Attacking Network Protocols is a deep-dive into network vulnerability discovery from James Forshaw, Microsoft’s top bug hunter. This comprehensive guide looks at networking from an attacker’s perspective to help you find, exploit, and ultimately protect vulnerabilities.
Part I starts with a rundown of networking basics and traffic capture, as it builds a foundation for analyzing a network. Part II moves on to protocol analysis, both static and dynamic; you’ll learn about common protocol structures, cryptography, and protocol security, and how to reverse engineer code with IDA Pro, ILSpy, and Javasnoop. Part III focuses on finding and exploiting vulnerabilities, including an overview of common bug classes, fuzzing, debugging, exhaustion attacks, and how to develop custom tools. Forshaw ends with an overview of the best tools for analyzing and exploiting networks. By the book’s end, you’ll have a deep understanding of how to analyze network communication and where to look for vulnerabilities.
You’ll learn how to:
•Capture, manipulate, and spoof packets both passively and on the wire
•Reverse engineer code, brute force passwords, and decrypt traffic
•Exploit vulnerabilities with denial-of-service attacks, authentication and authorization bypasses, and memory corruptions
•Use capture and analysis tools like IDA Pro, Wireshark, and CANAPE
•Strengthen your exploits by rerouting network traffic, exploiting compression, and controlling data flow
Attacking Network Protocols is a must-have for any penetration tester, bug hunter, or developer looking to exploit and secure network vulnerabilities.
Attacking Network Protocols is a deep dive into network protocol security from James Forshaw, one of the world’s leading bug hunters. This comprehensive guide looks at networking from an attacker’s perspective to help you discover, exploit, and ultimately protect vulnerabilities.
You’ll start with a rundown of networking basics and protocol traffic capture before moving on to static and dynamic protocol analysis, common protocol structures, cryptography, and protocol security. Then you’ll turn your focus to finding and exploiting vulnerabilities, with an overview of common bug classes, fuzzing, debugging, and exhaustion attacks.
Learn how to:
- Capture, manipulate, and replay packets
- Develop tools to dissect traffic and reverse engineer code to understand the inner workings of a network protocol
- Discover and exploit vulnerabilities such as memory corruptions, authentication bypasses, and denials of service
- Use capture and analysis tools like Wireshark and develop your own custom network proxies to manipulate network traffic
Attacking Network Protocols is a must-have for any penetration tester, bug hunter, or developer looking to understand and discover network vulnerabilities.
Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.
Gratuit expédition vers Etats-Unis
Destinations, frais et délaisEUR 2,32 expédition vers Etats-Unis
Destinations, frais et délaisVendeur : BooksRun, Philadelphia, PA, Etats-Unis
Paperback. Etat : Fair. 1. Ship within 24hrs. Satisfaction 100% guaranteed. APO/FPO addresses supported. N° de réf. du vendeur 1593277504-7-1
Quantité disponible : 1 disponible(s)
Vendeur : HPB-Red, Dallas, TX, Etats-Unis
Paperback. Etat : Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority! N° de réf. du vendeur S_425124316
Quantité disponible : 1 disponible(s)
Vendeur : More Than Words, Waltham, MA, Etats-Unis
Etat : Good. . Former Library book. All orders guaranteed and ship within 24 hours. Before placing your order for please contact us for confirmation on the book's binding. Check out our other listings to add to your order for discounted shipping. N° de réf. du vendeur WAL-A-6a-001933
Quantité disponible : 1 disponible(s)
Vendeur : Goodwill, Brooklyn Park, MN, Etats-Unis
paperback. Etat : Acceptable. The book is warped. Cover/Case has some rubbing and edgewear. Access codes, CD's, slipcovers and other accessories may not be included. N° de réf. du vendeur 2Y6ZRZ00007N_ns
Quantité disponible : 1 disponible(s)
Vendeur : Seattle Goodwill, Seattle, WA, Etats-Unis
Etat : Good. May have some shelf-wear due to normal use. Your purchase funds free job training and education in the greater Seattle area. Thank you for supporting Goodwills nonprofit mission! N° de réf. du vendeur 0KVOTW008UFG_ns
Quantité disponible : 1 disponible(s)
Vendeur : WorldofBooks, Goring-By-Sea, WS, Royaume-Uni
Paperback. Etat : Very Good. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. N° de réf. du vendeur GOR009001266
Quantité disponible : 2 disponible(s)
Vendeur : WorldofBooks, Goring-By-Sea, WS, Royaume-Uni
Paperback. Etat : Fine. N° de réf. du vendeur GOR011800089
Quantité disponible : 1 disponible(s)
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
Etat : As New. Unread book in perfect condition. N° de réf. du vendeur 28126574
Quantité disponible : Plus de 20 disponibles
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
Etat : New. N° de réf. du vendeur 28126574-n
Quantité disponible : Plus de 20 disponibles
Vendeur : INDOO, Avenel, NJ, Etats-Unis
Etat : New. N° de réf. du vendeur 9781593277505
Quantité disponible : Plus de 20 disponibles