![]() ![]() While every precaution has been taken in the preparation of this work, neither the author nor No Starch Press, Inc. The information in this book is distributed on an “As Is” basis, without warranty. Rather than use a trademark symbol with every occurrence of a trademarked name, we are using the names only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark. Other product and company names mentioned herein may be the trademarks of their respective owners. 245 8th Street, San Francisco, CA 94103 phone: 1.415.863.9900 Library of Congress Control Number: 2017954429 No Starch Press and the No Starch Press logo are registered trademarks of No Starch Press, Inc. Fleming Indexer: BIM Creatives, LLC For information on distribution, translations, or bulk sales, please contact No Starch Press, Inc. ISBN-10: 1-59327-750-4 ISBN-13: 978-1-59327-750-5 Publisher: William Pollock Production Editor: Laurel Chun Cover Illustration: Garry Booth Interior Design: Octopod Studios Developmental Editors: Liz Chadwick and William Pollock Technical Reviewers: Cliff Janzen Additional Technical Reviewers: Arrigo Triulzi and Peter Gutmann Copyeditor: Anne Marie Walker Compositors: Laurel Chun and Meg Sneeringer Proofreader: Paula L. No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system, without the prior written permission of the copyright owner and the publisher. James Forshaw Foreword by Katie MoussourisĪTTACKING NETWORK PROTOCOLS A Hacker’s Guide to Capture, Analysis, and ExploitationĪttacking network protocols. “James can see the Lady in the Red Dress, as well as the code that rendered her, in the Matrix.” - Katie Moussouris, founder and CEO, Luta Security Use capture and analysis tools like Wireshark and develop your own custom network proxies to manipulate network traffic Then you’ll turn your focus to finding and exploiting vulnerabilities, with an overview of common bug classes, fuzzing, debugging, and exhaustion attacks. ![]() You’ll start with a rundown of networking basics and protocol traffic capture before moving on to static and dynamic protocol analysis, common protocol structures, cryptography, and protocol security. Price: $49.95 ($65.95 CDN) Shelve In: Computers/SecurityĪttacking Network Protocols A Hacker’s Guide to Capture, Analysis, and ExploitationĪ Hacker’s Guide to Capture, Analysis, and Exploitation T H E F I N E ST I N G E E K E N T E RTA I N M E N T ™ “I LIE FLAT.” This book uses a durable binding that won’t snap shut. He’s been invited to present his novel security research at global security conferences such as BlackHat, C anSecWest, and Chaos Computer Congress. His discovery of complex design issues in Microsoft Windows earned him the top bug bounty of $100,000 and placed him as the #1 researcher on the published list from Microsoft Security Response Center (MSRC). Learn how to: Capture, manipulate, and replay packets Develop tools to dissect traffic and reverse engineer code to understand the inner workings of a network protocol Discover and exploit vulnerabilities such as memory corruptions, authentication bypasses, and denials of serviceĪttacking Network Protocols is a must-have for any penetration tester, bug hunter, or developer looking to understand and discover network vulnerabilities.Ībout the Author James Forshaw is a renowned computer security researcher at Google Project Zero and the creator of the network protocol analysis tool Canape. ![]() This comprehensive guide looks at networking from an attacker’s perspective to help you discover, exploit, and ultimately protect vulnerabilities. Attacking Network Protocols is a deep dive into network protocol security from James Forshaw, one of the world’s leading bug hunters. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |