AdvancedNetworkingProtocol AnalysisOffensive

Attacking Network Protocols

A Hacker's Guide to Capture, Analysis, and Exploitation

5 / 5

James Forshaw, Project Zero veteran, on how to capture, parse, and break protocols from the wire up to the application layer, with a strong focus on building reusable analysis tooling.

Buy on Amazon

As an Amazon Associate we earn from qualifying purchases. The link above is sponsored.

Published
2017
Publisher
No Starch Press
Pages
336
Language
English

Read this if

Anyone who needs to understand traffic, not just see it. Forshaw is the rare Project Zero veteran who can also teach; the book turns network protocol analysis into a learnable craft.

Skip this if

Beginners who haven't yet handled a pcap, or readers who only want HTTP/web. The book covers Layer 2 through application-level RPC, and the value compounds the deeper you go.

Key takeaways

  • Capturing, parsing, and replaying traffic is one workflow, not three, and Forshaw's tooling-first framing makes that explicit.
  • Custom-protocol auditing (the part security curricula skip) is the part of the book that pays back hardest, especially for embedded, OT, and proprietary stacks.
  • The "build your own network analysis tool" chapters teach more about how protocols actually work than any number of Wireshark lessons.

Notes

Pair with Practical Packet Analysis (Sanders) for the Wireshark-first introduction, and with Silence on the Wire (Zalewski) for conceptual depth on what the wire reveals beyond payload. Forshaw's later books on Windows Security Internals and his blog at tiraniddo.dev are the natural follow-ups. Required reading for IoT/OT pentesters and for anyone who reverses proprietary RPC.