// Comparison
Attacking Network Protocols vs Hacking: The Art of Exploitation: Which Should You Read?
Two cybersecurity books on Networking, compared honestly: who each is for, what each does best, and which to read first.
A Hacker's Guide to Capture, Analysis, and Exploitation
James Forshaw
James Forshaw, Project Zero veteran, on how to capture, parse, and break protocols from the wire up to the application layer, with a strong focus on building reusable analysis tooling.
A from-first-principles tour of low-level exploitation that still teaches the mindset two decades later.
Read this if
Skip this if
Key takeaways
- Capturing, parsing, and replaying traffic is one workflow, not three, and Forshaw's tooling-first framing makes that explicit.
- Custom-protocol auditing (the part security curricula skip) is the part of the book that pays back hardest, especially for embedded, OT, and proprietary stacks.
- The "build your own network analysis tool" chapters teach more about how protocols actually work than any number of Wireshark lessons.
- Exploitation is a way of seeing programs, not a list of techniques.
- Memory corruption is best learned with a debugger open beside the book.
- The first half on C/assembly is worth the price even if you skip the exploits.
How they compare
Attacking Network Protocols and Hacking: The Art of Exploitation are both rated 5/5 in our catalog. Pick by topic preference and reading style rather than by rating.
Attacking Network Protocols is pitched at advanced level. Hacking: The Art of Exploitation is pitched at intermediate level. Read the easier one first if you're not yet comfortable with the topic.
Attacking Network Protocols and Hacking: The Art of Exploitation both cover Networking, Offensive, so reading them in sequence reinforces the same material from different angles.
Keep reading
Attacking Network Protocols
→ Alternatives to Attacking Network Protocols→ What to read after Attacking Network ProtocolsHacking: The Art of Exploitation
→ Alternatives to Hacking: The Art of Exploitation→ What to read after Hacking: The Art of Exploitation