{"id":96,"date":"2016-07-17T23:10:51","date_gmt":"2016-07-17T23:10:51","guid":{"rendered":"http:\/\/www.samuelhuntley.com\/?p=96"},"modified":"2016-11-03T02:53:12","modified_gmt":"2016-11-03T02:53:12","slug":"embedded-device-security-pwn-the-device","status":"publish","type":"post","link":"https:\/\/www.samuelhuntley.com\/?p=96","title":{"rendered":"Embedded Device Security: Pwn the device"},"content":{"rendered":"<p>This book is an introduction for the reader into the wonderful world of embedded device exploitation. The book is supposed to be a tutorial guide that helps a reader understand the various skills required for hacking an embedded device. As the world is getting more and more into the phenomenon of &#8220;Internet of Things&#8221;, such skill sets can be useful to hack from a simple intelligent light bulb to hacking into a car.<\/p>\n<p><a href=\"http:\/\/www.samuelhuntley.com\/wp-content\/uploads\/2016\/07\/embedded1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-97\" src=\"http:\/\/www.samuelhuntley.com\/wp-content\/uploads\/2016\/07\/embedded1-245x300.png\" alt=\"embedded1\" width=\"245\" height=\"300\" srcset=\"https:\/\/www.samuelhuntley.com\/wp-content\/uploads\/2016\/07\/embedded1-245x300.png 245w, https:\/\/www.samuelhuntley.com\/wp-content\/uploads\/2016\/07\/embedded1.png 300w\" sizes=\"(max-width: 245px) 100vw, 245px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/www.amazon.com\/Embedded-Device-Security-Pwn-device\/dp\/1508553300\/ref=sr_1_2\/000-9701188-2690166?s=books&amp;ie=UTF8&amp;qid=1468796266&amp;sr=1-2&amp;refinements=p_27%3AMr+Samuel+Huntley\">Buy it at Amazon<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This book is an introduction for the reader into the wonderful world of embedded device exploitation. The book is supposed to be a tutorial guide that helps a reader understand the various skills required for hacking an embedded device. As the world is getting more and more into the phenomenon of &#8220;Internet of Things&#8221;, such &hellip; <a href=\"https:\/\/www.samuelhuntley.com\/?p=96\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Embedded Device Security: Pwn the device<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"_links":{"self":[{"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=\/wp\/v2\/posts\/96"}],"collection":[{"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=96"}],"version-history":[{"count":1,"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=\/wp\/v2\/posts\/96\/revisions"}],"predecessor-version":[{"id":98,"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=\/wp\/v2\/posts\/96\/revisions\/98"}],"wp:attachment":[{"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=96"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=96"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=96"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}