter 3. Assaulting the Radio Nurse-Breaching Baby Monitors and One Other Thing -- The Foscam Incident -- Foscam Vulnerabilities Exposed by Researchers -- Using Shodan to Find Baby Monitors Exposed on the Internet -- Exploiting Default Credentials -- Exploiting Dynamic DNS -- The Foscam Saga Continues -- The Belkin WeMo Baby Monitor -- Bad Security by Design -- Malware Gone Wild -- Some Things Never Change: The WeMo Switch -- Conclusion -- Chapter 4. Blurred Lines-When the Physical Space Meets the Virtual Space -- SmartThings -- Hijacking Credentials -- Abusing the Physical Graph
  • SmartThings SSL Certificate Validation Vulnerability -- Interoperability with Insecurity Leads to{u2026}Insecurity -- SmartThings and hue Lighting -- SmartThings and the WeMo Switch -- Conclusion -- Chapter 5. The Idiot Box-Attacking "Smart" Televisions -- The TOCTTOU Attack -- The Samsung LExxB650 Series -- The Exploit -- You Call That Encryption? -- Understanding XOR -- I call it Encraption -- Understanding and Exploiting the App World -- Decrypting Firmware -- Cursory Exploration of the Operating System -- Remotely Exploiting a Samsung Smart TV -- Inspecting Your Own Smart TV (and Other IoT Devices)
  • Say Hello to the WiFi Pineapple Mark V -- Capturing credentials and stripping TLS -- Conclusion -- Chapter 6. Connected Car Security Analysis-From Gas to Fully Electric -- The Tire Pressure Monitoring System (TPMS) -- Reversing TPMS Communication -- Eavesdropping and Privacy Implications -- Spoofing Alerts -- Exploiting Wireless Connectivity -- Injecting CAN Data -- Bluetooth Vulnerabilities -- Vulnerabilities in Telematics -- Significant Attack Surface -- The Tesla Model S -- Locate and Steal a Tesla the Old-Fashioned Way -- Social Engineering Tesla Employees and the Quest for Location Privacy
  • Handing Out Keys to Strangers
Control code
PURCH EBC3564578
Dimensions
unknown
Extent
1 online resource (291 p.)
Form of item
electronic
Governing access note
There is no limit to the number of simultaneous users but there is a limit of 325 uses (cumulative between all users) in each 12 month period, from the date of purchase. Library staff are alerted when the remaining number of uses is low and will decide whether to buy another copy.Printing is restricted to 20% of the total pages of the ebook, per patron. Copying and pasting is restricted to 5% of the total pages of the ebook, per person. However, printing and copy and paste permissions in excess of this may be granted by some publishers
Isbn
9781491902936
Specific material designation
remote

Library Locations

Processing Feedback ...