• Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation

Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation

( Review 76 )
Read Online Download Now

Attacking Network Protocols is a deep dive into network protocol security from James -Forshaw, one of the world's leading bug -hunters. This comprehensive guide looks at networking from an attacker's perspective to help you discover, exploit, and ultimately -protect vulnerabilities.

You'll start with a rundown of networking basics and protocol traffic capture before moving on to static and dynamic protocol analysis, common protocol structures, cryptography, and protocol security. Then you'll turn your focus to finding and exploiting vulnerabilities, with an overview of common bug classes, fuzzing, debugging, and exhaustion attacks.

Learn how to:
- Capture, manipulate, and replay packets
- Develop tools to dissect traffic and reverse engineer code to understand the inner workings of a network protocol
- Discover and exploit vulnerabilities such as memory corruptions, authentication bypasses, and denials of service
- Use capture and analysis tools like -Wireshark and develop your own custom network proxies to manipulate -network traffic

Attacking Network Protocols is a must-have for any penetration tester, bug hunter, or developer looking to understand and discover network vulnerabilities.

Book Description

Attacking Network Protocols is a deep dive into network protocol security from James -Forshaw, one of the world's leading bug -hunters. This comprehensive guide looks at networking from an attacker's perspective to help you discover, exploit, and ultimately -protect vulnerabilities.

You'll start with a rundown of networking basics and protocol traffic capture before moving on to static and dynamic protocol analysis, common protocol structures, cryptography, and protocol security. Then you'll turn your focus to finding and exploiting vulnerabilities, with an overview of common bug classes, fuzzing, debugging, and exhaustion attacks.

Learn how to:
- Capture, manipulate, and replay packets
- Develop tools to dissect traffic and reverse engineer code to understand the inner workings of a network protocol
- Discover and exploit vulnerabilities such as memory corruptions, authentication bypasses, and denials of service
- Use capture and analysis tools like -Wireshark and develop your own custom network proxies to manipulate -network traffic

Attacking Network Protocols is a must-have for any penetration tester, bug hunter, or developer looking to understand and discover network vulnerabilities.

Book Detail

  • Book Title

    Attacking Network Protocols: A Hacker's Guide t...

  • Author

    James Forshaw

  • Book Type

    Business And Accounts

  • Date Published

    December 12, 2017

  • Specification

    Management And Technology

  • Pages

    336 Pages

Read Online Download Now

Book Reviews

  • cone adresson

    Nam ut egestas nibh. Phasellus sollicitudin tempus neque quis gravida. Aenean a eros at ex pharetra suscipit. Proin iaculis ipsum ac ullamcorper pretium. Morbi ut leo eu felis commodo porta.

    Like Reply
  • Mark Smith

    Donec ullamcorper vulputate quam pharetra tempus. Nam mi eros, porta vitae tempus sit amet, blandit non elit. Cras aliquet massa non quam molestie facilisis. Duis sollicitudin mattis ante, sed suscipit mi blandit et.

    Like Reply
  • sarena doe

    Nam ut egestas nibh. Phasellus sollicitudin tempus neque quis gravida. Aenean a eros at ex pharetra suscipit. Proin iaculis ipsum ac ullamcorper pretium. Morbi ut leo eu felis commodo porta.

    Like Reply
  • jessy_arthur

    Donec ullamcorper vulputate quam pharetra tempus. Nam mi eros, porta vitae tempus sit amet, blandit non elit. Cras aliquet massa non quam molestie facilisis. Duis sollicitudin mattis ante, sed suscipit mi blandit et.

    Like Reply

LEAVE A REPLY

Related books

Members Online