Section 1: Getting to Know the Hardware
After reading this section, you will know how to set up an assessment lab, understand the global architecture of an embedded system, know how to identify the different components, and understand how they act together in order to make the system run. Once you are able to understand all aspects of how a system works, you will be able to follow a risk modeling methodology to plan your tests according to the threats against the target system.
This section comprises the following chapters:
- Chapter 1, Setting Up Your Pentesting Lab and Ensuring Lab Safety
- Chapter 2, Understanding Your Target
- Chapter 3, Identifying the Components of Your Target
- Chapter 4, Approaching and Planning the Test