Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation
Thumbnail 1

Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation

4.7/5
Product ID: 54191942
Secure Transaction
Frequently Bought Together

Description

Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation

Reviews

4.7

All from verified purchases

K**U

thanku

arrived. It's perfect! Thanks :)

K**O

Great book in good shape, just like advertised.

This is an excellent book in good shape, just like advertised. I had to check my Amazon order to confirm the book is a used one. This book covers the most critical aspects of network security, including reverse engineering (compilers and assemblers) and great network analysis tools I did not know.

M**G

Covers the important stuff

This was well worth reading. it gave a short refresher of the basics of networking and then got into the how to capture, analyze, and exploit them.

G**R

Get ready to get your hands on analysis and exploitation of network applications!

James Forshaw did a good on explaining the inner workings of network protocols, cipher methods used to provide security and integrity to the information, some methods to debug apps and a ton of methods to exploit them.

W**E

you are spared the hard math of cryptography

Forshaw gives us a succinct and detailed explanation of white hat or black hat techniques to analyse and do more with network traffic. At the simplest level might be the descriptions of how to get ("capture") packets and then to send these at a later time against their destination. This is the classic replay scenario that has been with us since the dawn of the Internet. The text shows how to take the next obvious step, where instead of simply replaying the packets you first alter them in some benign (?) or nefarious (?) manner.Of necessity you need some knowledge of cryptosystems. But Forshaw spares you the hard math. Instead AES, block ciphers et al are quickly and accurately run through at the systems level. A deeper dive is via Bruce Schneier's Applied Cryptography, which you might want to also have as a backup to this book.Attach methods like SQL injection are covered. Any reader working with databases should read this section slowly and carefully. Still a very common reputed attack vector.

C**E

Great book.

So much information in one place!Purchased the ebook first then had to get the paperback.

T**N

I LOVE THIS BOOK

I LOVE THIS BOOK !! If your into computer security or networking this book has a lot of good info :)

D**N

Excellent

Excellent

M**L

Buen libro

Es un muy buen libro! Explica muy bien los conceptos y ataques.

A**E

One of "must have" for security pros

Great book! I think it is one of those books all security enthusiasts / researchers / pentesters should have. Usually i dont write comments for products i bought but i really liked this book. It actually covers more topics than you see in the description. It doesn't only teach you how to monitor traffic, inject packet, MITM etc.., i knew all of those, but i wasnt really expecting this much clear but in-depth explanations of how to analyse the app and find potential zero days by digging its packet structure bit by bit. Definitely recommend it

E**A

It is a very interesting book

The book has in depth information to perform traffic sniffing without neet Wireshark, i.e. it has a lot of scripts (source code) to perform traffic analysis, Wireshark is explained also, however, can be detected by security tools, and the book is providing these scripts to do his analysis by yourself and not neeing detected easyly by security tools. great book.

O**L

très bon ouvrage

pour les spécialistes... mais c'est le but ;)

M**I

Good read but bad print quality for the price

The contents are meaty as are the topics covered. However the print quality is very bad for the exorbitant amount of money paid

Common Questions

Trustpilot

TrustScore 4.5 | 7,300+ reviews

Anjali K.

The product quality is outstanding. Exactly what I needed for my work.

1 month ago

Abdullah B.

Great price for an authentic product. Fast international shipping too!

3 weeks ago

Shop Global, Save with Desertcart
Value for Money
Competitive prices on a vast range of products
Shop Globally
Serving over 300 million shoppers across more than 200 countries
Enhanced Protection
Trusted payment options loved by worldwide shoppers
Customer Assurance
Trusted payment options loved by worldwide shoppers.
Desertcart App
Shop on the go, anytime, anywhere.
€ 62.90

Duties & taxes incl.

Irelandstore
1
Free Returns

30 daysfor PRO membership users

15 dayswithout membership

Secure Transaction

Trustpilot

TrustScore 4.5 | 7,300+ reviews

Abdullah B.

Great price for an authentic product. Fast international shipping too!

3 weeks ago

Neha S.

Excellent communication throughout the order process. Product is perfect.

2 weeks ago

Attacking Network Protocols A Hackers Guide To Capture Analysis Exploitation | Desertcart Ireland