Book description
Attacking Network Protocols is a deep-dive into network vulnerability discovery from James Forshaw, Microsoft's top bug hunter. This comprehensive guide looks at networking from an attacker's perspective to help you find, exploit, and ultimately protect vulnerabilities.
Part I starts with a rundown of networking basics and traffic capture, as it builds a foundation for analyzing a network. Part II moves on to protocol analysis, both static and dynamic; you'll learn about common protocol structures, cryptography, and protocol security, and how to reverse engineer code with IDA Pro, ILSpy, and Javasnoop. Part III focuses on finding and exploiting vulnerabilities, including an overview of common bug classes, fuzzing, debugging, exhaustion attacks, and how to develop custom tools. Forshaw ends with an overview of the best tools for analyzing and exploiting networks. By the book's end, you'll have a deep understanding of how to analyze network communication and where to look for vulnerabilities. You'll learn how to:
- Capture, manipulate, and spoof packets both passively and on the wire
- Create your own capture framework
- Reverse engineer code, brute force passwords, and decrypt traffic
- Exploit vulnerabilities with denial-of-service attacks, SQL injections, and memory corruptions
- Use protocol capture tools like IDA Pro, Wireshark, and CANAPE
- Strengthen your exploits by rerouting network traffic, exploiting compression, and controlling data flow
Publisher resources
Table of contents
- Cover Page
- Title Page
- Copyright Page
- About the Author
- About the Technical Reviewer
- Brief Contents
- Contents in Detail
- Foreword by Katie Moussouris
- Acknowledgments
- Introduction
- Chapter 1: The Basics of Networking
- Chapter 2: Capturing Application Traffic
- Chapter 3: Network Protocol Structures
- Chapter 4: Advanced Application Traffic Capture
- Chapter 5: Analysis from the Wire
- Chapter 6: Application Reverse Engineering
- Chapter 7: Network Protocol Security
- Chapter 8: Implementing the Network Protocol
-
Chapter 9: The Root Causes of Vulnerabilities
- Vulnerability Classes
- Memory Corruption Vulnerabilities
- Default or Hardcoded Credentials
- User Enumeration
- Incorrect Resource Access
- Memory Exhaustion Attacks
- Storage Exhaustion Attacks
- CPU Exhaustion Attacks
- Format String Vulnerabilities
- Command Injection
- SQL Injection
- Text-Encoding Character Replacement
- Final Words
- Chapter 10: Finding and Exploiting Security Vulnerabilities
- Appendix: Network Protocol Analysis Toolkit
- Index
- Resources
- The Electronic Frontier Foundation (EFF)
- Footnotes
Product information
- Title: Attacking Network Protocols
- Author(s):
- Release date: August 2017
- Publisher(s): No Starch Press
- ISBN: 9781593277505
You might also like
book
Network Protocols for Security Professionals
Get to grips with network-based attacks and learn to defend your organization's network and network devices …
book
Network Security, Firewalls, and VPNs, 3rd Edition
Network Security, Firewalls, and VPNs, third Edition provides a unique, in-depth look at the major business …
book
Hands-On Network Forensics
Gain basic skills in network forensics and learn how to apply them effectively Key Features Investigate …
book
Cyber Security and Network Security
CYBER SECUTIRY AND NETWORK SECURITY Written and edited by a team of experts in the field, …