Forshaw | Attacking Network Protocols | Buch | 978-1-59327-750-5 | sack.de

Buch, Englisch, 408 Seiten, Format (B × H): 177 mm x 233 mm, Gewicht: 640 g

Forshaw

Attacking Network Protocols

A Hacker's Guide to Capture, Analysis, and Exploitation
1. Auflage 2017
ISBN: 978-1-59327-750-5
Verlag: Random House LLC US

A Hacker's Guide to Capture, Analysis, and Exploitation

Buch, Englisch, 408 Seiten, Format (B × H): 177 mm x 233 mm, Gewicht: 640 g

ISBN: 978-1-59327-750-5
Verlag: Random House LLC US


Attacking Network Protocols is a deep-dive into network vulnerability discovery from James Forshaw, Microsoft’s top bug hunter. This comprehensive guide looks at networking from an attacker’s perspective to help you find, exploit, and ultimately protect vulnerabilities. Part I starts with a rundown of networking basics and traffic capture, as it builds a foundation for analyzing a network. Part II moves on to protocol analysis, both static and dynamic; you’ll learn about common protocol structures, cryptography, and protocol security, and how to reverse engineer code with IDA Pro, ILSpy, and Javasnoop. Part III focuses on finding and exploiting vulnerabilities, including an overview of common bug classes, fuzzing, debugging, exhaustion attacks, and how to develop custom tools. Forshaw ends with an overview of the best tools for analyzing and exploiting networks. By the book’s end, you’ll have a deep understanding of how to analyze network communication and where to look for vulnerabilities. You’ll learn how to: - Capture, manipulate, and spoof packets both passively and on the wire - Reverse engineer code, brute force passwords, and decrypt traffic - Exploit vulnerabilities with denial-of-service attacks, authentication and authorization bypasses, and memory corruptions - Use capture and analysis tools like IDA Pro, Wireshark, and CANAPE - Strengthen your exploits by rerouting network traffic, exploiting compression, and controlling data flow Attacking Network Protocols is a must-have for any penetration tester, bug hunter, or developer looking to exploit and secure network vulnerabilities.
Forshaw Attacking Network Protocols jetzt bestellen!

Zielgruppe


Bug Hunter, Penetration Tester, Developer


Autoren/Hrsg.


Weitere Infos & Material


Forshaw, James
James Forshaw is a freelancing debugging cowboy with ten years of experience in the security field, from cracking game consoles to exposing a $100,000 exploit for Microsoft. He’s the creator of the protocol capture tool, CANAPE, and gives talks at hacker conferences like Black Hat and Chaos Computer Congress.

James Forshaw is a freelancing debugging cowboy with ten years of experience in the security field, from cracking game consoles to exposing a $100,000 exploit for Microsoft. He’s the creator of the protocol capture tool, CANAPE, and gives talks at hacker conferences like Black Hat and Chaos Computer Congress.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.