Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation
Thumbnail 1

Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation

4.7/5
ID del producto: 54191942
Transacción segura
Comprados juntos con frecuencia

Descripción

Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation

Reseñas

4.7

Todo de compras verificadas

K**O

Great book in good shape, just like advertised.

This is an excellent book in good shape, just like advertised. I had to check my Amazon order to confirm the book is a used one. This book covers the most critical aspects of network security, including reverse engineering (compilers and assemblers) and great network analysis tools I did not know.

M**G

Covers the important stuff

This was well worth reading. it gave a short refresher of the basics of networking and then got into the how to capture, analyze, and exploit them.

G**R

Get ready to get your hands on analysis and exploitation of network applications!

James Forshaw did a good on explaining the inner workings of network protocols, cipher methods used to provide security and integrity to the information, some methods to debug apps and a ton of methods to exploit them.

K**U

thanku

arrived. It's perfect! Thanks :)

W**E

you are spared the hard math of cryptography

Forshaw gives us a succinct and detailed explanation of white hat or black hat techniques to analyse and do more with network traffic. At the simplest level might be the descriptions of how to get ("capture") packets and then to send these at a later time against their destination. This is the classic replay scenario that has been with us since the dawn of the Internet. The text shows how to take the next obvious step, where instead of simply replaying the packets you first alter them in some benign (?) or nefarious (?) manner.Of necessity you need some knowledge of cryptosystems. But Forshaw spares you the hard math. Instead AES, block ciphers et al are quickly and accurately run through at the systems level. A deeper dive is via Bruce Schneier's Applied Cryptography, which you might want to also have as a backup to this book.Attach methods like SQL injection are covered. Any reader working with databases should read this section slowly and carefully. Still a very common reputed attack vector.

C**E

Great book.

So much information in one place!Purchased the ebook first then had to get the paperback.

T**N

I LOVE THIS BOOK

I LOVE THIS BOOK !! If your into computer security or networking this book has a lot of good info :)

D**N

Excellent

Excellent

Preguntas comunes

Trustpilot

Trustscore 4.5 | Más de 7,300 reseñas

El rey F.

Tienda muy confiable con productos genuinos. ¡Seguro que volveré a comprar!

Hace 2 semanas

Yusuf A.

En general, fue una experiencia fantástica. Se lo recomendaré a mis amigos y familiares.

Hace 1 mes

Compre globalmente, ahorre con Desertcart
Valor por dinero
Precios competitivos en una amplia gama de productos.
Compre globalmente
Sirviendo a millones de compradores en más de 100 países
Protección mejorada
Opciones de pago confiables que adoran los compradores de todo el mundo
Garantía del cliente
Opciones de pago confiables amadas por los compradores de todo el mundo.
Aplicación DesertCart
Compre sobre la marcha, en cualquier momento y en cualquier lugar.
C$6043

Derechos e impuestos incl.

Nicaraguaalmacenar
1
Envío gratis

with PRO Membership

Devoluciones gratuitas

30 diaspara usuarios de membresía PRO

15 diassin membresía

Transacción segura

Trustpilot

Trustscore 4.5 | Más de 7,300 reseñas

Yusuf A.

En general, fue una experiencia fantástica. Se lo recomendaré a mis amigos y familiares.

Hace 1 mes

Farhan Q.

El tiempo de entrega fue excelente y el embalaje fue seguro.

Hace 2 meses

Attacking Network Protocols A Hackers Guide To Capture Analysis Exploitation | Desertcart Nicaragua