Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation
Thumbnail 1

Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation

4.7/5
Product ID: 125258577
Secure Transaction
12 interest-free installments with tabby
Frequently Bought Together

Description

Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation

Reviews

4.7

All from verified purchases

O**G

not balanced

The mark is for the book itself, not for Amazon service (which is above all expectations).the level of the book is inconsistent. there are parts that are known by anyone slightly interested in theme others significantly miss explanation. better would be to cover less topics but not be so greedy for explanation

C**E

Great book.

So much information in one place!Purchased the ebook first then had to get the paperback.

S**S

Top heavy on theory

Top heavy on theory and the application aspect lacks. Labs are preferred.

K**I

Great book in good shape, just like advertised.

This is an excellent book in good shape, just like advertised. I had to check my Amazon order to confirm the book is a used one. This book covers the most critical aspects of network security, including reverse engineering (compilers and assemblers) and great network analysis tools I did not know.

T**N

Excellent

Excellent

G**R

Get ready to get your hands on analysis and exploitation of network applications!

James Forshaw did a good on explaining the inner workings of network protocols, cipher methods used to provide security and integrity to the information, some methods to debug apps and a ton of methods to exploit them.

M**G

Covers the important stuff

This was well worth reading. it gave a short refresher of the basics of networking and then got into the how to capture, analyze, and exploit them.

M**9

Computer book

Bought as a gift for my cyber-leaning son.

E**K

It is a very interesting book

The book has in depth information to perform traffic sniffing without neet Wireshark, i.e. it has a lot of scripts (source code) to perform traffic analysis, Wireshark is explained also, however, can be detected by security tools, and the book is providing these scripts to do his analysis by yourself and not neeing detected easyly by security tools. great book.

N**A

Just awesome

Pure, organic juice. It's hard to believe someone still writes this kind of books. Most other books I read these days are worth less than the paper they are printed on.

S**0

Great book, been waiting for this one for a ...

Great book, been waiting for this one for a while. Would highly recommend getting a copy and look forward to more from the author and another great book from NoStarch 10/10

S**E

Good

Lots of relevant information.

W**K

Brilliant book

This book is epic. It allowed me to build on my basic self taught knowledge, to a now professional standard. Certainly worth a purchase 100% recommend.

Common Questions

Trustpilot

TrustScore 4.5 | 7,300+ reviews

Yusuf A.

Fantastic experience overall. Will recommend to friends and family.

1 month ago

Sneha T.

Received my product in pristine condition. Great service overall.

1 month ago

Shop Global, Save with Desertcart
Value for Money
Competitive prices on a vast range of products
Shop Globally
Serving millions of shoppers across more than 100 countries
Enhanced Protection
Trusted payment options loved by worldwide shoppers
Customer Assurance
Trusted payment options loved by worldwide shoppers.
Desertcart App
Shop on the go, anytime, anywhere.
AED 197

Duties & taxes incl.

UAEstore
1
Free Shipping

with PRO Membership

Delivery Partners: iMile, Transcorp

Free Returns

30 daysfor PRO membership users

15 dayswithout membership

Secure Transaction
12 interest-free installments with tabby

Trustpilot

TrustScore 4.5 | 7,300+ reviews

Ali H.

Fast shipping and excellent packaging. The Leatherman tool feels very premium and sturdy.

1 day ago

Meera L.

Smooth transaction and product arrived in perfect condition.

3 weeks ago

Attacking Network Protocols A Hackers Guide To Capture Analysis Exploitation | Desertcart UAE