Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
IoT Penetration Testing Cookbook

You're reading from   IoT Penetration Testing Cookbook Identify vulnerabilities and secure your smart devices

Arrow left icon
Product type Paperback
Published in Nov 2017
Publisher Packt
ISBN-13 9781787280571
Length 452 pages
Edition 1st Edition
Languages
Arrow right icon
Author (1):
Arrow left icon
Aaron Guzman Aaron Guzman
Author Profile Icon Aaron Guzman
Aaron Guzman
Arrow right icon
View More author details
Toc

Table of Contents (12) Chapters Close

Preface 1. IoT Penetration Testing 2. IoT Threat Modeling FREE CHAPTER 3. Analyzing and Exploiting Firmware 4. Exploitation of Embedded Web Applications 5. Exploiting IoT Mobile Applications 6. IoT Device Hacking 7. Radio Hacking 8. Firmware Security Best Practices 9. Mobile Security Best Practices 10. Securing Hardware 11. Advanced IoT Exploitation and Security Automation

Exposed interfaces


One of the most important things for securing hardware in IoT devices is to disable and remove the UART and JTAG interfaces, as well as any other diagnostic functionality in the hardware when the device is launched to the market.

The other important consideration here is that, even if there are no exposed interfaces visible, an attacker can directly hook to the legs of the chip to get access to the UART, JTAG, and so on. This is done by reading the datasheet of the chipset, figuring out which pins are for what functionalities, and then making the necessary connections. One of the steps that could be taken here to add a bit of complexity is to have the interfaces deep between different layers via vias and not exposed on one of the visible layers. However, this should be done only if the exposed interfaces are required for the device developer at a later point in time. In all other practical cases, these interfaces should be removed. Another security protection worth noting...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image