TOP
0
0
【簡體曬書區】 單本79折,5本7折,活動好評延長至5/31,趕緊把握這一波!
Attacking Network Protocols ─ A Hacker's Guide to Capture, Analysis, and Exploitation
滿額折

Attacking Network Protocols ─ A Hacker's Guide to Capture, Analysis, and Exploitation

定  價:NT$ 1748 元
優惠價:791381
領券後再享88折
無庫存,下單後進貨(到貨天數約30-45天)
可得紅利積點:41 點
相關商品
商品簡介
作者簡介

商品簡介

Attacking Network Protocols is a deep-dive into network vulnerability discovery from James Forshaw, Microsoft’s top bug hunter. This comprehensive guide looks at networking from an attacker’s perspective to help you find, exploit, and ultimately protect vulnerabilities.

Part I starts with a rundown of networking basics and traffic capture, as it builds a foundation for analyzing a network. Part II moves on to protocol analysis, both static and dynamic; you’ll learn about common protocol structures, cryptography, and protocol security, and how to reverse engineer code with IDA Pro, ILSpy, and Javasnoop. Part III focuses on finding and exploiting vulnerabilities, including an overview of common bug classes, fuzzing, debugging, exhaustion attacks, and how to develop custom tools. Forshaw ends with an overview of the best tools for analyzing and exploiting networks. By the book’s end, you’ll have a deep understanding of how to analyze network communication and where to look for vulnerabilities.

You’ll learn how to:
-Capture, manipulate, and spoof packets both passively and on the wire
-Reverse engineer code, brute force passwords, and decrypt traffic
-Exploit vulnerabilities with denial-of-service attacks, authentication and authorization bypasses, and memory corruptions
-Use capture and analysis tools like IDA Pro, Wireshark, and CANAPE
-Strengthen your exploits by rerouting network traffic, exploiting compression, and controlling data flow

Attacking Network Protocols is a must-have for any penetration tester, bug hunter, or developer looking to exploit and secure network vulnerabilities.

作者簡介

James Forshaw is a freelancing debugging cowboy with ten years of experience in the security field, from cracking game consoles to exposing a $100,000 exploit for Microsoft. He’s the creator of the protocol capture tool, CANAPE, and gives talks at hacker conferences like Black Hat and Chaos Computer Congress.

您曾經瀏覽過的商品

購物須知

外文書商品之書封,為出版社提供之樣本。實際出貨商品,以出版社所提供之現有版本為主。部份書籍,因出版社供應狀況特殊,匯率將依實際狀況做調整。

無庫存之商品,在您完成訂單程序之後,將以空運的方式為你下單調貨。為了縮短等待的時間,建議您將外文書與其他商品分開下單,以獲得最快的取貨速度,平均調貨時間為1~2個月。

為了保護您的權益,「三民網路書店」提供會員七日商品鑑賞期(收到商品為起始日)。

若要辦理退貨,請在商品鑑賞期內寄回,且商品必須是全新狀態與完整包裝(商品、附件、發票、隨貨贈品等)否則恕不接受退貨。

優惠價:79 1381
無庫存,下單後進貨
(到貨天數約30-45天)

暢銷榜

客服中心

收藏

會員專區