Abusing the internet of things : (Record no. 11292)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 04725cam a22002777i 4500 |
CONTROL NUMBER | |
control field | 19224242 |
DATE AND TIME OF LATEST TRANSACTION | |
control field | 20190415101208.0 |
FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 160810s2015 caua 001 0 eng d |
LIBRARY OF CONGRESS CONTROL NUMBER | |
LC control number | 2016439350 |
INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9789352132171 |
SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)ocn907659097 |
CATALOGING SOURCE | |
Original cataloging agency | BTCTA |
Language of cataloging | eng |
Transcribing agency | BTCTA |
Description conventions | rda |
Modifying agency | YDXCP |
-- | NLE |
-- | OCLCO |
-- | CDX |
-- | HQB |
-- | OCLCO |
-- | PUV |
-- | NYP |
-- | OCLCF |
-- | TXI |
-- | OCLCO |
-- | BDX |
-- | OCLCO |
-- | CDN |
-- | OCLCO |
-- | OCLCQ |
-- | UPM |
-- | DLC |
AUTHENTICATION CODE | |
Authentication code | lccopycat |
LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.9.A25 |
Item number | D5145 2015 |
DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Edition number | 23 |
Item number | DHA |
MAIN ENTRY--PERSONAL NAME | |
Personal name | Dhanjani, Nitesh, |
Relator term | author. |
TITLE STATEMENT | |
Title | Abusing the internet of things : |
Remainder of title | blackouts, freakouts, and stakeouts / |
Statement of responsibility, etc | Nitesh Dhanjani. |
PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc | Mumbai : |
Name of publisher, distributor, etc | O'Reilly, |
-- | Shroff Publishers & Distributors, |
Date of publication, distribution, etc | 2018. |
PHYSICAL DESCRIPTION | |
Extent | xvii, 270 p. : |
Other physical details | ill. ; |
Dimensions | 24 cm |
GENERAL NOTE | |
General note | Includes index. |
FORMATTED CONTENTS NOTE | |
Formatted contents note | Machine generated contents note: Why hue? -- Controlling Lights via the Website Interface -- Information Leakage -- Drive-by Blackouts -- Weak Password Complexity and Password Leaks -- Controlling Lights Using the iOS App -- Stealing the Token from a Mobile Device -- Malware Can Cause Perpetual Blackouts -- Changing Lightbulb State -- If This Then That (IFTTT) -- Conclusion -- Hotel Door Locks and Magnetic Stripes -- The Onity Door Lock -- The Magnetic Stripe -- The Programming Port -- Security Issues -- Vendor Response -- The Case of Z-Wave-Enabled Door Locks -- Z-Wave Protocol and Implementation Analysis -- Exploiting Key-Exchange Vulnerability -- Bluetooth Low Energy and Unlocking via Mobile Apps -- Understanding Weaknesses in BLE and Using Packet-Capture Tools -- Kevo Mobile App Insecurities -- Conclusion -- The Foscam Incident -- Foscam Vulnerabilities Exposed by Researchers -- Using Shodan to Find Baby Monitors Exposed on the Internet -- Exploiting Default Credentials -- Exploiting Dynamic DNS -- The Foscam Saga Continues -- The Belkin WeMo Baby Monitor -- Bad Security by Design -- Malware Gone Wild -- Some Things Never Change: The WeMo Switch -- Conclusion -- SmartThings -- Hijacking Credentials -- Abusing the Physical Graph -- SmartThings SS L Certificate Validation Vulnerability -- Interoperability with Insecurity Leads to...Insecurity -- SmartThings and hue Lighting -- SmartThings and the WeMo Switch -- Conclusion -- The TOCTTOU Attack -- The Samsung LExxB65o Series -- The Exploit -- You Call That Encryption? -- Understanding XOR -- I call it Encraption -- Understanding and Exploiting the App World -- Decrypting Firmware -- Cursory Exploration of the Operating System -- Remotely Exploiting a Samsung Smart TV -- Inspecting Your Own Smart TV (and Other IoT Devices) -- Say Hello to the WiFi Pineapple Mark V -- Capturing credentials and stripping TLS -- Conclusion -- The Tire Pressure Monitoring System (TPMS) -- Reversing TPMS Communication -- Eavesdropping and Privacy Implications -- Spoofing Alerts -- Exploiting Wireless Connectivity -- Injecting CAN Data -- Bluetooth Vulnerabilities -- Vulnerabilities in Telematics -- Significant Attack Surface -- The Tesla Model S -- Locate and Steal a Tesla the Old-Fashioned Way -- Social Engineering Tesla Employees and the Quest for Location Privacy -- Handing Out Keys to Strangers -- Or Just Borrow Someone's Phone -- Additional Information and Potential Low-Hanging Fruit -- AutoPilot and the Autonomous Car -- Conclusion -- Introducing the cloudBit Starter Kit -- Setting Up the cloudBit -- Designing the SMS Doorbell -- Oops, We Forgot the Button! -- Security Evaluation -- WiFi Insecurity, Albeit Brief -- Sneaking in Command Execution -- One Token to Rule them All -- Beware of Hardware Debug Interfaces -- Abuse Cases in the Context of Threat Agents -- Nation-States, Including the NSA -- Terrorists -- Criminal Organizations -- Disgruntled or Nosy Employees -- Hacktivists -- Vandals -- Cyberbullies -- Predators -- Bug Bounty Programs -- Conclusion -- The Thingbots Have Arrived -- The Rise of the Drones -- Cross-Device Attacks -- Hearing Voices -- IoT Cloud Infrastructure Attacks -- Backdoors -- The Lurking Heartbleed -- Diluting the Medical Record -- The Data Tsunami -- Targeting Smart Cities -- Interspace Communication Will Be a Ripe Target -- The Dangers of Superintelligence -- Conclusion -- The Cost of a Free Beverage -- There's a Party at Ruby Skye -- Leveraging the BuzzWord -- The Board Meeting -- What Went Wrong? -- A Case of Anger, Denial, and Self-Destruction -- The Benefit of LifeThings -- Social Engineering Customer Support by Caller ID Spoofing -- The (In)Secure Token -- Total Ownership -- The Demise of LifeThings -- Conclusion. |
SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer networks |
General subdivision | Security measures. |
SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer crimes |
General subdivision | Prevention. |
SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Internet of things. |
ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Item type | Books |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Date acquired | Source of acquisition | Cost, normal purchase price | Total Checkouts | Full call number | Barcode | Date last seen | Cost, replacement price | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | Learning Resource Centre | Learning Resource Centre | 16/04/2019 | 20 | 499.50 | 005.8 DHA | 13820 | 16/04/2019 | 675.00 | 16/04/2019 | Books | |||||
Dewey Decimal Classification | Learning Resource Centre | Learning Resource Centre | 16/04/2019 | 20 | 499.50 | 005.8 DHA | 13819 | 16/04/2019 | 675.00 | 16/04/2019 | Books |