Title
Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation,New
Processing time: 1-3 days
US Orders Ships in: 3-5 days
International Orders Ships in: 8-12 days
Return Policy: 15-days return on defective items
Attacking Network Protocols is a deep dive into network protocol security from James Forshaw, one of the world?s leading bug hunters. This comprehensive guide looks at networking from an attacker?s perspective to help you discover, exploit, and ultimately protect vulnerabilities.You?ll start with a rundown of networking basics and protocol traffic capture before moving on to static and dynamic protocol analysis, common protocol structures, cryptography, and protocol security. Then you?ll turn your focus to finding and exploiting vulnerabilities, with an overview of common bug classes, fuzzing, debugging, and exhaustion attacks.Learn how to: Capture, manipulate, and replay packets Develop tools to dissect traffic and reverse engineer code to understand the inner workings of a network protocol Discover and exploit vulnerabilities such as memory corruptions, authentication bypasses, and denials of service Use capture and analysis tools like Wireshark and develop your own custom network proxies to manipulate network trafficAttacking Network Protocols is a musthave for any penetration tester, bug hunter, or developer looking to understand and discover network vulnerabilities.
⚠️ WARNING (California Proposition 65):
This product may contain chemicals known to the State of California to cause cancer, birth defects, or other reproductive harm.
For more information, please visit www.P65Warnings.ca.gov.
- Q: What is the main focus of 'Attacking Network Protocols'? A: 'Attacking Network Protocols' primarily focuses on network protocol security, exploring vulnerabilities from an attacker’s perspective, and teaching readers how to capture, analyze, and exploit these protocols.
- Q: Who is the author of this book? A: The book is authored by James Forshaw, a well-known expert and bug hunter in the field of network security.
- Q: What topics are covered in this book? A: The book covers a range of topics including networking basics, protocol traffic capture, static and dynamic protocol analysis, cryptography, common bug classes, fuzzing, debugging, and exploitation techniques.
- Q: Is this book suitable for beginners? A: Yes, the book starts with basic networking concepts and gradually progresses to more complex topics, making it suitable for both beginners and experienced professionals.
- Q: What practical skills can I expect to learn from this book? A: Readers will learn how to capture and manipulate packets, develop tools for traffic dissection, reverse engineer protocols, and discover various types of vulnerabilities.
- Q: What tools are discussed in the book? A: The book discusses the use of popular tools such as Wireshark for packet analysis and guides readers on developing custom network proxies.
- Q: What is the binding type of 'Attacking Network Protocols'? A: 'Attacking Network Protocols' is available in paperback binding.
- Q: When was this book published? A: 'Attacking Network Protocols' was published on December 8, 2017.
- Q: How many pages does the book have? A: The book contains a total of 336 pages.
- Q: What is the condition of this book? A: The book is sold in new condition.