Cargando…

Attacking network protocols : a hacker's guide to capture, analysis, and exploitation /

Attacking Network Protocols is a deep dive into network protocol security from James Forshaw, one of the world's leading bug hunters. This comprehensive guide looks at networking from an attacker's perspective to help you discover, exploit, and ultimately protect vulnerabilities. You'...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Forshaw, James
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [Place of publication not identified] : No Starch Press, 2018.
Ã2018
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ma 4500
001 OR_on1019514867
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 090713s2018 xx o 000 u eng d
040 |a RECBK  |b eng  |e pn  |c RECBK  |d OCLCF  |d OCLCO  |d EBLCP  |d UMI  |d MERUC  |d OCLCQ  |d IDB  |d OCLCO  |d TOH  |d QCL  |d CEF  |d KSU  |d OCLCQ  |d G3B  |d S9I  |d UAB  |d YOU  |d K6U  |d AU@  |d COO  |d RDF  |d OCLCQ  |d OCLCO  |d OCL  |d OCLCQ 
019 |a 1031484504 
020 |a 9781593278441  |q (electronic bk.) 
020 |a 1593278446 
020 |z 9781593277505 
020 |a 1593277504 
020 |a 9781593277505 
028 0 2 |a EB00704636  |b Recorded Books 
029 1 |a AU@  |b 000063880388 
035 |a (OCoLC)1019514867  |z (OCoLC)1031484504 
037 |a CL0500000957  |b Safari Books Online 
050 4 |a TK5105.55 
080 |a 004.738.5.057.4 
082 0 4 |a 004.62  |2 23 
049 |a UAMI 
100 1 |a Forshaw, James. 
245 1 0 |a Attacking network protocols :  |b a hacker's guide to capture, analysis, and exploitation /  |c James Forshaw. 
260 |a [Place of publication not identified] :  |b No Starch Press,  |c 2018. 
264 4 |c Ã2018 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file  |2 rda 
520 |a Attacking Network Protocols is a deep dive into network protocol security from James Forshaw, one of the world's leading bug hunters. This comprehensive guide looks at networking from an attacker's perspective to help you discover, exploit, and ultimately protect vulnerabilities. You'll start with a rundown of networking basics and protocol traffic capture before moving on to static and dynamic protocol analysis, common protocol structures, cryptography, and protocol security. Then you'll turn your focus to finding and exploiting vulnerabilities, with an overview of common bug classes, fuzzing, debugging, and exhaustion attacks. Learn how to: - Capture, manipulate, and replay packets - Develop tools to dissect traffic and reverse engineer code to understand the inner workings of a network protocol - Discover and exploit vulnerabilities such as memory corruptions, authentication bypasses, and denials of service - Use capture and analysis tools like Wireshark and develop your own custom network proxies to manipulate network traffic Attacking Network Protocols is a must-have for any penetration tester, bug hunter, or developer looking to understand and discover network vulnerabilities. 
500 |a Title from resource description page (Recorded Books, viewed January 08, 2018). 
505 0 |a Intro; Brief Contents; Contents in Detail; Foreword; Acknowledgments; Introduction; Why Read This Book?; What's in This Book?; How to Use This Book; Contact Me; Chapter 1: The Basics of Networking; Network Architecture and Protocols; The Internet Protocol Suite; Data Encapsulation; Headers, Footers, and Addresses; Data Transmission; Network Routing; My Model for Network Protocol Analysis; Final Words; Chapter 2: Capturing Application Traffic; Passive Network Traffic Capture; Quick Primer for Wireshark; Alternative Passive Capture Techniques; System Call Tracing; The strace Utility on Linux. 
505 8 |a Monitoring Network Connections with DTraceProcess Monitor on Windows; Advantages and Disadvantages of Passive Capture; Active Network Traffic Capture; Network Proxies; Port-Forwarding Proxy; SOCKS Proxy; HTTP Proxies; Forwarding an HTTP Proxy; Reverse HTTP Proxy; So Which Approach Should You Use?; Chapter 3: Network Protocol Structures; Binary Protocol Structures; Numeric Data; Booleans; Bit Flags; Binary Endian; Strings; Variable Binary Length Data; Dates and Times; POSIX/Unix Time; Windows FILETIME; Tag, Length, Value Pattern; Multiplexing and Fragmentation; Network Address Information. 
505 8 |a Structured Binary FormatsText Protocol Structures; Numeric Data; Text Booleans; Dates and Times; Variable-Length Data; Structured Text Formats; Encoding Binary Data; Hex Encoding; Base64; Final Words; Chapter 4: Advanced Application Traffic Capture; Rerouting Traffic; Using Traceroute; Routing Tables; Configuring a Router; Enabling Routing on Windows; Enabling Routing on *nix; Network Address Translation; Enabling SNAT; Configuring SNAT on Linux; Enabling DNAT; Forwarding Traffic to a Gateway; DHCP Spoofing; ARP Poisoning; Final Words; Chapter 5: Analysis from the Wire. 
505 8 |a The Traffic-Producing Application: SuperFunkyChatStarting the Server; Starting Clients; Communicating Between Clients; A Crash Course in Analysis with Wireshark; Generating Network Traffic and Capturing Packets; Basic Analysis; Reading the Contents of a TCP Session; Identifying Packet Structure with Hex Dump; Viewing Individual Packets; Determining the Protocol Structure; Testing Our Assumptions; Dissecting the Protocol with Python; Developing Wireshark Dissectors in Lua; Creating the Dissector; The Lua Dissection; Parsing a Message Packet; Using a Proxy to Actively Analyze Traffic. 
505 8 |a Setting Up the ProxyProtocol Analysis Using a Proxy; Adding Basic Protocol Parsing; Changing Protocol Behavior; Final Words; Chapter 6: Application Reverse Engineering; Compilers, Interpreters, and Assemblers; Interpreted Languages; Compiled Languages; Static vs. Dynamic Linking; The x86 Architecture; The Instruction Set Architecture; CPU Registers; Program Flow; Operating System Basics; Executable File Formats; Sections; Processes and Threads; Operating System Networking Interface; Application Binary Interface; Static Reverse Engineering; A Quick Guide to Using IDA Pro Free Edition. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computers. 
650 0 |a Electronic digital computers. 
650 6 |a Ordinateurs. 
650 7 |a computers.  |2 aat 
650 7 |a COMPUTERS  |x Networking  |x Network Protocols.  |2 bisacsh 
650 7 |a Electronic digital computers.  |2 fast  |0 (OCoLC)fst00907122 
650 7 |a Computers.  |2 fast  |0 (OCoLC)fst00872776 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781492067504/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6047314 
938 |a Recorded Books, LLC  |b RECE  |n rbeEB00704636 
994 |a 92  |b IZTAP