Introduction
Chapter 1: The Basics of Networking
Chapter 2: Capturing Application Traffic
Chapter 3: Network Protocol Structures
Chapter 4: Developing an Analysis Framework
Chapter 5: Advanced Traffic Capture
Chapter 6: Analysis from the Wire
Chapter 7: Application Reverse Engineering
Chapter 8: Network Protocol Security
Chapter 9: Implementing the Protocol
Chapter 10: Root Causes of Vulnerabilities
Chapter 11: Fuzzing, Debugging, and Exploit Development
Appendix: Binary Protocol Exploiter’s Toolkit
James Forshaw is a freelancing debugging cowboy with ten years of experience in the security field, from cracking game consoles to exposing a $100,000 exploit for Microsoft. He's the creator of the protocol capture tool, CANAPE, and gives talks at hacker conferences like Black Hat and Chaos Computer Congress
"One of the best, if not the best, reference books on this
material."
—Andrew Swoboda, Tripwire
“Very readable and accessible...worth reading even if your only
interest in network security is as an applications developer.”
—I Programmer
"Whether you're a pen tester, fuzzer, or a serene developer seeking
understanding of what not to do, this book is an excellent
beginner's guide."
—Sven Dietrich, IEEE Cipher, Cipher Book Review
"Concise and easy to follow."
—Nicky Lim, Goodreads Reviewer
Ask a Question About this Product More... |