A Hacker’s Guide To Captur, Analysis And Exploitation

INTRODUCTION

When first introduced, the technology that allowed devices to connect to a network was exclusive to large companies and governments. Today, most people carry a fully networked computing device in their pocket, and with the rise of the Internet of Things (IoT), you can add devices such as your fridge and our home’s security system to this interconnected world. The security of these connected devices is therefore increasingly important.

Although you might not be too concerned about someone disclosing the details of how many yogurts you buy, if your smartphone is compromised over the same network as your fridge, you could lose all your personal and financial information to a malicious attacker. This book is named Attacking Network Protocols because to find security vulnerabilities in a network-connected device, you need to adopt the mind-set of the attacker who wants to exploit those weaknesses. Network protocols communicate with other devices on a network, and because these protocols must be exposed to a public network and often don’t undergo the same level of scrutiny as other components of a device, they’re an obvious attack target.

CONTENTS

  • Acknowledgments
  • Introduction
  • Chapter 1: The Basics of Networking
  • Chapter 2: Capturing Application Traffic
  • Chapter 3: Network Protocol Structures
  • Chapter 4: Advanced Application Traffic Capture
  • Chapter 5: Analysis from the Wire
  • Chapter 6: Application Reverse Engineering
  • Chapter 7: Network Protocol Security
  • Chapter 8: Implementing the Network Protocol
  • Chapter 9: The Root Causes of Vulnerabilities
  • Chapter 10: Finding and Exploiting Security Vulnerabilities
  • Appendix: Network Protocol Analysis Toolkit

Download PDF

Happy learning!

4 Likes