Attacking Network Protocols
shared
This Book is Out of Stock!
A Hacker's Guide to Capture, Analysis, and Exploitation
English


LOOKING TO PLACE A BULK ORDER?CLICK HERE

Piracy-free
Piracy-free
Assured Quality
Assured Quality
Secure Transactions
Secure Transactions
Fast Delivery
Fast Delivery
Sustainably Printed
Sustainably Printed
*COD & Shipping Charges may apply on certain items.
Review final details at checkout.
3999
Out Of Stock
All inclusive*

About The Book

<i>Attacking Network Protocols</i>&#160;is a deep dive into network protocol security from James &#173;Forshaw one of the world&#146;s leading bug &#173;hunters. This comprehensive guide looks at networking from an attacker&#146;s perspective to help you discover exploit and ultimately &#173;protect vulnerabilities.<br><br>You&#146;ll start with a rundown of networking basics and protocol traffic capture before moving on to static and dynamic protocol analysis common protocol structures cryptography and protocol security. Then you&#146;ll turn your focus to finding and exploiting vulnerabilities with an overview of common bug classes fuzzing debugging and exhaustion attacks.&#160;<br><br>Learn how to:<br>- Capture manipulate and replay packets<br>- Develop tools to dissect traffic and reverse engineer code to understand the inner workings of a network protocol<br>- Discover and exploit vulnerabilities such as memory corruptions authentication bypasses and denials of service<br>- Use capture and analysis tools like &#173;Wireshark and develop your own custom network proxies to manipulate &#173;network traffic<br><br><i>Attacking Network Protocols</i> is a must-have for any penetration tester bug hunter or developer looking to understand and discover network vulnerabilities.
downArrow

Details