"Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation" - Information and Links:

Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation - Info and Reading Options

Book's cover
The cover of “Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation” - Open Library.

"Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation" is published by No Starch Press in Dec 08, 2017 - Erscheinungsort nicht ermittelbar and it has 336 pages.


“Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation” Metadata:

  • Title: ➤  Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation
  • Author:
  • Number of Pages: 336
  • Publisher: No Starch Press
  • Publish Date:
  • Publish Location: ➤  Erscheinungsort nicht ermittelbar

“Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation” Subjects and Themes:

Edition Identifiers:

AI-generated Review of “Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation”:


"Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation" Description:

Open Data:

Intro -- Title Page -- Copyright Page -- About the Author -- About the Technical Reviewer -- Brief Contents -- Contents in Detail -- Foreword by Katie Moussouris -- Acknowledgments -- Introduction -- Why Read This Book? -- What's in This Book? -- How to Use This Book -- Contact Me -- Chapter 1: The Basics of Networking -- Network Architecture and Protocols -- The Internet Protocol Suite -- Data Encapsulation -- Headers, Footers, and Addresses -- Data Transmission -- Network Routing -- My Model for Network Protocol Analysis -- Final Words -- Chapter 2: Capturing Application Traffic -- Passive Network Traffic Capture -- Quick Primer for Wireshark -- Alternative Passive Capture Techniques -- System Call Tracing -- The strace Utility on Linux -- Monitoring Network Connections with DTrace -- Process Monitor on Windows -- Advantages and Disadvantages of Passive Capture -- Active Network Traffic Capture -- Network Proxies -- Port-Forwarding Proxy -- SOCKS Proxy -- HTTP Proxies -- Forwarding an HTTP Proxy -- Reverse HTTP Proxy -- Final Words -- Chapter 3: Network Protocol Structures -- Binary Protocol Structures -- Numeric Data -- Booleans -- Bit Flags -- Binary Endian -- Text and Human-Readable Data -- Variable Binary Length Data -- Dates and Times -- POSIX/Unix Time -- Windows FILETIME -- Tag, Length, Value Pattern -- Multiplexing and Fragmentation -- Network Address Information -- Structured Binary Formats -- Text Protocol Structures -- Numeric Data -- Text Booleans -- Dates and Times -- Variable-Length Data -- Structured Text Formats -- Encoding Binary Data -- Hex Encoding -- Base64 -- Final Words -- Chapter 4: Advanced Application Traffic Capture -- Rerouting Traffic -- Using Traceroute -- Routing Tables -- Configuring a Router -- Enabling Routing on Windows -- Enabling Routing on *nix -- Network Address Translation -- Enabling SNAT

Read “Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation”:

Read “Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation” by choosing from the options below.

Search for “Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation” downloads:

Visit our Downloads Search page to see if downloads are available.

Find “Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation” in Libraries Near You:

Read or borrow “Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation” from your local library.

Buy “Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation” online:

Shop for “Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation” on popular online marketplaces.