skip to content
Attacking network protocols : a hacker's guide to capture, analysis, and exploitation Preview this item
ClosePreview this item
Checking...

Attacking network protocols : a hacker's guide to capture, analysis, and exploitation

Author: James Forshaw
Publisher: [Place of publication not identified] : No Starch Press, 2018.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
Attacking Network Protocols is a deep dive into network protocol security from James Forshaw, one of the world's leading bug hunters. This comprehensive guide looks at networking from an attacker's perspective to help you discover, exploit, and ultimately protect vulnerabilities. You'll start with a rundown of networking basics and protocol traffic capture before moving on to static and dynamic protocol analysis,  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: James Forshaw
ISBN: 9781593278441 1593278446 1593277504 9781593277505
OCLC Number: 1019514867
Notes: Title from resource description page (Recorded Books, viewed January 08, 2018).
Description: 1 online resource
Contents: Intro; Brief Contents; Contents in Detail; Foreword; Acknowledgments; Introduction; Why Read This Book?; What's in This Book?; How to Use This Book; Contact Me; Chapter 1: The Basics of Networking; Network Architecture and Protocols; The Internet Protocol Suite; Data Encapsulation; Headers, Footers, and Addresses; Data Transmission; Network Routing; My Model for Network Protocol Analysis; Final Words; Chapter 2: Capturing Application Traffic; Passive Network Traffic Capture; Quick Primer for Wireshark; Alternative Passive Capture Techniques; System Call Tracing; The strace Utility on Linux. Monitoring Network Connections with DTraceProcess Monitor on Windows; Advantages and Disadvantages of Passive Capture; Active Network Traffic Capture; Network Proxies; Port-Forwarding Proxy; SOCKS Proxy; HTTP Proxies; Forwarding an HTTP Proxy; Reverse HTTP Proxy; So Which Approach Should You Use?; Chapter 3: Network Protocol Structures; Binary Protocol Structures; Numeric Data; Booleans; Bit Flags; Binary Endian; Strings; Variable Binary Length Data; Dates and Times; POSIX/Unix Time; Windows FILETIME; Tag, Length, Value Pattern; Multiplexing and Fragmentation; Network Address Information. Structured Binary FormatsText Protocol Structures; Numeric Data; Text Booleans; Dates and Times; Variable-Length Data; Structured Text Formats; Encoding Binary Data; Hex Encoding; Base64; Final Words; Chapter 4: Advanced Application Traffic Capture; Rerouting Traffic; Using Traceroute; Routing Tables; Configuring a Router; Enabling Routing on Windows; Enabling Routing on *nix; Network Address Translation; Enabling SNAT; Configuring SNAT on Linux; Enabling DNAT; Forwarding Traffic to a Gateway; DHCP Spoofing; ARP Poisoning; Final Words; Chapter 5: Analysis from the Wire. The Traffic-Producing Application: SuperFunkyChatStarting the Server; Starting Clients; Communicating Between Clients; A Crash Course in Analysis with Wireshark; Generating Network Traffic and Capturing Packets; Basic Analysis; Reading the Contents of a TCP Session; Identifying Packet Structure with Hex Dump; Viewing Individual Packets; Determining the Protocol Structure; Testing Our Assumptions; Dissecting the Protocol with Python; Developing Wireshark Dissectors in Lua; Creating the Dissector; The Lua Dissection; Parsing a Message Packet; Using a Proxy to Actively Analyze Traffic. Setting Up the ProxyProtocol Analysis Using a Proxy; Adding Basic Protocol Parsing; Changing Protocol Behavior; Final Words; Chapter 6: Application Reverse Engineering; Compilers, Interpreters, and Assemblers; Interpreted Languages; Compiled Languages; Static vs. Dynamic Linking; The x86 Architecture; The Instruction Set Architecture; CPU Registers; Program Flow; Operating System Basics; Executable File Formats; Sections; Processes and Threads; Operating System Networking Interface; Application Binary Interface; Static Reverse Engineering; A Quick Guide to Using IDA Pro Free Edition.
Responsibility: James Forshaw.

Abstract:

Attacking Network Protocols is a deep dive into network protocol security from James Forshaw, one of the world's leading bug hunters. This comprehensive guide looks at networking from an attacker's perspective to help you discover, exploit, and ultimately protect vulnerabilities. You'll start with a rundown of networking basics and protocol traffic capture before moving on to static and dynamic protocol analysis, common protocol structures, cryptography, and protocol security. Then you'll turn your focus to finding and exploiting vulnerabilities, with an overview of common bug classes, fuzzing, debugging, and exhaustion attacks. Learn how to: - Capture, manipulate, and replay packets - Develop tools to dissect traffic and reverse engineer code to understand the inner workings of a network protocol - Discover and exploit vulnerabilities such as memory corruptions, authentication bypasses, and denials of service - Use capture and analysis tools like Wireshark and develop your own custom network proxies to manipulate network traffic Attacking Network Protocols is a must-have for any penetration tester, bug hunter, or developer looking to understand and discover network vulnerabilities.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Related Subjects:(2)

User lists with this item (1)

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/1019514867> # Attacking network protocols : a hacker's guide to capture, analysis, and exploitation
    a schema:CreativeWork, schema:Book, schema:MediaObject ;
    library:oclcnum "1019514867" ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/3921134738#Place/place_of_publication_not_identified> ; # Place of publication not identified
    schema:about <http://dewey.info/class/004.62/e23/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/3921134738#Topic/computers_networking_network_protocols> ; # COMPUTERS--Networking--Network Protocols
    schema:about <http://experiment.worldcat.org/entity/work/data/3921134738#Topic/computers> ; # Computers
    schema:bookFormat schema:EBook ;
    schema:creator <http://experiment.worldcat.org/entity/work/data/3921134738#Person/forshaw_james> ; # James Forshaw
    schema:datePublished "2018" ;
    schema:description "Intro; Brief Contents; Contents in Detail; Foreword; Acknowledgments; Introduction; Why Read This Book?; What's in This Book?; How to Use This Book; Contact Me; Chapter 1: The Basics of Networking; Network Architecture and Protocols; The Internet Protocol Suite; Data Encapsulation; Headers, Footers, and Addresses; Data Transmission; Network Routing; My Model for Network Protocol Analysis; Final Words; Chapter 2: Capturing Application Traffic; Passive Network Traffic Capture; Quick Primer for Wireshark; Alternative Passive Capture Techniques; System Call Tracing; The strace Utility on Linux."@en ;
    schema:description "Attacking Network Protocols is a deep dive into network protocol security from James Forshaw, one of the world's leading bug hunters. This comprehensive guide looks at networking from an attacker's perspective to help you discover, exploit, and ultimately protect vulnerabilities. You'll start with a rundown of networking basics and protocol traffic capture before moving on to static and dynamic protocol analysis, common protocol structures, cryptography, and protocol security. Then you'll turn your focus to finding and exploiting vulnerabilities, with an overview of common bug classes, fuzzing, debugging, and exhaustion attacks. Learn how to: - Capture, manipulate, and replay packets - Develop tools to dissect traffic and reverse engineer code to understand the inner workings of a network protocol - Discover and exploit vulnerabilities such as memory corruptions, authentication bypasses, and denials of service - Use capture and analysis tools like Wireshark and develop your own custom network proxies to manipulate network traffic Attacking Network Protocols is a must-have for any penetration tester, bug hunter, or developer looking to understand and discover network vulnerabilities."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/3921134738> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:name "Attacking network protocols : a hacker's guide to capture, analysis, and exploitation"@en ;
    schema:productID "1019514867" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/1019514867#PublicationEvent/place_of_publication_not_identified_no_starch_press_2018> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/3921134738#Agent/no_starch_press> ; # No Starch Press
    schema:url <http://rbdigital.rbdigital.com> ;
    schema:url <http://proxy.library.carleton.ca/login?url=http://proquest.safaribooksonline.com/?uiCode=carleton&xmlId=9781492067504> ;
    schema:url <https://login.library.sheridanc.on.ca/login?url=http://proquestcombo.safaribooksonline.com/?uiCode=sheridan&xmlId=9781492067504> ;
    schema:url <http://proquest.safaribooksonline.com/9781492067504> ;
    schema:url <https://login.gbcprx01.georgebrown.ca/login?url=http://proquest.safaribooksonline.com/?uiCode=geobrown&xmlId=9781492067504> ;
    schema:url <http://public.ebookcentral.proquest.com/choice/publicfullrecord.aspx?p=5331347> ;
    schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=5331347> ;
    schema:url <http://proquestcombo.safaribooksonline.com/9781492067504> ;
    schema:workExample <http://worldcat.org/isbn/9781593277505> ;
    schema:workExample <http://worldcat.org/isbn/9781593278441> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/1019514867> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/3921134738#Agent/no_starch_press> # No Starch Press
    a bgn:Agent ;
    schema:name "No Starch Press" ;
    .

<http://experiment.worldcat.org/entity/work/data/3921134738#Person/forshaw_james> # James Forshaw
    a schema:Person ;
    schema:familyName "Forshaw" ;
    schema:givenName "James" ;
    schema:name "James Forshaw" ;
    .

<http://experiment.worldcat.org/entity/work/data/3921134738#Place/place_of_publication_not_identified> # Place of publication not identified
    a schema:Place ;
    schema:name "Place of publication not identified" ;
    .

<http://experiment.worldcat.org/entity/work/data/3921134738#Topic/computers_networking_network_protocols> # COMPUTERS--Networking--Network Protocols
    a schema:Intangible ;
    schema:name "COMPUTERS--Networking--Network Protocols"@en ;
    .

<http://worldcat.org/isbn/9781593277505>
    a schema:ProductModel ;
    schema:isbn "1593277504" ;
    schema:isbn "9781593277505" ;
    .

<http://worldcat.org/isbn/9781593278441>
    a schema:ProductModel ;
    schema:isbn "1593278446" ;
    schema:isbn "9781593278441" ;
    .

<http://www.worldcat.org/title/-/oclc/1019514867>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/1019514867> ; # Attacking network protocols : a hacker's guide to capture, analysis, and exploitation
    schema:dateModified "2018-12-08" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.