By Π€ΠΎΡΠΈΠΎΡ Π§Π°Π½ΡΠΈΡ, ΠΠΎΠ°Π½Π½ΠΈΡ Π‘ΡΠ°ΠΈΡ
Π€ΠΎΡΠΈΠΎΡ Π§Π°Π½ΡΠΈΡ, ΠΠΎΠ°Π½Π½ΠΈΡ Π‘ΡΠ°ΠΈΡ, 2022
ΠΡΠ° ΠΊΠ½ΠΈΠ³Π° Π½Π°ΡΡΠΈΡ Π²Π°Ρ ΡΠ΅ΡΡΠΈΡΠΎΠ²Π°ΡΡ ΡΠΈΡΡΠ΅ΠΌΡ, ΡΡΡΡΠΎΠΉΡΡΠ²Π° ΠΈ ΠΏΡΠΎΡΠΎΠΊΠΎΠ»Ρ ΠΠ½ΡΠ΅ΡΠ½Π΅ΡΠ° Π²Π΅ΡΠ΅ΠΉ (IoT) Π½Π° ΠΏΡΠ΅Π΄ΠΌΠ΅Ρ ΡΡΠ·Π²ΠΈΠΌΠΎΡΡΠ΅ΠΉ. ΠΡ ΠΎΡΠ²ΠΎΠΈΡΠ΅ ΠΌΠ΅ΡΠΎΠ΄Ρ ΠΌΠΎΠ΄Π΅Π»ΠΈΡΠΎΠ²Π°Π½ΠΈΡ ΡΠ³ΡΠΎΠ·, ΠΏΡΠ°ΠΊΡΠΈΡΠ΅ΡΠΊΠΈΠ΅ ΡΠΏΠΎΡΠΎΠ±Ρ ΠΏΡΠΎΠ²Π΅ΡΠΊΠΈ Π±Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡΠΈ ΠΈ ΠΈΡΠΊΡΡΡΡΠ²ΠΎ ΠΏΠ°ΡΡΠΈΠ²Π½ΠΎΠΉ ΡΠ°Π·Π²Π΅Π΄ΠΊΠΈ. ΠΠ½ΠΈΠ³Π° ΠΏΠΎΠΌΠΎΠΆΠ΅Ρ ΠΎΡΠ΅Π½ΠΈΡΡ ΡΡΠΎΠ²Π΅Π½Ρ Π·Π°ΡΠΈΡΡ Π²Π°ΡΠΈΡ IoT-ΡΠΈΡΡΠ΅ΠΌ ΠΈ ΠΏΡΠ΅Π΄ΠΎΡΠ²ΡΠ°ΡΠΈΡΡ Π°ΡΠ°ΠΊΠΈ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΠΎΠ². Π Π½Π΅ΠΉ ΡΠ°ΡΡΠΌΠ°ΡΡΠΈΠ²Π°ΡΡΡΡ ΡΠ°ΠΊΠΈΠ΅ ΡΠ΅Ρ Π½ΠΈΠΊΠΈ, ΠΊΠ°ΠΊ ΠΏΠ΅ΡΠ΅ΠΊΠ»ΡΡΠ΅Π½ΠΈΠ΅ VLAN, Π²Π·Π»ΠΎΠΌ Π°ΡΡΠ΅Π½ΡΠΈΡΠΈΠΊΠ°ΡΠΈΠΈ MOTT, Π·Π»ΠΎΡΠΏΠΎΡΡΠ΅Π±Π»Π΅Π½ΠΈΠ΅ UPnP, ΡΠΎΠ·Π΄Π°Π½ΠΈΠ΅ ΠΎΡΡΠ°Π²ΠΈΡΠ΅Π»Π΅ΠΉ mDNS ΠΈ Π°ΡΠ°ΠΊΠΈ WS-Discovery.
Fotis Chantzis, Ioannis Stais, 2022
This book teaches you how to test Internet of Things (IoT) systems, devices, and protocols for security vulnerabilities. You will learn threat modeling techniques, practical security testing methods, and the art of passive reconnaissance. The book helps assess the protection level of your IoT systems and prevent malicious attacks. It covers techniques such as VLAN hopping, MOTT authentication bypass, UPnP abuse, mDNS poisoning, and WS-Discovery attacks.