- Добавил: literator
- Дата: 9-09-2023, 21:05
- Комментариев: 0
Название: Network Basics for Hackers: How Networks Work and How They Break
Автор: Master OccupytheWeb
Издательство: InfoSec Press
Год: 2023
Страниц: 270
Язык: английский
Формат: pdf
Размер: 34.0 MB
Following the success of Linux Basics for Hackers, OccupytheWeb does what he did for Linux to Networks. Networks of all types, including TCP/IP, Bluetooth Networks, Car Networks, W-iFi Networks, Radio Frequency Networks, SCADA/ICS Networks, and more. In his inimitable style, Master OTW makes the seemingly complex, simple. This book is designed for beginner to intermediate cybersecurity professionals. It begins with the basics of networks and networking, examines network analysis with Wireshark and tcpdump, offers one of the most complete and in-depth analyses of Wi-Fi and Bluetooth networks, then progresses through the various protocols such as DNS, ARP, SMTP, and others. The reader will be led through the building of those applications in Linux, such as an EXIM server for email or a BIND server for DNS. Then OTW leads the reader through the major vulnerabilities of that protocol/application. We will start with basic networking and TCP/IP concepts and then progress to tools for analyzing network packets and protocols.
Автор: Master OccupytheWeb
Издательство: InfoSec Press
Год: 2023
Страниц: 270
Язык: английский
Формат: pdf
Размер: 34.0 MB
Following the success of Linux Basics for Hackers, OccupytheWeb does what he did for Linux to Networks. Networks of all types, including TCP/IP, Bluetooth Networks, Car Networks, W-iFi Networks, Radio Frequency Networks, SCADA/ICS Networks, and more. In his inimitable style, Master OTW makes the seemingly complex, simple. This book is designed for beginner to intermediate cybersecurity professionals. It begins with the basics of networks and networking, examines network analysis with Wireshark and tcpdump, offers one of the most complete and in-depth analyses of Wi-Fi and Bluetooth networks, then progresses through the various protocols such as DNS, ARP, SMTP, and others. The reader will be led through the building of those applications in Linux, such as an EXIM server for email or a BIND server for DNS. Then OTW leads the reader through the major vulnerabilities of that protocol/application. We will start with basic networking and TCP/IP concepts and then progress to tools for analyzing network packets and protocols.