Get Free Shipping on orders over $0
Attacking Network Protocols : A Hacker's Guide to Capture, Analysis, and Exploitation - James Forshaw
eTextbook alternate format product

Instant online reading.
Don't wait for delivery!

Go digital and save!

Attacking Network Protocols

A Hacker's Guide to Capture, Analysis, and Exploitation

By: James Forshaw

Paperback | 7 December 2017

At a Glance

Paperback


RRP $89.99

$88.75

or 4 interest-free payments of $22.19 with

 or 

Ships in 10 to 15 business days

Attacking Network Protocols is a deep-dive into network vulnerability discovery from James Forshaw, Microsoft's top bug hunter. This comprehensive guide looks at networking from an attacker's perspective to help you find, exploit, and ultimately protect vulnerabilities.

Part I starts with a rundown of networking basics and traffic capture, as it builds a foundation for analyzing a network. Part II moves on to protocol analysis, both static and dynamic; you'll learn about common protocol structures, cryptography, and protocol security, and how to reverse engineer code with IDA Pro, ILSpy, and Javasnoop. Part III focuses on finding and exploiting vulnerabilities, including an overview of common bug classes, fuzzing, debugging, exhaustion attacks, and how to develop custom tools. Forshaw ends with an overview of the best tools for analyzing and exploiting networks. By the book's end, you'll have a deep understanding of how to analyze network communication and where to look for vulnerabilities.

You'll learn how to- -Capture, manipulate, and spoof packets both passively and on the wire -Reverse engineer code, brute force passwords, and decrypt traffic -Exploit vulnerabilities with denial-of-service attacks, authentication and authorization bypasses, and memory corruptions -Use capture and analysis tools like IDA Pro, Wireshark, and CANAPE -Strengthen your exploits by rerouting network traffic, exploiting compression, and controlling data flow

Attacking Network Protocols is a must-have for any penetration tester, bug hunter, or developer looking to exploit and secure network vulnerabilities.

More in Networking Standards & Protocols

TCP/IP Illustrated : The Protocols, Volume 1 - Kevin Fall

RRP $112.30

$85.75

24%
OFF
SSH, The Secure Shell : Definitive Guide Ser. - Daniel J Barrett

RRP $85.50

$42.75

50%
OFF
TCP/IP Network Administration 3e : O'Reilly Ser. - Craig Hunt

RRP $104.75

$51.75

51%
OFF
Networking All-in-One For Dummies : For Dummies (Computer/Tech) - Doug Lowe
Zero Trust Networks : Building Secure Systems in Untrusted Network - Christina Morillo
Network Security Assessment : Know Your Network : 3rd Edition - Chris Mcnab
Using SANs & NAS : O'Reilly Ser. - W Curtis Preston

RRP $56.99

$30.75

46%
OFF
Linux Network Administrator's Guide : O'Reilly Ser. - Tony Bautts
DNS and BIND 5e : OREILLY - Cricket Liu

RRP $114.00

$55.75

51%
OFF
HTTP Pocket Reference : Pocket Reference (O'Reilly) - Clinton Wong

RRP $18.99

$12.75

33%
OFF
HTTP : Understanding Web Internals - David Gourley

RRP $123.75

$60.75

51%
OFF
Essential System Administration : OREILLY - Aeleen Frisch

RRP $114.00

$55.75

51%
OFF
Radius : O'Reilly Ser. - Jonathan Hassell

RRP $66.75

$34.99

48%
OFF
LDAP System Administration : O'Reilly Ser. - Gerald Carter

RRP $75.99

$39.75

48%
OFF
Sendmail Cookbook : Cookbooks Ser. - Craig Hunt

RRP $95.00

$47.75

50%
OFF
Cisco IOS in a Nutshell : In a Nutshell - James Boney

RRP $75.99

$39.75

48%
OFF
Essential SNMP 2e : ESSENTIALS - Douglas Mauro

RRP $94.99

$47.75

50%
OFF