Dekorationsartikel gehören nicht zum Leistungsumfang.
Sprache:
Englisch
39,65 €*
Versandkostenfrei per Post / DHL
auf Lager, Lieferzeit 1-2 Werktage
Kategorien:
Beschreibung
Modern cars are more computerized than ever. Infotainment and navigation systems, Wi-Fi, automatic software updates, and other innovations aim to make driving more convenient. But vehicle technologies haven't kept pace with today's more hostile security environment, leaving millions vulnerable to attack.
The Car Hacker's Handbook will give you a deeper understanding of the computer systems and embedded software in modern vehicles. It begins by examining vulnerabilities and providing detailed explanations of communications over the CAN bus and between devices and systems.
Then, once you have an understanding of a vehicle's communication network, you'll learn how to intercept data and perform specific hacks to track vehicles, unlock doors, glitch engines, flood communication, and more. With a focus on low-cost, open source hacking tools such as Metasploit, Wireshark, Kayak, can-utils, and ChipWhisperer, The Car Hacker's Handbook will show you how to:
-Build an accurate threat model for your vehicle
-Reverse engineer the CAN bus to fake engine signals
-Exploit vulnerabilities in diagnostic and data-logging systems
-Hack the ECU and other firmware and embedded systems
-Feed exploits through infotainment and vehicle-to-vehicle communication systems
-Override factory settings with performance-tuning techniques
-Build physical and virtual test benches to try out exploits safely
If you're curious about automotive security and have the urge to hack a two-ton computer, make The Car Hacker's Handbook your first stop.
The Car Hacker's Handbook will give you a deeper understanding of the computer systems and embedded software in modern vehicles. It begins by examining vulnerabilities and providing detailed explanations of communications over the CAN bus and between devices and systems.
Then, once you have an understanding of a vehicle's communication network, you'll learn how to intercept data and perform specific hacks to track vehicles, unlock doors, glitch engines, flood communication, and more. With a focus on low-cost, open source hacking tools such as Metasploit, Wireshark, Kayak, can-utils, and ChipWhisperer, The Car Hacker's Handbook will show you how to:
-Build an accurate threat model for your vehicle
-Reverse engineer the CAN bus to fake engine signals
-Exploit vulnerabilities in diagnostic and data-logging systems
-Hack the ECU and other firmware and embedded systems
-Feed exploits through infotainment and vehicle-to-vehicle communication systems
-Override factory settings with performance-tuning techniques
-Build physical and virtual test benches to try out exploits safely
If you're curious about automotive security and have the urge to hack a two-ton computer, make The Car Hacker's Handbook your first stop.
Modern cars are more computerized than ever. Infotainment and navigation systems, Wi-Fi, automatic software updates, and other innovations aim to make driving more convenient. But vehicle technologies haven't kept pace with today's more hostile security environment, leaving millions vulnerable to attack.
The Car Hacker's Handbook will give you a deeper understanding of the computer systems and embedded software in modern vehicles. It begins by examining vulnerabilities and providing detailed explanations of communications over the CAN bus and between devices and systems.
Then, once you have an understanding of a vehicle's communication network, you'll learn how to intercept data and perform specific hacks to track vehicles, unlock doors, glitch engines, flood communication, and more. With a focus on low-cost, open source hacking tools such as Metasploit, Wireshark, Kayak, can-utils, and ChipWhisperer, The Car Hacker's Handbook will show you how to:
-Build an accurate threat model for your vehicle
-Reverse engineer the CAN bus to fake engine signals
-Exploit vulnerabilities in diagnostic and data-logging systems
-Hack the ECU and other firmware and embedded systems
-Feed exploits through infotainment and vehicle-to-vehicle communication systems
-Override factory settings with performance-tuning techniques
-Build physical and virtual test benches to try out exploits safely
If you're curious about automotive security and have the urge to hack a two-ton computer, make The Car Hacker's Handbook your first stop.
The Car Hacker's Handbook will give you a deeper understanding of the computer systems and embedded software in modern vehicles. It begins by examining vulnerabilities and providing detailed explanations of communications over the CAN bus and between devices and systems.
Then, once you have an understanding of a vehicle's communication network, you'll learn how to intercept data and perform specific hacks to track vehicles, unlock doors, glitch engines, flood communication, and more. With a focus on low-cost, open source hacking tools such as Metasploit, Wireshark, Kayak, can-utils, and ChipWhisperer, The Car Hacker's Handbook will show you how to:
-Build an accurate threat model for your vehicle
-Reverse engineer the CAN bus to fake engine signals
-Exploit vulnerabilities in diagnostic and data-logging systems
-Hack the ECU and other firmware and embedded systems
-Feed exploits through infotainment and vehicle-to-vehicle communication systems
-Override factory settings with performance-tuning techniques
-Build physical and virtual test benches to try out exploits safely
If you're curious about automotive security and have the urge to hack a two-ton computer, make The Car Hacker's Handbook your first stop.
Über den Autor
Craig Smith runs Theia Labs, a research firm that focuses on security auditing and building hardware and software prototypes. He has worked for several auto manufacturers and provided them with his public research. He is also a founder of the Hive13 hackerspace and [...]. Craig is a frequent speaker on car hacking and has run workshops at RSA, DEF CON, and other major security conferences
Inhaltsverzeichnis
Introduction
Chapter 1: Understanding Threat Models
Chapter 2: Bus Protocols
Chapter 3: Vehicle Communication with SocketCAN
Chapter 4: Diagnostics and Logging
Chapter 5: Reverse Engineering the CAN Bus
Chapter 6: ECU Hacking
Chapter 7: Building and Using ECU Test Benches
Chapter 8: Attacking ECUs and Other Embedded Systems
Chapter 9: In-Vehicle Infotainment Systems
Chapter 10: Vehicle-to-Vehicle Communication
Chapter 11: Weaponizing CAN Findings
Chapter 12: Attacking Wireless Systems with SDR
Chapter 13: Performance Tuning
Appendix A: Tools of the Trade
Appendix B: Diagnostic Code Modes and PIDs
Appendix C: Creating Your Own Open Garage
Chapter 1: Understanding Threat Models
Chapter 2: Bus Protocols
Chapter 3: Vehicle Communication with SocketCAN
Chapter 4: Diagnostics and Logging
Chapter 5: Reverse Engineering the CAN Bus
Chapter 6: ECU Hacking
Chapter 7: Building and Using ECU Test Benches
Chapter 8: Attacking ECUs and Other Embedded Systems
Chapter 9: In-Vehicle Infotainment Systems
Chapter 10: Vehicle-to-Vehicle Communication
Chapter 11: Weaponizing CAN Findings
Chapter 12: Attacking Wireless Systems with SDR
Chapter 13: Performance Tuning
Appendix A: Tools of the Trade
Appendix B: Diagnostic Code Modes and PIDs
Appendix C: Creating Your Own Open Garage
Details
Erscheinungsjahr: | 2016 |
---|---|
Fachbereich: | Datenkommunikation, Netze & Mailboxen |
Genre: | Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
Inhalt: |
XXVI
278 S. |
ISBN-13: | 9781593277031 |
ISBN-10: | 1593277032 |
Sprache: | Englisch |
Einband: | Kartoniert / Broschiert |
Autor: | Smith, Craig |
Hersteller: |
No Starch Press
Random House LLC US |
Abbildungen: | illustrations |
Maße: | 233 x 177 x 22 mm |
Von/Mit: | Craig Smith |
Erscheinungsdatum: | 24.10.2016 |
Gewicht: | 0,588 kg |
Über den Autor
Craig Smith runs Theia Labs, a research firm that focuses on security auditing and building hardware and software prototypes. He has worked for several auto manufacturers and provided them with his public research. He is also a founder of the Hive13 hackerspace and [...]. Craig is a frequent speaker on car hacking and has run workshops at RSA, DEF CON, and other major security conferences
Inhaltsverzeichnis
Introduction
Chapter 1: Understanding Threat Models
Chapter 2: Bus Protocols
Chapter 3: Vehicle Communication with SocketCAN
Chapter 4: Diagnostics and Logging
Chapter 5: Reverse Engineering the CAN Bus
Chapter 6: ECU Hacking
Chapter 7: Building and Using ECU Test Benches
Chapter 8: Attacking ECUs and Other Embedded Systems
Chapter 9: In-Vehicle Infotainment Systems
Chapter 10: Vehicle-to-Vehicle Communication
Chapter 11: Weaponizing CAN Findings
Chapter 12: Attacking Wireless Systems with SDR
Chapter 13: Performance Tuning
Appendix A: Tools of the Trade
Appendix B: Diagnostic Code Modes and PIDs
Appendix C: Creating Your Own Open Garage
Chapter 1: Understanding Threat Models
Chapter 2: Bus Protocols
Chapter 3: Vehicle Communication with SocketCAN
Chapter 4: Diagnostics and Logging
Chapter 5: Reverse Engineering the CAN Bus
Chapter 6: ECU Hacking
Chapter 7: Building and Using ECU Test Benches
Chapter 8: Attacking ECUs and Other Embedded Systems
Chapter 9: In-Vehicle Infotainment Systems
Chapter 10: Vehicle-to-Vehicle Communication
Chapter 11: Weaponizing CAN Findings
Chapter 12: Attacking Wireless Systems with SDR
Chapter 13: Performance Tuning
Appendix A: Tools of the Trade
Appendix B: Diagnostic Code Modes and PIDs
Appendix C: Creating Your Own Open Garage
Details
Erscheinungsjahr: | 2016 |
---|---|
Fachbereich: | Datenkommunikation, Netze & Mailboxen |
Genre: | Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
Inhalt: |
XXVI
278 S. |
ISBN-13: | 9781593277031 |
ISBN-10: | 1593277032 |
Sprache: | Englisch |
Einband: | Kartoniert / Broschiert |
Autor: | Smith, Craig |
Hersteller: |
No Starch Press
Random House LLC US |
Abbildungen: | illustrations |
Maße: | 233 x 177 x 22 mm |
Von/Mit: | Craig Smith |
Erscheinungsdatum: | 24.10.2016 |
Gewicht: | 0,588 kg |
Warnhinweis