Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation
Thumbnail 1

Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation

4.7/5
Product ID: 54191942
Secure Transaction
Frequently Bought Together

Description

Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation

Reviews

4.7

All from verified purchases

K**O

Great book in good shape, just like advertised.

This is an excellent book in good shape, just like advertised. I had to check my Amazon order to confirm the book is a used one. This book covers the most critical aspects of network security, including reverse engineering (compilers and assemblers) and great network analysis tools I did not know.

M**G

Covers the important stuff

This was well worth reading. it gave a short refresher of the basics of networking and then got into the how to capture, analyze, and exploit them.

G**R

Get ready to get your hands on analysis and exploitation of network applications!

James Forshaw did a good on explaining the inner workings of network protocols, cipher methods used to provide security and integrity to the information, some methods to debug apps and a ton of methods to exploit them.

K**U

thanku

arrived. It's perfect! Thanks :)

W**E

you are spared the hard math of cryptography

Forshaw gives us a succinct and detailed explanation of white hat or black hat techniques to analyse and do more with network traffic. At the simplest level might be the descriptions of how to get ("capture") packets and then to send these at a later time against their destination. This is the classic replay scenario that has been with us since the dawn of the Internet. The text shows how to take the next obvious step, where instead of simply replaying the packets you first alter them in some benign (?) or nefarious (?) manner.Of necessity you need some knowledge of cryptosystems. But Forshaw spares you the hard math. Instead AES, block ciphers et al are quickly and accurately run through at the systems level. A deeper dive is via Bruce Schneier's Applied Cryptography, which you might want to also have as a backup to this book.Attach methods like SQL injection are covered. Any reader working with databases should read this section slowly and carefully. Still a very common reputed attack vector.

C**E

Great book.

So much information in one place!Purchased the ebook first then had to get the paperback.

T**N

I LOVE THIS BOOK

I LOVE THIS BOOK !! If your into computer security or networking this book has a lot of good info :)

D**N

Excellent

Excellent

Common Questions

Trustpilot

TrustScore 4.5 | 7,300+ reviews

Anita G.

Good experience, but the tracking updates could be better.

2 months ago

Ali H.

Fast shipping and excellent packaging. The Leatherman tool feels very premium and sturdy.

1 day ago

Shop Global, Save with Desertcart
Value for Money
Competitive prices on a vast range of products
Shop Globally
Serving millions of shoppers across more than 100 countries
Enhanced Protection
Trusted payment options loved by worldwide shoppers
Customer Assurance
Trusted payment options loved by worldwide shoppers.
Desertcart App
Shop on the go, anytime, anywhere.
C$6043

Duties & taxes incl.

Nicaraguastore
1
Free Shipping

with PRO Membership

Free Returns

30 daysfor PRO membership users

15 dayswithout membership

Secure Transaction

Trustpilot

TrustScore 4.5 | 7,300+ reviews

Yusuf A.

Fantastic experience overall. Will recommend to friends and family.

1 month ago

Meera L.

Smooth transaction and product arrived in perfect condition.

3 weeks ago

Attacking Network Protocols A Hackers Guide To Capture Analysis Exploitation | Desertcart Nicaragua