
- 637 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
About this book
Defend your system against hardware-based security breaches by thinking like a hacker! With this guide, master the tools you need to develop preventative IT security tests and measures. Learn how to perform penetration tests step by step, and then evaluate and correct vulnerabilities. Get up to speed on awareness training methods and hacking tools for protecting your hardware. From USB killers and keyloggers to manipulated Wi-Fi connections and beyond, understand real-world attack scenarios and—most importantly—how to prevent them!
In this book, you'll learn about:
a. Penetration Testing and Red Teaming
Where are the vulnerabilities in your infrastructure? How does an attacker see your environment, and what tools do they use? You'll discover that the best attack tools often look simple, yet still cause significant damage.
b. Security Awareness Training
The best virus scanners and firewalls are useless if your team doesn't take the necessary precautions. Learn how to conduct effective awareness training to educate your colleagues about the dangers posed by inconspicuous hardware.
c. Hacking Hardware
Rubber Ducky, USBKill, HackRF One, Flipper Zero—see common attack vectors and hacking hardware in action. Become a master at identifying threats, and get equipped with appropriate countermeasures.
Highlights include:
1) Hardware pentesting
2) Red teaming
3) Training security awareness
4) Spy gadgets
5) USB attacks
6) Wi-Fi manipulation
7) Spying on wired networks
8) Wireless connection disruption
9) RFID tag manipulation
10) Bluetooth tracking
11) Universal hacking hardware
Trusted by 375,005 students
Access to over 1 million titles for a fair monthly price.
Study more efficiently using our study tools.
Information
Table of contents
- Notes on Usage
- Foreword
- 1 Introduction
- Part I Performing IT Security Penetration Tests
- 2 IT Security Penetration Tests
- 3 Red Teaming as a Method
- 4 Test Scenarios in Practice
- Part II Awareness Training with Pentest Hardware
- 5 Security Awareness Training
- 6 Successful Training Methods
- 7 Training Scenarios in Practice
- Part III Hacking and Pentest Hardware Tools
- 8 Pentest Hardware
- 9 Secret Surveillance Using Spy Gadgets
- 10 Recording Keystrokes and Monitoring Signals Using Loggers
- 11 Attacks via the USB Interface
- 12 Manipulating Wireless Connections
- 13 Duplicating and Manipulating RFID Tags
- 14 Tracking and Manipulating Bluetooth Communication
- 15 Manipulating and Interrupting Wi-Fi Connections
- 16 Tapping Wired LANs
- 17 Universal Hacking Hardware
- 18 Discontinued Hardware and Previous Versions
- 19 Analyzing Detected Hardware
- 20 Instructions and Knowledge Base
- The Author
- Index
- Service Pages
- Legal Notes
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app