Practical Hardware Pentesting by Jean-Georges Valle
Author:Jean-Georges Valle [Jean-Georges Valle]
Language: eng
Format: epub, mobi
Publisher: Packt Publishing
Published: 2021-03-31T16:00:00+00:00
Other Wi-Fi attacks
Some other attacks exists, but they usually target the Wi-Fi infrastructure, not the device. An excellent introduction book is Vivek Ramachandran's Wireless Penetration Testing Beginner's Guide.
Networking in embedded systems using Bluetooth
Many devices have Bluetooth connectivity available, from phones to headsets to input devices. Let's see what we can look at with this interface.
Bluetooth basics
Bluetooth is a radio protocol that operates between 2.4 and 2.48 GHz. It is not easy to sniff because it is transmitted by hopping on multiple frequencies pseudorandomly (depending on the address of the master device) and has several variants:
BT/1.x (2000), also known as the ancestor: This has not been deployed in new products for a long time. It had privacy problems since it was sending a unique ID over the air.
BT/2.x (2004), also known as classic Bluetooth: This has been around for years and is "kind of" kept in the hands of the big players of the market. This is the doing of Apple since, to be able to be used by iPhones, you have to send an entry ticket to them (called the MFi). It is faster than BT1 and introduces a better pairing system and effort in terms of energy consumption.
BT/3.x (2009), also known as "high speed" (HS): This comes with some (optional) hi-speed transfers over Wi-Fi and introduces connection less low latency data transfer and some more effort in terms of consumption.
BTLE/4.x (2010), also known as "Low Energy" or "smart": This actually adds a Bluetooth Low Energy (BLE) on top of classic and HS, with a very large reduction in terms of power consumption for the BLE part.
BT5.x (2018): This is the latest version, but it is only supported by some flagship phones and a few devices at the moment. Adoption will probably be larger in the future.
Download
Practical Hardware Pentesting by Jean-Georges Valle.mobi
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7808)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6805)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6801)
Running Windows Containers on AWS by Marcio Morales(6321)
Kotlin in Action by Dmitry Jemerov(5089)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5048)
Combating Crime on the Dark Web by Nearchos Nearchou(4622)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4573)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4437)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4313)
The Age of Surveillance Capitalism by Shoshana Zuboff(3977)
Python for Security and Networking - Third Edition by José Manuel Ortega(3875)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3533)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3528)
Learn Wireshark by Lisa Bock(3491)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3353)
Blockchain Basics by Daniel Drescher(3322)
