Abusing the internet of things : (Record no. 11292)

MARC details
000 -LEADER
fixed length control field 04725cam a22002777i 4500
CONTROL NUMBER
control field 19224242
DATE AND TIME OF LATEST TRANSACTION
control field 20190415101208.0
FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 160810s2015 caua 001 0 eng d
LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2016439350
INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9789352132171
SYSTEM CONTROL NUMBER
System control number (OCoLC)ocn907659097
CATALOGING SOURCE
Original cataloging agency BTCTA
Language of cataloging eng
Transcribing agency BTCTA
Description conventions rda
Modifying agency YDXCP
-- NLE
-- OCLCO
-- CDX
-- HQB
-- OCLCO
-- PUV
-- NYP
-- OCLCF
-- TXI
-- OCLCO
-- BDX
-- OCLCO
-- CDN
-- OCLCO
-- OCLCQ
-- UPM
-- DLC
AUTHENTICATION CODE
Authentication code lccopycat
LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number D5145 2015
DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
Item number DHA
MAIN ENTRY--PERSONAL NAME
Personal name Dhanjani, Nitesh,
Relator term author.
TITLE STATEMENT
Title Abusing the internet of things :
Remainder of title blackouts, freakouts, and stakeouts /
Statement of responsibility, etc Nitesh Dhanjani.
PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Mumbai :
Name of publisher, distributor, etc O'Reilly,
-- Shroff Publishers & Distributors,
Date of publication, distribution, etc 2018.
PHYSICAL DESCRIPTION
Extent xvii, 270 p. :
Other physical details ill. ;
Dimensions 24 cm
GENERAL NOTE
General note Includes index.
FORMATTED CONTENTS NOTE
Formatted contents note Machine generated contents note: Why hue? -- Controlling Lights via the Website Interface -- Information Leakage -- Drive-by Blackouts -- Weak Password Complexity and Password Leaks -- Controlling Lights Using the iOS App -- Stealing the Token from a Mobile Device -- Malware Can Cause Perpetual Blackouts -- Changing Lightbulb State -- If This Then That (IFTTT) -- Conclusion -- Hotel Door Locks and Magnetic Stripes -- The Onity Door Lock -- The Magnetic Stripe -- The Programming Port -- Security Issues -- Vendor Response -- The Case of Z-Wave-Enabled Door Locks -- Z-Wave Protocol and Implementation Analysis -- Exploiting Key-Exchange Vulnerability -- Bluetooth Low Energy and Unlocking via Mobile Apps -- Understanding Weaknesses in BLE and Using Packet-Capture Tools -- Kevo Mobile App Insecurities -- Conclusion -- The Foscam Incident -- Foscam Vulnerabilities Exposed by Researchers -- Using Shodan to Find Baby Monitors Exposed on the Internet -- Exploiting Default Credentials -- Exploiting Dynamic DNS -- The Foscam Saga Continues -- The Belkin WeMo Baby Monitor -- Bad Security by Design -- Malware Gone Wild -- Some Things Never Change: The WeMo Switch -- Conclusion -- SmartThings -- Hijacking Credentials -- Abusing the Physical Graph -- SmartThings SS L Certificate Validation Vulnerability -- Interoperability with Insecurity Leads to...Insecurity -- SmartThings and hue Lighting -- SmartThings and the WeMo Switch -- Conclusion -- The TOCTTOU Attack -- The Samsung LExxB65o Series -- The Exploit -- You Call That Encryption? -- Understanding XOR -- I call it Encraption -- Understanding and Exploiting the App World -- Decrypting Firmware -- Cursory Exploration of the Operating System -- Remotely Exploiting a Samsung Smart TV -- Inspecting Your Own Smart TV (and Other IoT Devices) -- Say Hello to the WiFi Pineapple Mark V -- Capturing credentials and stripping TLS -- Conclusion -- The Tire Pressure Monitoring System (TPMS) -- Reversing TPMS Communication -- Eavesdropping and Privacy Implications -- Spoofing Alerts -- Exploiting Wireless Connectivity -- Injecting CAN Data -- Bluetooth Vulnerabilities -- Vulnerabilities in Telematics -- Significant Attack Surface -- The Tesla Model S -- Locate and Steal a Tesla the Old-Fashioned Way -- Social Engineering Tesla Employees and the Quest for Location Privacy -- Handing Out Keys to Strangers -- Or Just Borrow Someone's Phone -- Additional Information and Potential Low-Hanging Fruit -- AutoPilot and the Autonomous Car -- Conclusion -- Introducing the cloudBit Starter Kit -- Setting Up the cloudBit -- Designing the SMS Doorbell -- Oops, We Forgot the Button! -- Security Evaluation -- WiFi Insecurity, Albeit Brief -- Sneaking in Command Execution -- One Token to Rule them All -- Beware of Hardware Debug Interfaces -- Abuse Cases in the Context of Threat Agents -- Nation-States, Including the NSA -- Terrorists -- Criminal Organizations -- Disgruntled or Nosy Employees -- Hacktivists -- Vandals -- Cyberbullies -- Predators -- Bug Bounty Programs -- Conclusion -- The Thingbots Have Arrived -- The Rise of the Drones -- Cross-Device Attacks -- Hearing Voices -- IoT Cloud Infrastructure Attacks -- Backdoors -- The Lurking Heartbleed -- Diluting the Medical Record -- The Data Tsunami -- Targeting Smart Cities -- Interspace Communication Will Be a Ripe Target -- The Dangers of Superintelligence -- Conclusion -- The Cost of a Free Beverage -- There's a Party at Ruby Skye -- Leveraging the BuzzWord -- The Board Meeting -- What Went Wrong? -- A Case of Anger, Denial, and Self-Destruction -- The Benefit of LifeThings -- Social Engineering Customer Support by Caller ID Spoofing -- The (In)Secure Token -- Total Ownership -- The Demise of LifeThings -- Conclusion.
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer crimes
General subdivision Prevention.
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Internet of things.
ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Source of acquisition Cost, normal purchase price Total Checkouts Full call number Barcode Date last seen Cost, replacement price Price effective from Koha item type
    Dewey Decimal Classification     Learning Resource Centre Learning Resource Centre 16/04/2019 20 499.50   005.8 DHA 13820 16/04/2019 675.00 16/04/2019 Books
    Dewey Decimal Classification     Learning Resource Centre Learning Resource Centre 16/04/2019 20 499.50   005.8 DHA 13819 16/04/2019 675.00 16/04/2019 Books
Powered by Koha & maintained by LRC, JK Lakshmipat University, Jaipur
Contact: [email protected]
Copyright © 2022 LRC, JK Lakshmipat University, Jaipur. All Rights Reserved.