Ebook404 pages7 hours
Black Hat Physical Device Security: Exploiting Hardware and Software: Exploiting Hardware and Software
By Drew Miller
Rating: 4 out of 5 stars
4/5
()
About this ebook
Black Hat, Inc. is the premier, worldwide provider of security training, consulting, and conferences. In this book the Black Hat experts show readers the types of attacks that can be done to physical devices such as motion detectors, video monitoring and closed circuit systems, authentication systems, thumbprint and voice print devices, retina scans, and more.
The Black Hat Briefings held every year in Las Vegas, Washington DC, Amsterdam, and Singapore continually expose the greatest threats to cyber security and provide IT mind leaders with ground breaking defensive techniques. There are no books that show security and networking professionals how to protect physical security devices. This unique book provides step-by-step instructions for assessing the vulnerability of a security device such as a retina scanner, seeing how it might be compromised, and taking protective measures. The book covers the actual device as well as the software that runs it. By way of example, a thumbprint scanner that allows the thumbprint to remain on the glass from the last person could be bypassed by pressing a "gummy bear" piece of candy against the glass so that the scan works against the last thumbprint that was used on the device. This is a simple example of an attack against a physical authentication system.
* First book by world-renowned Black Hat, Inc. security consultants and trainers
* First book that details methods for attacking and defending physical security devices
* Black Hat, Inc. is the premier, worldwide provider of security training, consulting, and conferences
The Black Hat Briefings held every year in Las Vegas, Washington DC, Amsterdam, and Singapore continually expose the greatest threats to cyber security and provide IT mind leaders with ground breaking defensive techniques. There are no books that show security and networking professionals how to protect physical security devices. This unique book provides step-by-step instructions for assessing the vulnerability of a security device such as a retina scanner, seeing how it might be compromised, and taking protective measures. The book covers the actual device as well as the software that runs it. By way of example, a thumbprint scanner that allows the thumbprint to remain on the glass from the last person could be bypassed by pressing a "gummy bear" piece of candy against the glass so that the scan works against the last thumbprint that was used on the device. This is a simple example of an attack against a physical authentication system.
* First book by world-renowned Black Hat, Inc. security consultants and trainers
* First book that details methods for attacking and defending physical security devices
* Black Hat, Inc. is the premier, worldwide provider of security training, consulting, and conferences
Related to Black Hat Physical Device Security
Related ebooks
Black Hat Physical Device Security: Exploiting Hardware and Software Rating: 0 out of 5 stars0 ratingsWarDriving: Drive, Detect, Defend: A Guide to Wireless Security Rating: 3 out of 5 stars3/5Stealing the Network: How to Own an Identity: How to Own an Identity Rating: 4 out of 5 stars4/5AVIEN Malware Defense Guide for the Enterprise Rating: 0 out of 5 stars0 ratingsGoogle Talking Rating: 5 out of 5 stars5/5Nessus, Snort, and Ethereal Power Tools: Customizing Open Source Security Applications Rating: 0 out of 5 stars0 ratingsStealing The Network: How to Own the Box Rating: 4 out of 5 stars4/5Snort Intrusion Detection 2.0 Rating: 4 out of 5 stars4/5Wireless Hacking: Projects for Wi-Fi Enthusiasts: Cut the cord and discover the world of wireless hacks! Rating: 5 out of 5 stars5/5InfoSec Career Hacking: Sell Your Skillz, Not Your Soul Rating: 3 out of 5 stars3/5Syngress Force Emerging Threat Analysis: From Mischief to Malicious Rating: 0 out of 5 stars0 ratingsWireshark & Ethereal Network Protocol Analyzer Toolkit Rating: 0 out of 5 stars0 ratingsHack Proofing Your Identity In The Information Age Rating: 4 out of 5 stars4/5How to Cheat at Securing a Wireless Network Rating: 2 out of 5 stars2/5Hack Proofing Your Network Rating: 0 out of 5 stars0 ratingsScene of the Cybercrime: Computer Forensics Handbook Rating: 4 out of 5 stars4/5Hack the Stack: Using Snort and Ethereal to Master The 8 Layers of An Insecure Network Rating: 0 out of 5 stars0 ratingsWarDriving and Wireless Penetration Testing Rating: 5 out of 5 stars5/5Intrusion Prevention and Active Response: Deploying Network and Host IPS Rating: 3 out of 5 stars3/5How to Cheat at Securing Your Network Rating: 0 out of 5 stars0 ratingsCyber Spying Tracking Your Family's (Sometimes) Secret Online Lives Rating: 5 out of 5 stars5/5Network Security Assessment: From Vulnerability to Patch Rating: 0 out of 5 stars0 ratingsBuilding DMZs For Enterprise Networks Rating: 4 out of 5 stars4/5Hack Proofing Your Web Applications: The Only Way to Stop a Hacker Is to Think Like One Rating: 0 out of 5 stars0 ratingsHacking a Terror Network: The Silent Threat of Covert Channels Rating: 5 out of 5 stars5/5Blackhatonomics: An Inside Look at the Economics of Cybercrime Rating: 3 out of 5 stars3/5Low Tech Hacking: Street Smarts for Security Professionals Rating: 4 out of 5 stars4/5Hardware Hacking: Have Fun while Voiding your Warranty Rating: 5 out of 5 stars5/5Locksmith and Security Professionals' Exam Study Guide Rating: 0 out of 5 stars0 ratings
Computers For You
The ChatGPT Millionaire Handbook: Make Money Online With the Power of AI Technology Rating: 0 out of 5 stars0 ratingsMastering ChatGPT: 21 Prompts Templates for Effortless Writing Rating: 5 out of 5 stars5/5How to Create Cpn Numbers the Right way: A Step by Step Guide to Creating cpn Numbers Legally Rating: 4 out of 5 stars4/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Procreate for Beginners: Introduction to Procreate for Drawing and Illustrating on the iPad Rating: 0 out of 5 stars0 ratingsCreating Online Courses with ChatGPT | A Step-by-Step Guide with Prompt Templates Rating: 4 out of 5 stars4/5101 Awesome Builds: Minecraft® Secrets from the World's Greatest Crafters Rating: 4 out of 5 stars4/5SQL QuickStart Guide: The Simplified Beginner's Guide to Managing, Analyzing, and Manipulating Data With SQL Rating: 4 out of 5 stars4/5Deep Search: How to Explore the Internet More Effectively Rating: 5 out of 5 stars5/5Ultimate Guide to Mastering Command Blocks!: Minecraft Keys to Unlocking Secret Commands Rating: 5 out of 5 stars5/5Grokking Algorithms: An illustrated guide for programmers and other curious people Rating: 4 out of 5 stars4/5CompTIA Security+ Practice Questions Rating: 2 out of 5 stars2/5AP Computer Science Principles Premium, 2024: 6 Practice Tests + Comprehensive Review + Online Practice Rating: 0 out of 5 stars0 ratingsRemote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5CompTIA IT Fundamentals (ITF+) Study Guide: Exam FC0-U61 Rating: 0 out of 5 stars0 ratingsChildhood Unplugged: Practical Advice to Get Kids Off Screens and Find Balance Rating: 0 out of 5 stars0 ratingsChatGPT Ultimate User Guide - How to Make Money Online Faster and More Precise Using AI Technology Rating: 0 out of 5 stars0 ratingsElon Musk Rating: 4 out of 5 stars4/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5Dark Aeon: Transhumanism and the War Against Humanity Rating: 5 out of 5 stars5/5The Professional Voiceover Handbook: Voiceover training, #1 Rating: 5 out of 5 stars5/5Master Builder Roblox: The Essential Guide Rating: 4 out of 5 stars4/5Hacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5
Reviews for Black Hat Physical Device Security
Rating: 4 out of 5 stars
4/5
1 rating0 reviews
Book preview
Black Hat Physical Device Security - Drew Miller
Enjoying the preview?
Page 1 of 1