Hacking connected cars : (Record no. 69251)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 05310cam a2200625Ii 4500 |
001 - CONTROL NUMBER | |
control field | on1142524939 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20220711203558.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 200307s2020 inu o 000 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781119491774 |
-- | (electronic bk. : oBook) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 1119491770 |
-- | (electronic bk. : oBook) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781119491736 |
-- | electronic book |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 1119491738 |
-- | electronic book |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781119491781 |
-- | electronic book |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 1119491789 |
-- | electronic book |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
-- | paperback |
029 1# - (OCLC) | |
OCLC library identifier | UKMGB |
System control number | 019690857 |
029 1# - (OCLC) | |
OCLC library identifier | AU@ |
System control number | 000067253991 |
037 ## - | |
-- | 9781119491736 |
-- | Wiley |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 629.04/6 |
100 1# - AUTHOR NAME | |
Author | Knight, Alissa, |
245 10 - TITLE STATEMENT | |
Title | Hacking connected cars : |
Sub Title | tactics, techniques, and procedures / |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | 1 online resource (xxxiii, 238 pages) |
505 8# - FORMATTED CONTENTS NOTE | |
Remark 2 | Cover -- Title Page -- Copyright -- About the Author -- Acknowledgments -- Contents at a Glance -- Contents -- Foreword -- Foreword -- Introduction -- For Non-Automotive Experts -- Automotive Networking -- Target Audience -- How This Book Is Structured -- What's on the Website -- Summary -- Part I Tactics, Techniques, and Procedures -- Chapter 1 Pre-Engagement -- Penetration Testing Execution Standard -- Scope Definition -- Architecture -- Full Disclosure -- Release Cycles -- IP Addresses -- Source Code -- Wireless Networks -- Start and End Dates -- Hardware Unique Serial Numbers |
505 8# - FORMATTED CONTENTS NOTE | |
Remark 2 | Rules of Engagement -- Timeline -- Testing Location -- Work Breakdown Structure -- Documentation Collection and Review -- Example Documents -- Project Management -- Conception and Initiation -- Definition and Planning -- Launch or Execution -- Performance/Monitoring -- Project Close -- Lab Setup -- Required Hardware and Software -- Laptop Setup -- Rogue BTS Option 1: OsmocomBB -- Rogue BTS Option 2: BladeRF + YateBTS -- Setting Up Your WiFi Pineapple Tetra -- Summary -- Chapter 2 Intelligence Gathering -- Asset Register -- Reconnaissance -- Passive Reconnaissance -- Active Reconnaissance |
520 ## - SUMMARY, ETC. | |
Summary, etc | Chapter 3 Threat Modeling -- STRIDE Model -- Threat Modeling Using STRIDE -- VAST -- PASTA -- Stage 1: Define the Business and Security Objectives -- Stage 2: Define the Technical Scope -- Stage 3: Decompose the Application -- Stage 4: Identify Threat Agents -- Stage 5: Identify the Vulnerabilities -- Stage 6: Enumerate the Exploits -- Stage 7: Perform Risk and Impact Analysis -- Summary -- Chapter 4 Vulnerability Analysis -- Passive and Active Analysis -- WiFi -- Bluetooth -- Summary -- Chapter 5 Exploitation -- Creating Your Rogue BTS -- Configuring NetworkinaPC |
505 8# - FORMATTED CONTENTS NOTE | |
Remark 2 | Bringing Your Rogue BTS Online -- Hunting for the TCU -- When You Know the MSISDN of the TCU -- When You Know the IMSI of the TCU -- When You Don't Know the IMSI or MSISDN of the TCU -- Cryptanalysis -- Encryption Keys -- Impersonation Attacks -- Summary -- Chapter 6 Post Exploitation -- Persistent Access -- Creating a Reverse Shell -- Linux Systems -- Placing the Backdoor on the System -- Network Sniffing -- Infrastructure Analysis -- Examining the Network Interfaces -- Examining the ARP Cache -- Examining DNS -- Examining the Routing Table -- Identifying Services -- Fuzzing |
505 8# - FORMATTED CONTENTS NOTE | |
Remark 2 | Filesystem Analysis -- Command-Line History -- Core Dump Files -- Debug Log Files -- Credentials and Certificates -- Over-the-Air Updates -- Summary -- Part II Risk Management -- Chapter 7 Risk Management -- Frameworks -- Establishing the Risk Management Program -- SAE J3061 -- ISO/SAE AWI 21434 -- HEAVENS -- Threat Modeling -- STRIDE -- PASTA -- TRIKE -- Summary -- Chapter 8 Risk-Assessment Frameworks -- HEAVENS -- Determining the Threat Level -- Determining the Impact Level -- Determining the Security Level -- EVITA -- Calculating Attack Potential -- Summary -- Chapter 9 PKI in Automotive |
500 ## - GENERAL NOTE | |
Remark 1 | VANET |
590 ## - LOCAL NOTE (RLIN) | |
Local note | John Wiley and Sons |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Security measures. |
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Security |
-- | Cryptography & Encryption. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://doi.org/10.1002/9781119491774 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Indianapolis, Indiana : |
-- | John Wiley & Sons, Inc., |
-- | [2020] |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
588 ## - | |
-- | Description based on online resource; title from digital title page (viewed on June 09, 2020). |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Automated vehicles. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Automated vehicles |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Penetration testing (Computer security) |
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | COMPUTERS |
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Automated vehicles. |
-- | (OCoLC)fst01909261 |
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Penetration testing (Computer security) |
-- | (OCoLC)fst01789566 |
994 ## - | |
-- | 92 |
-- | DG1 |
No items available.