Table of Contents
- Setting Up Your Pentesting Lab and Ensuring Lab Safety
- Understanding Your Target
- Identifying the Components of Your Target
- Approaching and Planning the Test
- Our Main Attack Platform
- Sniffing and Attacking the Most Common Protocols
- Extracting and Manipulating Onboard Storage
- Attacking Wi-Fi, Bluetooth, and BLE
- Software-Defined Radio Attacks
- Accessing the Debug Interfaces
- Static Reverse Engineering and Analysis
- Dynamic Reverse Engineering
- Scoring and Reporting Your Vulnerabilities
- Wrapping It Up – Mitigations and Good Practices

