Section 2: Attacking the Hardware
In this section, you will get up close and personal with hardware, using off-the-shelf tools and a very cheap, but quite capable, hardware platform (a cheap development board) to analyze and attack in-circuit protocols. You will also become more familiar with common wireless protocols and how to use them to attack hardware devices.
This section comprises the following chapters:
- Chapter 5, Our Main Attack Platform
- Chapter 6, Sniffing and Attacking the Most Common Protocols
- Chapter 7, Extracting and Manipulating Onboard Storage
- Chapter 8, Attacking Wi-Fi, Bluetooth, and BLE
- Chapter 9, Software-Defined Radio Attacks