Attacking Network Protocols - Info and Reading Options
A Hacker's Guide to Capture, Analysis, and Exploitation
By James Forshaw


"Attacking Network Protocols" was published by No Starch Press in Dec 08, 2017 - San Francisco, the book is rated 3/5 in google books from 3 ratings, the book is classified in Computers genre, it has 336 pages and the language of the book is English.
“Attacking Network Protocols” Metadata:
- Title: Attacking Network Protocols
- Author: James Forshaw
- Language: English
- Google Books Rating: 3/5 from 3 Ratings.
- Number of Pages: 336
- Is Family Friendly: Yes - No Mature Content
- Publisher: No Starch Press
- Publish Date: Dec 08, 2017
- Publish Location: San Francisco
- Genres: Computers
“Attacking Network Protocols” Subjects and Themes:
- Subjects: Computer network protocols - Computer networks - Security measures - Computer networks, security measures
Edition Identifiers:
- Google Books ID: EVv6DwAAQBAJ
- The Open Library ID: OL26834003M - OL19543311W
- ISBN-13: 9781593277505
- ISBN-10: 1593277504
- All ISBNs: 1593277504 - 9781593277505
AI-generated Review of “Attacking Network Protocols”:
Snippets and Summary:
This comprehensive guide looks at networking from an attacker’s perspective to help you discover, exploit, and ultimately protect vulnerabilities.
"Attacking Network Protocols" Description:
Google Books:
Attacking Network Protocols is a deep dive into network protocol security from James Forshaw, one of the world’s leading bug hunters. This comprehensive guide looks at networking from an attacker’s perspective to help you discover, exploit, and ultimately protect vulnerabilities. You’ll start with a rundown of networking basics and protocol traffic capture before moving on to static and dynamic protocol analysis, common protocol structures, cryptography, and protocol security. Then you’ll turn your focus to finding and exploiting vulnerabilities, with an overview of common bug classes, fuzzing, debugging, and exhaustion attacks. Learn how to: - Capture, manipulate, and replay packets - Develop tools to dissect traffic and reverse engineer code to understand the inner workings of a network protocol - Discover and exploit vulnerabilities such as memory corruptions, authentication bypasses, and denials of service - Use capture and analysis tools like Wireshark and develop your own custom network proxies to manipulate network traffic Attacking Network Protocols is a must-have for any penetration tester, bug hunter, or developer looking to understand and discover network vulnerabilities.
Read “Attacking Network Protocols”:
Read “Attacking Network Protocols” by choosing from the options below.
Explore a Free Online Preview of “Attacking Network Protocols”:
Visit our Preview page to read a free online excerpt provided by Google Books. Click the icon below to begin:

- Public Domain: No
- Availability Status: Partially available
- Availability Status for country: US.
- Available Formats: Text is not avialbe, image copy is not avialbe.
- Google Books Link: Google Books
Search for “Attacking Network Protocols” downloads:
Visit our Downloads Search page to see if downloads are available.
Find “Attacking Network Protocols” in Libraries Near You:
Read or borrow “Attacking Network Protocols” from your local library.
- The WorldCat Libraries Catalog: Find a copy of “Attacking Network Protocols” at a library near you.
Buy “Attacking Network Protocols” online:
Shop for “Attacking Network Protocols” on popular online marketplaces.
- Ebay: New and used books.