// Prerequisites

What to read before The Hardware Hacking Handbook

If The Hardware Hacking Handbook feels too steep at advanced level, here is what to read first. Lighter books in the same topics that build the prerequisites this one assumes.

  1. 01 · 2003

    Hacking the Xbox

    Andrew "bunnie" Huang on the original Xbox: hardware modding as the entry path into reverse engineering, plus a frank account of the legal fight that followed.

    Intermediate
    4/5Andrew "bunnie" Huang
  2. 02 · 2021

    Practical IoT Hacking

    Five-author guide to IoT pentesting covering hardware probing, radio (BLE / Zigbee / LoRa), embedded firmware, and the protocols that connect cheap devices to vulnerable backends.

    Intermediate
    4/5Fotios Chantzis, Ioannis Stais, Paulino Calderon, Evangelos Deirmentzoglou, Beau Woods
  3. 03 · 2016

    The Car Hacker's Handbook

    Craig Smith's guide to automotive bus systems (CAN, LIN, FlexRay), ECUs, infotainment surfaces, and how to fuzz, trace and exploit modern vehicles.

    Intermediate
    4/5Craig Smith
  4. 04 · 2011

    The IDA Pro Book

    Chris Eagle's deep manual on IDA Pro, the disassembler that defined a generation of reverse engineering. Useful even with Ghidra in the picture, since most malware-analysis literature still assumes IDA.

    Intermediate
    4/5Chris Eagle
  5. 05 · 2012

    Practical Malware Analysis

    Still the gold standard textbook for static and dynamic malware analysis on Windows.

    Intermediate
    5/5Michael Sikorski, Andrew Honig
  6. 06 · 2009

    Les virus informatiques : théorie, pratique et applications

    Éric Filiol's reference French-language treatment of computer virology. Formal theory, infection mechanisms, offensive and defensive applications, with academic rigor rare on the topic.

    Advanced
    5/5Éric Filiol
  7. 07 · 2018

    Practical Binary Analysis

    Dennis Andriesse on the binary toolchain you can actually script: ELF internals, dynamic taint analysis, symbolic execution and instrumentation with concrete code-along examples.

    Advanced
    5/5Dennis Andriesse
  8. 08 · 2024

    Evasive Malware

    Kyle Cucci on the anti-analysis arms race: sandbox detection, anti-debug, anti-VM, packing, and the analyst-side tooling and tradecraft that get past those layers.

    Advanced
    4/5Kyle Cucci
Back to The Hardware Hacking HandbookWhat to read after The Hardware Hacking Handbook