Intro to IoT pentesting:
The course begins by introducing you to the world of IoT and its significance in today's tech-driven society, emphasizing the importance of security in this interconnected environment. It covers the spectrum of IoT targets and the necessity of robust security measures to protect them. The cours...
Gespeichert in:
Körperschaft: | |
---|---|
Weitere beteiligte Personen: | , |
Format: | Elektronisch Video |
Sprache: | Englisch |
Veröffentlicht: |
[Birmingham, United Kingdom]
Packt Publishing
2024
|
Ausgabe: | [First edition]. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781835887660/?ar |
Zusammenfassung: | The course begins by introducing you to the world of IoT and its significance in today's tech-driven society, emphasizing the importance of security in this interconnected environment. It covers the spectrum of IoT targets and the necessity of robust security measures to protect them. The course focuses on practical skills, including the use of hardware components like multimeters, TTL to USB, and JTAGulators, as well as software tools such as terminal emulators, Binwalk, and QEMU. You will learn about firmware analysis, including acquisition, extraction, and emulation, alongside techniques for exploiting embedded operating systems, network services, and IoT web applications. The course wraps up by guiding you through hands-on practices for identifying hardware vulnerabilities, automating UART pin identification, and gaining device access, ensuring you have the knowledge to perform comprehensive pentests on IoT devices. |
Beschreibung: | Online resource; title from title details screen (O'Reilly, viewed March 19, 2024) |
Umfang: | 1 Online-Ressource (1 video file (9 hr., 35 min.)) sound, color. |
ISBN: | 9781835887660 183588766X |
Internformat
MARC
LEADER | 00000ngm a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-102207569 | ||
003 | DE-627-1 | ||
005 | 20240404083424.0 | ||
006 | m o | | | ||
007 | cr uuu---uuuuu | ||
008 | 240404s2024 xx ||| |o o ||eng c | ||
020 | |a 9781835887660 |c electronic video |9 978-1-83588-766-0 | ||
020 | |a 183588766X |c electronic video |9 1-83588-766-X | ||
035 | |a (DE-627-1)102207569 | ||
035 | |a (DE-599)KEP102207569 | ||
035 | |a (ORHE)9781835887660 | ||
035 | |a (DE-627-1)102207569 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23/eng/20240319 | |
245 | 1 | 0 | |a Intro to IoT pentesting |
250 | |a [First edition]. | ||
264 | 1 | |a [Birmingham, United Kingdom] |b Packt Publishing |c 2024 | |
300 | |a 1 Online-Ressource (1 video file (9 hr., 35 min.)) |b sound, color. | ||
336 | |a zweidimensionales bewegtes Bild |b tdi |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Online resource; title from title details screen (O'Reilly, viewed March 19, 2024) | ||
520 | |a The course begins by introducing you to the world of IoT and its significance in today's tech-driven society, emphasizing the importance of security in this interconnected environment. It covers the spectrum of IoT targets and the necessity of robust security measures to protect them. The course focuses on practical skills, including the use of hardware components like multimeters, TTL to USB, and JTAGulators, as well as software tools such as terminal emulators, Binwalk, and QEMU. You will learn about firmware analysis, including acquisition, extraction, and emulation, alongside techniques for exploiting embedded operating systems, network services, and IoT web applications. The course wraps up by guiding you through hands-on practices for identifying hardware vulnerabilities, automating UART pin identification, and gaining device access, ensuring you have the knowledge to perform comprehensive pentests on IoT devices. | ||
650 | 0 | |a Penetration testing (Computer security) | |
650 | 0 | |a Internet of things | |
650 | 0 | |a Embedded Internet devices | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 4 | |a Tests d'intrusion | |
650 | 4 | |a Internet des objets | |
650 | 4 | |a Internet intégré | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Instructional films | |
650 | 4 | |a Nonfiction films | |
650 | 4 | |a Internet videos | |
650 | 4 | |a Films de formation | |
650 | 4 | |a Films autres que de fiction | |
650 | 4 | |a Vidéos sur Internet | |
700 | 1 | |a Lowrie, Daniel |e MitwirkendeR |4 ctb | |
700 | 1 | |a Goodwin, Sophie |e MitwirkendeR |4 ctb | |
710 | 2 | |a ACI Learning (Firm), |e MitwirkendeR |4 ctb | |
710 | 2 | |a Packt Publishing, |e Verlag |4 pbl | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781835887660/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
935 | |c vide | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-102207569 |
---|---|
_version_ | 1821494933753692160 |
adam_text | |
any_adam_object | |
author2 | Lowrie, Daniel Goodwin, Sophie |
author2_role | ctb ctb |
author2_variant | d l dl s g sg |
author_corporate | ACI Learning (Firm) |
author_corporate_role | ctb |
author_facet | Lowrie, Daniel Goodwin, Sophie ACI Learning (Firm) |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)102207569 (DE-599)KEP102207569 (ORHE)9781835887660 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | [First edition]. |
format | Electronic Video |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02974ngm a22005772 4500</leader><controlfield tag="001">ZDB-30-ORH-102207569</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240404083424.0</controlfield><controlfield tag="006">m o | | </controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240404s2024 xx ||| |o o ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781835887660</subfield><subfield code="c">electronic video</subfield><subfield code="9">978-1-83588-766-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">183588766X</subfield><subfield code="c">electronic video</subfield><subfield code="9">1-83588-766-X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)102207569</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP102207569</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781835887660</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)102207569</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20240319</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Intro to IoT pentesting</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Birmingham, United Kingdom]</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 video file (9 hr., 35 min.))</subfield><subfield code="b">sound, color.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">zweidimensionales bewegtes Bild</subfield><subfield code="b">tdi</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from title details screen (O'Reilly, viewed March 19, 2024)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The course begins by introducing you to the world of IoT and its significance in today's tech-driven society, emphasizing the importance of security in this interconnected environment. It covers the spectrum of IoT targets and the necessity of robust security measures to protect them. The course focuses on practical skills, including the use of hardware components like multimeters, TTL to USB, and JTAGulators, as well as software tools such as terminal emulators, Binwalk, and QEMU. You will learn about firmware analysis, including acquisition, extraction, and emulation, alongside techniques for exploiting embedded operating systems, network services, and IoT web applications. The course wraps up by guiding you through hands-on practices for identifying hardware vulnerabilities, automating UART pin identification, and gaining device access, ensuring you have the knowledge to perform comprehensive pentests on IoT devices.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet of things</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Embedded Internet devices</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Tests d'intrusion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet des objets</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet intégré</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Instructional films</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Nonfiction films</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet videos</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Films de formation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Films autres que de fiction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Vidéos sur Internet</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lowrie, Daniel</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Goodwin, Sophie</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">ACI Learning (Firm),</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Packt Publishing,</subfield><subfield code="e">Verlag</subfield><subfield code="4">pbl</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781835887660/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="935" ind1=" " ind2=" "><subfield code="c">vide</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-102207569 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:22:15Z |
institution | BVB |
isbn | 9781835887660 183588766X |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 video file (9 hr., 35 min.)) sound, color. |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | Packt Publishing |
record_format | marc |
spelling | Intro to IoT pentesting [First edition]. [Birmingham, United Kingdom] Packt Publishing 2024 1 Online-Ressource (1 video file (9 hr., 35 min.)) sound, color. zweidimensionales bewegtes Bild tdi rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Online resource; title from title details screen (O'Reilly, viewed March 19, 2024) The course begins by introducing you to the world of IoT and its significance in today's tech-driven society, emphasizing the importance of security in this interconnected environment. It covers the spectrum of IoT targets and the necessity of robust security measures to protect them. The course focuses on practical skills, including the use of hardware components like multimeters, TTL to USB, and JTAGulators, as well as software tools such as terminal emulators, Binwalk, and QEMU. You will learn about firmware analysis, including acquisition, extraction, and emulation, alongside techniques for exploiting embedded operating systems, network services, and IoT web applications. The course wraps up by guiding you through hands-on practices for identifying hardware vulnerabilities, automating UART pin identification, and gaining device access, ensuring you have the knowledge to perform comprehensive pentests on IoT devices. Penetration testing (Computer security) Internet of things Embedded Internet devices Computer networks Security measures Tests d'intrusion Internet des objets Internet intégré Réseaux d'ordinateurs ; Sécurité ; Mesures Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet Lowrie, Daniel MitwirkendeR ctb Goodwin, Sophie MitwirkendeR ctb ACI Learning (Firm), MitwirkendeR ctb Packt Publishing, Verlag pbl |
spellingShingle | Intro to IoT pentesting Penetration testing (Computer security) Internet of things Embedded Internet devices Computer networks Security measures Tests d'intrusion Internet des objets Internet intégré Réseaux d'ordinateurs ; Sécurité ; Mesures Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet |
title | Intro to IoT pentesting |
title_auth | Intro to IoT pentesting |
title_exact_search | Intro to IoT pentesting |
title_full | Intro to IoT pentesting |
title_fullStr | Intro to IoT pentesting |
title_full_unstemmed | Intro to IoT pentesting |
title_short | Intro to IoT pentesting |
title_sort | intro to iot pentesting |
topic | Penetration testing (Computer security) Internet of things Embedded Internet devices Computer networks Security measures Tests d'intrusion Internet des objets Internet intégré Réseaux d'ordinateurs ; Sécurité ; Mesures Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet |
topic_facet | Penetration testing (Computer security) Internet of things Embedded Internet devices Computer networks Security measures Tests d'intrusion Internet des objets Internet intégré Réseaux d'ordinateurs ; Sécurité ; Mesures Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet |
work_keys_str_mv | AT lowriedaniel introtoiotpentesting AT goodwinsophie introtoiotpentesting AT acilearningfirm introtoiotpentesting AT packtpublishing introtoiotpentesting |