Explore embedded systems pentesting by applying the most common attack techniques and patterns. Key Features: - Learn v
688 142 23MB
English Pages 382 Year 2021
Table of contents :
Getting to Know the Hardware - 1
Setting Up Your Pentesting Lab and Ensuring Lab Safety - 3
Understanding Your Target - 29
Identifying the Components of Your Target - 45
Approaching and Planning the Test - 71
Attacking the Hardware - 93
Our Main Attack Platform - 95
Sniffing and Attacking the Most Common Protocols - 113
Attacking the Software - 215
Accessing the Debug Interfaces - 217
Static Reverse Engineering and Analysis - 249
Dynamic Reverse Engineering - 281
Scoring and Reporting Your Vulnerabilities - 311
Wrapping It Up Mitigations and Good Practices - 323
Assessments - 335
Other Books You May Enjoy - 348
Extracting and Manipulating Onboard Storage - 145
Attacking WiFi Bluetooth and BLE - 163
SoftwareDefined Radio Attacks - 189