Book Content
chapters • 12h44m total length
1. Setting Up Your Pentesting Lab and Ensuring Lab Safety
2. Understanding Your Target
3. Identifying the Components of Your Target
4. Approaching and Planning the Test
5. Our Main Attack Platform
6. Sniffing and Attacking the Most Common Protocols
7. Extracting and Manipulating Onboard Storage
8. Attacking Wi-Fi, Bluetooth, and BLE
9. Software-Defined Radio Attacks
10. Accessing the Debug Interfaces
11. Static Reverse Engineering and Analysis
12. Dynamic Reverse Engineering
13. Scoring and Reporting Your Vulnerabilities
14. Wrapping It Up – Mitigations and Good Practices














