

Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation: 9781593277505: Computer Science Books @ desertcart.com Review: Great book in good shape, just like advertised. - This is an excellent book in good shape, just like advertised. I had to check my desertcart order to confirm the book is a used one. This book covers the most critical aspects of network security, including reverse engineering (compilers and assemblers) and great network analysis tools I did not know. Review: Covers the important stuff - This was well worth reading. it gave a short refresher of the basics of networking and then got into the how to capture, analyze, and exploit them.
| ASIN | 1593277504 |
| Best Sellers Rank | #482,883 in Books ( See Top 100 in Books ) #104 in Web Encryption #203 in Computer Hacking #295 in Computer Network Security |
| Customer Reviews | 4.7 4.7 out of 5 stars (256) |
| Dimensions | 7.01 x 0.83 x 9.25 inches |
| Edition | 1st |
| ISBN-10 | 9781593277505 |
| ISBN-13 | 978-1593277505 |
| Item Weight | 1.47 pounds |
| Language | English |
| Print length | 336 pages |
| Publication date | December 8, 2017 |
| Publisher | No Starch Press |
K**O
Great book in good shape, just like advertised.
This is an excellent book in good shape, just like advertised. I had to check my Amazon order to confirm the book is a used one. This book covers the most critical aspects of network security, including reverse engineering (compilers and assemblers) and great network analysis tools I did not know.
M**G
Covers the important stuff
This was well worth reading. it gave a short refresher of the basics of networking and then got into the how to capture, analyze, and exploit them.
G**R
Get ready to get your hands on analysis and exploitation of network applications!
James Forshaw did a good on explaining the inner workings of network protocols, cipher methods used to provide security and integrity to the information, some methods to debug apps and a ton of methods to exploit them.
K**U
thanku
arrived. It's perfect! Thanks :)
W**E
you are spared the hard math of cryptography
Forshaw gives us a succinct and detailed explanation of white hat or black hat techniques to analyse and do more with network traffic. At the simplest level might be the descriptions of how to get ("capture") packets and then to send these at a later time against their destination. This is the classic replay scenario that has been with us since the dawn of the Internet. The text shows how to take the next obvious step, where instead of simply replaying the packets you first alter them in some benign (?) or nefarious (?) manner. Of necessity you need some knowledge of cryptosystems. But Forshaw spares you the hard math. Instead AES, block ciphers et al are quickly and accurately run through at the systems level. A deeper dive is via Bruce Schneier's Applied Cryptography, which you might want to also have as a backup to this book. Attach methods like SQL injection are covered. Any reader working with databases should read this section slowly and carefully. Still a very common reputed attack vector.
C**E
Great book.
So much information in one place! Purchased the ebook first then had to get the paperback.
T**N
I LOVE THIS BOOK
I LOVE THIS BOOK !! If your into computer security or networking this book has a lot of good info :)
D**N
Excellent
Excellent
T**I
Das Buch ist meiner Meinung nach in einem eher einfacheren Englisch geschrieben und beinhaltet sehr viele praktische Teile. An die verwendeten Programme (z.B. Ettercap) wird man hierbei mit einer Schritt-für-Schritt-Anleitung herangeführt. Dies ist auf keinen Fall negativ zu Beurteilen. Kenntnisse auf den Gebieten Netzwerktechnik und verteilte Systeme sind meiner Meinung nach Pflicht, da der Autor eine für die IT-Security relevante Sicht auf Dinge wie das ISO/OSI 7 Schichten Modell bietet. Das Buch sollte auf keinen Fall als fertiges Referenzwerk zur Frage "Wie werde ich ein IT-Security Experte?" verwendet werden. Vielmehr wird man in die richtige Richtung gelenkt und kann das Buch somit als eine Art roten Faden heranziehen.
M**H
Excellent book and Amazon's delivery service is amazing as always.
A**E
Great book! I think it is one of those books all security enthusiasts / researchers / pentesters should have. Usually i dont write comments for products i bought but i really liked this book. It actually covers more topics than you see in the description. It doesn't only teach you how to monitor traffic, inject packet, MITM etc.., i knew all of those, but i wasnt really expecting this much clear but in-depth explanations of how to analyse the app and find potential zero days by digging its packet structure bit by bit. Definitely recommend it
M**L
Es un muy buen libro! Explica muy bien los conceptos y ataques.
O**L
pour les spécialistes... mais c'est le but ;)
Trustpilot
Hace 1 semana
Hace 2 días