// Comparison
Attacking Network Protocols vs Silence on the Wire: Which Should You Read?
Two cybersecurity books on Networking, compared honestly: who each is for, what each does best, and which to read first.
A Hacker's Guide to Capture, Analysis, and Exploitation
James Forshaw
James Forshaw, Project Zero veteran, on how to capture, parse, and break protocols from the wire up to the application layer, with a strong focus on building reusable analysis tooling.
A Field Guide to Passive Reconnaissance and Indirect Attacks
Michal Zalewski
Michal Zalewski's classic on the indirect attack surface: timing channels, protocol-stack fingerprinting, and the often-overlooked side data leaked by every layer of a stack.
Read this if
Skip this if
Key takeaways
- Capturing, parsing, and replaying traffic is one workflow, not three, and Forshaw's tooling-first framing makes that explicit.
- Custom-protocol auditing (the part security curricula skip) is the part of the book that pays back hardest, especially for embedded, OT, and proprietary stacks.
- The "build your own network analysis tool" chapters teach more about how protocols actually work than any number of Wireshark lessons.
- Every protocol layer leaks information that wasn't in the payload (TCP/IP fingerprinting, DNS cache hints, browser timing, terminal echo); the book's premise is that adversaries can read all of it.
- Passive reconnaissance is dramatically underrated as both a threat and a research tool; Zalewski makes the case better than anyone before or since.
- The chapters on phantom-data leakage (idle scanning, timing oracles, blind side channels) are the conceptual root of attack classes that keep getting rediscovered every few years.
How they compare
Attacking Network Protocols and Silence on the Wire are both rated 5/5 in our catalog. Pick by topic preference and reading style rather than by rating.
Both books target advanced-level readers, so the choice is about topic, not difficulty.
Attacking Network Protocols and Silence on the Wire both cover Networking, so reading them in sequence reinforces the same material from different angles.
Keep reading
Attacking Network Protocols
→ Alternatives to Attacking Network Protocols→ What to read after Attacking Network Protocols