Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation
K**U
thanku
arrived. It's perfect! Thanks :)
K**O
Great book in good shape, just like advertised.
This is an excellent book in good shape, just like advertised. I had to check my Amazon order to confirm the book is a used one. This book covers the most critical aspects of network security, including reverse engineering (compilers and assemblers) and great network analysis tools I did not know.
M**G
Covers the important stuff
This was well worth reading. it gave a short refresher of the basics of networking and then got into the how to capture, analyze, and exploit them.
G**R
Get ready to get your hands on analysis and exploitation of network applications!
James Forshaw did a good on explaining the inner workings of network protocols, cipher methods used to provide security and integrity to the information, some methods to debug apps and a ton of methods to exploit them.
W**E
you are spared the hard math of cryptography
Forshaw gives us a succinct and detailed explanation of white hat or black hat techniques to analyse and do more with network traffic. At the simplest level might be the descriptions of how to get ("capture") packets and then to send these at a later time against their destination. This is the classic replay scenario that has been with us since the dawn of the Internet. The text shows how to take the next obvious step, where instead of simply replaying the packets you first alter them in some benign (?) or nefarious (?) manner.Of necessity you need some knowledge of cryptosystems. But Forshaw spares you the hard math. Instead AES, block ciphers et al are quickly and accurately run through at the systems level. A deeper dive is via Bruce Schneier's Applied Cryptography, which you might want to also have as a backup to this book.Attach methods like SQL injection are covered. Any reader working with databases should read this section slowly and carefully. Still a very common reputed attack vector.
C**E
Great book.
So much information in one place!Purchased the ebook first then had to get the paperback.
T**N
I LOVE THIS BOOK
I LOVE THIS BOOK !! If your into computer security or networking this book has a lot of good info :)
D**N
Excellent
Excellent
M**L
Buen libro
Es un muy buen libro! Explica muy bien los conceptos y ataques.
A**E
One of "must have" for security pros
Great book! I think it is one of those books all security enthusiasts / researchers / pentesters should have. Usually i dont write comments for products i bought but i really liked this book. It actually covers more topics than you see in the description. It doesn't only teach you how to monitor traffic, inject packet, MITM etc.., i knew all of those, but i wasnt really expecting this much clear but in-depth explanations of how to analyse the app and find potential zero days by digging its packet structure bit by bit. Definitely recommend it
E**A
It is a very interesting book
The book has in depth information to perform traffic sniffing without neet Wireshark, i.e. it has a lot of scripts (source code) to perform traffic analysis, Wireshark is explained also, however, can be detected by security tools, and the book is providing these scripts to do his analysis by yourself and not neeing detected easyly by security tools. great book.
O**L
très bon ouvrage
pour les spécialistes... mais c'est le but ;)
M**I
Good read but bad print quality for the price
The contents are meaty as are the topics covered. However the print quality is very bad for the exorbitant amount of money paid
TrustPilot
2 周前
2 周前