Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation
Thumbnail 1

Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation

4.7/5
Product ID: 125258577
Secure Transaction
Frequently Bought Together

Description

Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation

Reviews

4.7

All from verified purchases

O**G

not balanced

The mark is for the book itself, not for Amazon service (which is above all expectations).the level of the book is inconsistent. there are parts that are known by anyone slightly interested in theme others significantly miss explanation. better would be to cover less topics but not be so greedy for explanation

C**E

Great book.

So much information in one place!Purchased the ebook first then had to get the paperback.

S**S

Top heavy on theory

Top heavy on theory and the application aspect lacks. Labs are preferred.

K**I

Great book in good shape, just like advertised.

This is an excellent book in good shape, just like advertised. I had to check my Amazon order to confirm the book is a used one. This book covers the most critical aspects of network security, including reverse engineering (compilers and assemblers) and great network analysis tools I did not know.

T**N

Excellent

Excellent

G**R

Get ready to get your hands on analysis and exploitation of network applications!

James Forshaw did a good on explaining the inner workings of network protocols, cipher methods used to provide security and integrity to the information, some methods to debug apps and a ton of methods to exploit them.

M**G

Covers the important stuff

This was well worth reading. it gave a short refresher of the basics of networking and then got into the how to capture, analyze, and exploit them.

M**9

Computer book

Bought as a gift for my cyber-leaning son.

E**K

It is a very interesting book

The book has in depth information to perform traffic sniffing without neet Wireshark, i.e. it has a lot of scripts (source code) to perform traffic analysis, Wireshark is explained also, however, can be detected by security tools, and the book is providing these scripts to do his analysis by yourself and not neeing detected easyly by security tools. great book.

N**A

Just awesome

Pure, organic juice. It's hard to believe someone still writes this kind of books. Most other books I read these days are worth less than the paper they are printed on.

S**0

Great book, been waiting for this one for a ...

Great book, been waiting for this one for a while. Would highly recommend getting a copy and look forward to more from the author and another great book from NoStarch 10/10

S**E

Good

Lots of relevant information.

W**K

Brilliant book

This book is epic. It allowed me to build on my basic self taught knowledge, to a now professional standard. Certainly worth a purchase 100% recommend.

Common Questions

Trustpilot

TrustScore 4.5 | 7,300+ reviews

Anita G.

Good experience, but the tracking updates could be better.

2 months ago

Anjali K.

The product quality is outstanding. Exactly what I needed for my work.

1 month ago

Shop Global, Save with Desertcart
Value for Money
Competitive prices on a vast range of products
Shop Globally
Serving millions of shoppers across more than 100 countries
Enhanced Protection
Trusted payment options loved by worldwide shoppers
Customer Assurance
Trusted payment options loved by worldwide shoppers.
Desertcart App
Shop on the go, anytime, anywhere.
C$4290

Duties & taxes incl.

Nicaraguastore
1
Free Shipping

with PRO Membership

Free Returns

30 daysfor PRO membership users

15 dayswithout membership

Secure Transaction

Trustpilot

TrustScore 4.5 | 7,300+ reviews

Vikram D.

The MOLLE sheath is of exceptional quality. Very happy with my purchase.

2 weeks ago

Pooja R.

The customer service exceeded my expectations. Perfect for buying products you can't find elsewhere.

1 week ago

Attacking Network Protocols A Hackers Guide To Capture Analysis Exploitation | Desertcart Nicaragua