Attacking Network Protocols
- 336bladzijden
- 12 uur lezen
Introduction Chapter 1: The Basics of Networking Chapter 2: Capturing Application Traffic Chapter 3: Network Protocol Structures Chapter 4: Developing an Analysis Framework Chapter 5: Advanced Traffic Capture Chapter 6: Analysis from the Wire Chapter 7: Application Reverse Engineering Chapter 8: Network Protocol Security Chapter 9: Implementing the Protocol Chapter 10: Root Causes of Vulnerabilities Chapter 11: Fuzzing, Debugging, and Exploit Development Appendix: Binary Protocol Exploiter's Toolkit
