000 | 05310cam a2200625Ii 4500 | ||
---|---|---|---|
001 | on1142524939 | ||
003 | OCoLC | ||
005 | 20220711203558.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 200307s2020 inu o 000 0 eng d | ||
040 |
_aEBLCP _beng _erda _epn _cEBLCP _dRECBK _dUKMGB _dOCLCO _dN$T _dUKAHL _dOCLCQ _dOCLCF _dYDXIT _dDG1 |
||
015 |
_aGBC013531 _2bnb |
||
016 | 7 |
_a019690857 _2Uk |
|
020 |
_a9781119491774 _q(electronic bk. : oBook) |
||
020 |
_a1119491770 _q(electronic bk. : oBook) |
||
020 |
_a9781119491736 _qelectronic book |
||
020 |
_a1119491738 _qelectronic book |
||
020 |
_a9781119491781 _qelectronic book |
||
020 |
_a1119491789 _qelectronic book |
||
020 |
_z9781119491804 _qpaperback |
||
029 | 1 |
_aUKMGB _b019690857 |
|
029 | 1 |
_aAU@ _b000067253991 |
|
035 | _a(OCoLC)1142524939 | ||
037 |
_a9781119491736 _bWiley |
||
050 | 4 |
_aTL152.8 _b.K65 2020 |
|
082 | 0 | 4 |
_a629.04/6 _223 |
049 | _aMAIN | ||
100 | 1 |
_aKnight, Alissa, _eauthor. _98969 |
|
245 | 1 | 0 |
_aHacking connected cars : _btactics, techniques, and procedures / _cAlissa Knight. |
264 | 1 |
_aIndianapolis, Indiana : _bJohn Wiley & Sons, Inc., _c[2020] |
|
300 | _a1 online resource (xxxiii, 238 pages) | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
505 | 8 | _aCover -- Title Page -- Copyright -- About the Author -- Acknowledgments -- Contents at a Glance -- Contents -- Foreword -- Foreword -- Introduction -- For Non-Automotive Experts -- Automotive Networking -- Target Audience -- How This Book Is Structured -- What's on the Website -- Summary -- Part I Tactics, Techniques, and Procedures -- Chapter 1 Pre-Engagement -- Penetration Testing Execution Standard -- Scope Definition -- Architecture -- Full Disclosure -- Release Cycles -- IP Addresses -- Source Code -- Wireless Networks -- Start and End Dates -- Hardware Unique Serial Numbers | |
505 | 8 | _aRules of Engagement -- Timeline -- Testing Location -- Work Breakdown Structure -- Documentation Collection and Review -- Example Documents -- Project Management -- Conception and Initiation -- Definition and Planning -- Launch or Execution -- Performance/Monitoring -- Project Close -- Lab Setup -- Required Hardware and Software -- Laptop Setup -- Rogue BTS Option 1: OsmocomBB -- Rogue BTS Option 2: BladeRF + YateBTS -- Setting Up Your WiFi Pineapple Tetra -- Summary -- Chapter 2 Intelligence Gathering -- Asset Register -- Reconnaissance -- Passive Reconnaissance -- Active Reconnaissance | |
520 | _aChapter 3 Threat Modeling -- STRIDE Model -- Threat Modeling Using STRIDE -- VAST -- PASTA -- Stage 1: Define the Business and Security Objectives -- Stage 2: Define the Technical Scope -- Stage 3: Decompose the Application -- Stage 4: Identify Threat Agents -- Stage 5: Identify the Vulnerabilities -- Stage 6: Enumerate the Exploits -- Stage 7: Perform Risk and Impact Analysis -- Summary -- Chapter 4 Vulnerability Analysis -- Passive and Active Analysis -- WiFi -- Bluetooth -- Summary -- Chapter 5 Exploitation -- Creating Your Rogue BTS -- Configuring NetworkinaPC | ||
505 | 8 | _aBringing Your Rogue BTS Online -- Hunting for the TCU -- When You Know the MSISDN of the TCU -- When You Know the IMSI of the TCU -- When You Don't Know the IMSI or MSISDN of the TCU -- Cryptanalysis -- Encryption Keys -- Impersonation Attacks -- Summary -- Chapter 6 Post Exploitation -- Persistent Access -- Creating a Reverse Shell -- Linux Systems -- Placing the Backdoor on the System -- Network Sniffing -- Infrastructure Analysis -- Examining the Network Interfaces -- Examining the ARP Cache -- Examining DNS -- Examining the Routing Table -- Identifying Services -- Fuzzing | |
505 | 8 | _aFilesystem Analysis -- Command-Line History -- Core Dump Files -- Debug Log Files -- Credentials and Certificates -- Over-the-Air Updates -- Summary -- Part II Risk Management -- Chapter 7 Risk Management -- Frameworks -- Establishing the Risk Management Program -- SAE J3061 -- ISO/SAE AWI 21434 -- HEAVENS -- Threat Modeling -- STRIDE -- PASTA -- TRIKE -- Summary -- Chapter 8 Risk-Assessment Frameworks -- HEAVENS -- Determining the Threat Level -- Determining the Impact Level -- Determining the Security Level -- EVITA -- Calculating Attack Potential -- Summary -- Chapter 9 PKI in Automotive | |
500 | _aVANET | ||
588 | _aDescription based on online resource; title from digital title page (viewed on June 09, 2020). | ||
590 |
_aJohn Wiley and Sons _bWiley Frontlist Obook All English 2020 |
||
650 | 0 |
_aAutomated vehicles. _94891 |
|
650 | 0 |
_aAutomated vehicles _xSecurity measures. _98970 |
|
650 | 0 |
_aPenetration testing (Computer security) _96998 |
|
650 | 7 |
_aCOMPUTERS _xSecurity _xCryptography & Encryption. _2bisacsh _98971 |
|
650 | 7 |
_aAutomated vehicles. _2fast _0(OCoLC)fst01909261 _94891 |
|
650 | 7 |
_aPenetration testing (Computer security) _2fast _0(OCoLC)fst01789566 _96998 |
|
655 | 4 |
_aElectronic books. _93294 |
|
776 | 0 | 8 |
_iPrint version: _aKnight, Alissa. _tHacking Connected Cars : Tactics, Techniques, and Procedures. _dNewark : John Wiley & Sons, Incorporated, ©2020 _z9781119491804 |
856 | 4 | 0 |
_uhttps://doi.org/10.1002/9781119491774 _zWiley Online Library |
942 | _cEBK | ||
994 |
_a92 _bDG1 |
||
999 |
_c69251 _d69251 |