Attacking Network Protocols A Hacker's Guide to Capture, Analysis, and 无水印原版pdf

所需积分/C币:13 2018-03-16 17:32:27 12.11MB PDF
收藏 收藏 3
举报

Attacking Network Protocols A Hacker's Guide to Capture, Analysis, and Exploitation 英文无水印原版pdf pdf所有页面使用FoxitReader、PDF-XChangeViewer、SumatraPDF和Firefox测试都可以打开 本资源转载自网络,如有侵权,请联系上传者或csdn删除 查看此书详细信息请在美国亚马逊官网搜索此书
ATTACKING NETWORK PROTOCOLS. Copyright o 2018 by James Forshaw All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system, without the prior written permission of the copyright owner and the publisher ISBN-10:1-59327-750-4 ISBN-13:978-1-59327-750-5 Publisher: william pollock Production editor: laurel chun Cover Illustration: Garry Booth Interior Design: Octopod Studios Developmental Editors: Liz Chadwick and William Pollock Technical Reviewers: Cliff Janzen Additional Technical Reviewers: Arrigo Triulzi and Peter Gutmann Copyeditor: Anne marie Walker Compositors: Laurel Chun and Meg sneeringer Proofreader: Paula L. Flemin Indexer: bIM Creatives. LLC For information on distribution, translations, or bulk sales, please contact No Starch Press, Inc. directly No Starch press Inc 245 8th Street. San Francisco. CA 94103 hone:1.415.863.9900:info@nostarch.com www.nostarch.com Library of Congress Control Number: 2017954429 No Starch Press and the no Starch Press logo are registered trademarks of No starch Press, Inc. Other product and company names mentioned herein may be the trademarks of their respective owners. Rather than use a trademark symbol with every occurrence of a trademarked name, we are using the names only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark The information in this book is distributed on an"As Is"basis, without warranty. While every precaution has been taken in the preparation of this work, neither the author nor No Starch Press, Inc shall have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the information contained in it About the author James Forshaw is a renowned computer security researcher at Google project Zero, with more than ten years of experience in analyzing and exploiting application network protocols. His skills range from cracking game consoles to exposing complex design issues in operating systems, especially Microsoft Windows, which earned him the top bug bounty of $100,000 and placed him as the #i researcher on microsoft security response Center's (MSRC published list. He's the creator of the network protocol analysis tool, Canape, which was developed from his years of experience he's been invited to present his novel security research at global security conferences such as blackHat, Can SecWest and Chaos Computer Congress About the technical reviewer Since the early days of Commodore PEt and VIC-20, technology has been a constant companion(and sometimes an obsession! )to Cliff Janzen. Cliff discovered his career passion when he moved to information security in 2008 after a decade of It operations Since then Cliff has had the great fortune to work with and learn from some of the best people in the industry, including Mr. Forshaw and the fine people at No Starch during the production of this book. He is happily employed as a security consultant, doing everything from policy review to penetration tests. He feels lucky to have a career that is also his favorite hobby and a wife who supports him BRIEF CONTENTS reword by katie Mloussouris Acknowledgments Introduction Chapter 1 The Basics of Networking Chapter 2: Capturing Application Traffic Chapter 3: Network Protocol Structures Chapter 4: Advanced Application Traffic Capture Chapter 5: Analysis from the Wire Chapter 6: Application Reverse Engineering Chapter 7: Network Protocol Security Chapter 8: Implementing the Network Protocol Chapter 9 The Root Causes of vulnerabilities Chapter 10: Finding and Exploiting security vulnerabilities Appendix Network Protocol Analysis Toolkit Index CONTENTS IN DETAIL FOREWORD by Katie Moussouris ACKNOWLEDGMENTS INTRODUCTION Why read This book? What's in This book? How to Use This book Contact me THE BASICS OF NETWORKING Network architecture and Protocols The Internet protocol suite Data Encapsulation Headers Footers and addresses Data transmission etwor ck routing My Model for Network Protocol analysis Final words CAPTURING APPLICATION TRAFFIC Passive Network traffic Capture Quick Primer for wireshark Alternative Passive Capture Techniques System Call tracing The strace Utility on linux Monitoring Network Connections with dtrace Process monitor on windows Advantages and Disadvantages of Passive Capture Active Network Traffic Capture Network Proxies Port-Forwarding Proxy SOCKS Proxy Http Proxies ForwardinganhttpProxy Reversehttpproxy Final words NETWORK PROTOCOL STRUCTURES Binary protocol structures Numeric data Booleans Bit Flags Binary Endian Text and human-Readable data Variable binary length data Dates and times POSIX/Unix time WindowS FIletime Tag, Length, Value Pattern Multiplexing and fragmentation etwork address Information Structured Binary Formats Text Protocol Structures Numeric data Text booleans Dates and times Variable-Length data Structured text formats Encoding Binary Data Hex encoding Base64 Final words 4 ADVANCED APPLICATION TRAFFIC CAPTURE Rerouting traffic Using traceroute Routing tables Configuring a router Enabling routing on windows Enabling routing on *nix Network Address translation Enabling snat Configuring snat on linux Enabling dnat Forwarding Traffic to a gateway DHCP Spoofing ARP Poisoning Final words ANALYSIS FROM THE WIRE e l raiic-Producing Application: SuperFunkychat Starting e server Starting clients Communicating Between Clients A Crash Course in analysis with Wireshark Generating Network Traffic and Capturing Packets Basic analysis Reading the contents of a TCP Session Identifying Packet Structure with Hex dump Viewing individual Packets Determining the Protocol Structure Testing Our assumptions Dissecting the protocol with Python Developing Wireshark Dissectors in Lua Creating the dissector The Lua dissection Parsing a message packet Using a Proxy to Actively analyze Traffic Setting Up the proxy Protocol Analysis Using a Proxy Adding basic protocol parsing Changing protocol behavior Final words APPLICATION REVERSE ENGINEERING Compilers, Interpreters, and assemblers Interpreted Languages Compiled languages Static vs. Dynamic Linking g The x86 Architecture The Instruction set architecture CPU Registers Program Flow Operating system basics Executable file formats Sections Processes and Threads Operating system networking Interface pplication Binary Interface Static Reverse Engineering A Quick Guide to Using Ida Pro Free Edition Analyzing Stack Variables and Arguments Identifying Key functionality Dynamic Reverse engineering Setting Breakpoints Debugger Windows Where to Set breakpoints? Reverse engineering managed languages NET AL pplications sing EsPy Java applications Dealing with Obfuscation Reverse engineering Resources Final words NETWORK PROTOCOL SECURITY Encryption Algorithms Substitution Ciphers XOR Encryption Random number generators Symmetric Key Cryptography Block ciphers Block Cipher modes Block Cipher padding

...展开详情
试读 127P Attacking Network Protocols A Hacker's Guide to Capture, Analysis, and 无水印原版pdf
立即下载 低至0.43元/次 身份认证VIP会员低至7折
    一个资源只可评论一次,评论内容不能少于5个字
    ffs2008 不错,安全分析角度变换学习一下
    2019-01-25
    回复
    linix999 书还可以的
    2018-11-05
    回复
    weixin_40472804 不错,安全分析角度变换学习一下
    2018-04-20
    回复
    img

    关注 私信 TA的资源

    上传资源赚积分,得勋章
    最新推荐
    Attacking Network Protocols A Hacker's Guide to Capture, Analysis, and 无水印原版pdf 13积分/C币 立即下载
    1/127
    Attacking Network Protocols A Hacker's Guide to Capture, Analysis, and 无水印原版pdf第1页
    Attacking Network Protocols A Hacker's Guide to Capture, Analysis, and 无水印原版pdf第2页
    Attacking Network Protocols A Hacker's Guide to Capture, Analysis, and 无水印原版pdf第3页
    Attacking Network Protocols A Hacker's Guide to Capture, Analysis, and 无水印原版pdf第4页
    Attacking Network Protocols A Hacker's Guide to Capture, Analysis, and 无水印原版pdf第5页
    Attacking Network Protocols A Hacker's Guide to Capture, Analysis, and 无水印原版pdf第6页
    Attacking Network Protocols A Hacker's Guide to Capture, Analysis, and 无水印原版pdf第7页
    Attacking Network Protocols A Hacker's Guide to Capture, Analysis, and 无水印原版pdf第8页
    Attacking Network Protocols A Hacker's Guide to Capture, Analysis, and 无水印原版pdf第9页
    Attacking Network Protocols A Hacker's Guide to Capture, Analysis, and 无水印原版pdf第10页
    Attacking Network Protocols A Hacker's Guide to Capture, Analysis, and 无水印原版pdf第11页
    Attacking Network Protocols A Hacker's Guide to Capture, Analysis, and 无水印原版pdf第12页
    Attacking Network Protocols A Hacker's Guide to Capture, Analysis, and 无水印原版pdf第13页
    Attacking Network Protocols A Hacker's Guide to Capture, Analysis, and 无水印原版pdf第14页
    Attacking Network Protocols A Hacker's Guide to Capture, Analysis, and 无水印原版pdf第15页
    Attacking Network Protocols A Hacker's Guide to Capture, Analysis, and 无水印原版pdf第16页
    Attacking Network Protocols A Hacker's Guide to Capture, Analysis, and 无水印原版pdf第17页
    Attacking Network Protocols A Hacker's Guide to Capture, Analysis, and 无水印原版pdf第18页
    Attacking Network Protocols A Hacker's Guide to Capture, Analysis, and 无水印原版pdf第19页
    Attacking Network Protocols A Hacker's Guide to Capture, Analysis, and 无水印原版pdf第20页

    试读已结束,剩余107页未读...

    13积分/C币 立即下载 >