Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation - Info and Reading Options
By James Forshaw

"Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation" is published by No Starch Press in Dec 08, 2017 - Erscheinungsort nicht ermittelbar and it has 336 pages.
“Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation” Metadata:
- Title: ➤ Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation
- Author: James Forshaw
- Number of Pages: 336
- Publisher: No Starch Press
- Publish Date: Dec 08, 2017
- Publish Location: ➤ Erscheinungsort nicht ermittelbar
“Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation” Subjects and Themes:
- Subjects: Computer network protocols - Computer networks - Security measures - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: OL26834003M - OL19543311W
- ISBN-13: 9781593277505 - 9781593278441
- ISBN-10: 1593277504
- All ISBNs: 1593277504 - 9781593277505 - 9781593278441
AI-generated Review of “Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation”:
"Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation" Description:
Open Data:
Intro -- Title Page -- Copyright Page -- About the Author -- About the Technical Reviewer -- Brief Contents -- Contents in Detail -- Foreword by Katie Moussouris -- Acknowledgments -- Introduction -- Why Read This Book? -- What's in This Book? -- How to Use This Book -- Contact Me -- Chapter 1: The Basics of Networking -- Network Architecture and Protocols -- The Internet Protocol Suite -- Data Encapsulation -- Headers, Footers, and Addresses -- Data Transmission -- Network Routing -- My Model for Network Protocol Analysis -- Final Words -- Chapter 2: Capturing Application Traffic -- Passive Network Traffic Capture -- Quick Primer for Wireshark -- Alternative Passive Capture Techniques -- System Call Tracing -- The strace Utility on Linux -- Monitoring Network Connections with DTrace -- Process Monitor on Windows -- Advantages and Disadvantages of Passive Capture -- Active Network Traffic Capture -- Network Proxies -- Port-Forwarding Proxy -- SOCKS Proxy -- HTTP Proxies -- Forwarding an HTTP Proxy -- Reverse HTTP Proxy -- Final Words -- Chapter 3: Network Protocol Structures -- Binary Protocol Structures -- Numeric Data -- Booleans -- Bit Flags -- Binary Endian -- Text and Human-Readable Data -- Variable Binary Length Data -- Dates and Times -- POSIX/Unix Time -- Windows FILETIME -- Tag, Length, Value Pattern -- Multiplexing and Fragmentation -- Network Address Information -- Structured Binary Formats -- Text Protocol Structures -- Numeric Data -- Text Booleans -- Dates and Times -- Variable-Length Data -- Structured Text Formats -- Encoding Binary Data -- Hex Encoding -- Base64 -- Final Words -- Chapter 4: Advanced Application Traffic Capture -- Rerouting Traffic -- Using Traceroute -- Routing Tables -- Configuring a Router -- Enabling Routing on Windows -- Enabling Routing on *nix -- Network Address Translation -- Enabling SNAT
Read “Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation”:
Read “Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation” by choosing from the options below.
Search for “Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation” downloads:
Visit our Downloads Search page to see if downloads are available.
Find “Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation” in Libraries Near You:
Read or borrow “Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation” from your local library.
- The WorldCat Libraries Catalog: Find a copy of “Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation” at a library near you.
Buy “Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation” online:
Shop for “Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation” on popular online marketplaces.
- Ebay: New and used books.