Practical Internet of Things Security
上QQ阅读APP看书,第一时间看更新

Application security attacks

IoT devices and connections can be exploited through attacks against application endpoints. Application endpoints include web servers as well as mobile device applications (for example, iOS and Android) that have a role in controlling the device. Application code running on the device itself can also be directly targeted. Application fuzzing can find ways of compromising the application host and taking control of its processes. In addition, reverse engineering and other notable attacks can uncover sad but still common implementation vulnerabilities, such as hardcoded keys, passwords, and other strings in the application binary. These parameters can be useful in various exploits.