000 05997cam a2200745 i 4500
001 on1142524939
003 OCoLC
005 20240523125542.0
006 m o d
007 cr cnu---unuuu
008 200307s2020 inu o 000 0 eng d
040 _aEBLCP
_beng
_erda
_epn
_cEBLCP
_dRECBK
_dUKMGB
_dOCLCO
_dN$T
_dUKAHL
_dOCLCQ
_dOCLCF
_dYDXIT
_dDG1
_dOCLCQ
_dOCLCO
_dIEEEE
_dTEFOD
_dK6U
_dOCLCQ
_dUPM
_dOCLCQ
_dOCLCO
_dOCLCL
015 _aGBC013531
_2bnb
016 7 _a019690857
_2Uk
020 _a9781119491774
_q(electronic bk. ;
_qoBook)
020 _a1119491770
_q(electronic bk. ;
_qoBook)
020 _a9781119491736
_q(electronic book)
020 _a1119491738
_q(electronic book)
020 _a9781119491781
_q(electronic book)
020 _a1119491789
_q(electronic book)
020 _z9781119491804
_q(paperback)
024 7 _a10.1002/9781119491774
_2doi
029 1 _aAU@
_b000067253991
029 1 _aUKMGB
_b019690857
035 _a(OCoLC)1142524939
037 _a9781119491736
_bWiley
037 _a9820810
_bIEEE
037 _aB847C5AB-35DB-47E6-A3FC-F92841002A03
_bOverDrive, Inc.
_nhttp://www.overdrive.com
050 4 _aTL152.8
_b.K65 2020
082 0 4 _a629.04/6
_223
049 _aMAIN
100 1 _aKnight, Alissa,
_eauthor.
245 1 0 _aHacking connected cars :
_btactics, techniques, and procedures /
_cAlissa Knight.
264 1 _aIndianapolis, Indiana :
_bJohn Wiley & Sons, Inc.,
_c[2020]
300 _a1 online resource (xxxiii, 238 pages)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
505 8 _aCover -- Title Page -- Copyright -- About the Author -- Acknowledgments -- Contents at a Glance -- Contents -- Foreword -- Foreword -- Introduction -- For Non-Automotive Experts -- Automotive Networking -- Target Audience -- How This Book Is Structured -- What's on the Website -- Summary -- Part I Tactics, Techniques, and Procedures -- Chapter 1 Pre-Engagement -- Penetration Testing Execution Standard -- Scope Definition -- Architecture -- Full Disclosure -- Release Cycles -- IP Addresses -- Source Code -- Wireless Networks -- Start and End Dates -- Hardware Unique Serial Numbers
505 8 _aRules of Engagement -- Timeline -- Testing Location -- Work Breakdown Structure -- Documentation Collection and Review -- Example Documents -- Project Management -- Conception and Initiation -- Definition and Planning -- Launch or Execution -- Performance/Monitoring -- Project Close -- Lab Setup -- Required Hardware and Software -- Laptop Setup -- Rogue BTS Option 1: OsmocomBB -- Rogue BTS Option 2: BladeRF + YateBTS -- Setting Up Your WiFi Pineapple Tetra -- Summary -- Chapter 2 Intelligence Gathering -- Asset Register -- Reconnaissance -- Passive Reconnaissance -- Active Reconnaissance
520 _aChapter 3 Threat Modeling -- STRIDE Model -- Threat Modeling Using STRIDE -- VAST -- PASTA -- Stage 1: Define the Business and Security Objectives -- Stage 2: Define the Technical Scope -- Stage 3: Decompose the Application -- Stage 4: Identify Threat Agents -- Stage 5: Identify the Vulnerabilities -- Stage 6: Enumerate the Exploits -- Stage 7: Perform Risk and Impact Analysis -- Summary -- Chapter 4 Vulnerability Analysis -- Passive and Active Analysis -- WiFi -- Bluetooth -- Summary -- Chapter 5 Exploitation -- Creating Your Rogue BTS -- Configuring NetworkinaPC
505 8 _aBringing Your Rogue BTS Online -- Hunting for the TCU -- When You Know the MSISDN of the TCU -- When You Know the IMSI of the TCU -- When You Don't Know the IMSI or MSISDN of the TCU -- Cryptanalysis -- Encryption Keys -- Impersonation Attacks -- Summary -- Chapter 6 Post Exploitation -- Persistent Access -- Creating a Reverse Shell -- Linux Systems -- Placing the Backdoor on the System -- Network Sniffing -- Infrastructure Analysis -- Examining the Network Interfaces -- Examining the ARP Cache -- Examining DNS -- Examining the Routing Table -- Identifying Services -- Fuzzing
505 8 _aFilesystem Analysis -- Command-Line History -- Core Dump Files -- Debug Log Files -- Credentials and Certificates -- Over-the-Air Updates -- Summary -- Part II Risk Management -- Chapter 7 Risk Management -- Frameworks -- Establishing the Risk Management Program -- SAE J3061 -- ISO/SAE AWI 21434 -- HEAVENS -- Threat Modeling -- STRIDE -- PASTA -- TRIKE -- Summary -- Chapter 8 Risk-Assessment Frameworks -- HEAVENS -- Determining the Threat Level -- Determining the Impact Level -- Determining the Security Level -- EVITA -- Calculating Attack Potential -- Summary -- Chapter 9 PKI in Automotive
500 _aVANET
588 0 _aOnline resource; title from digital title page (viewed on June 09, 2020).
590 _aJohn Wiley and Sons
_bWiley Online Library: Complete oBooks
650 0 _aAutomated vehicles.
650 0 _aAutomated vehicles
_xSecurity measures.
650 0 _aPenetration testing (Computer security)
650 6 _aV�ehicules autonomes.
650 6 _aV�ehicules autonomes
_xS�ecurit�e
_xMesures.
650 6 _aTests d'intrusion.
650 7 _aCOMPUTERS
_xSecurity
_xCryptography & Encryption.
_2bisacsh
650 7 _aAutomated vehicles
_2fast
650 7 _aPenetration testing (Computer security)
_2fast
758 _ihas work:
_aHacking connected cars (Text)
_1https://id.oclc.org/worldcat/entity/E39PCGp63Dv9h6qby7j8tFFvpd
_4https://id.oclc.org/worldcat/ontology/hasWork
776 0 8 _iPrint version:
_aKnight, Alissa.
_tHacking Connected Cars : Tactics, Techniques, and Procedures.
_dNewark : John Wiley & Sons, Incorporated, �2020
_z9781119491804
856 4 0 _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781119491774
938 _aAskews and Holts Library Services
_bASKH
_nAH33784299
938 _aAskews and Holts Library Services
_bASKH
_nAH33784300
938 _aProQuest Ebook Central
_bEBLB
_nEBL6119409
938 _aEBSCOhost
_bEBSC
_n2378823
938 _aRecorded Books, LLC
_bRECE
_nrbeEB00812470
994 _a92
_bINLUM
999 _c12688
_d12688