menu
{ "item_title" : "Network Protocol Hacking with Python", "item_author" : [" William L. Younker "], "item_description" : "Network Protocol Hacking with Python: Practical Exploit Development, Fuzzing, and Automation for CybersecurityWhat happens when the invisible protocols powering our networks become the battleground for modern security? Are you prepared to spot and exploit the subtle flaws that slip past most defenders?Network Protocol Hacking with Python gives you the hands-on skills to transform theory into real, operational power. Designed for cybersecurity professionals, penetration testers, engineers, and advanced learners, this book bridges the gap between textbook knowledge and actual field expertise-equipping you with the tools, scripts, and mindset to attack, defend, and automate at scale.You'll move far beyond the basics-working through reproducible labs, ready-to-run Docker environments, and fully documented Python scripts for every major attack and defense scenario. Explore the real mechanics behind protocol fuzzing, binary parsing, SMB and NTLM relay, SCADA attacks, DNS exfiltration, continuous security integration, and much more-all in a style that rewards curiosity and rewards action.Inside, you'll master: Building isolated labs for exploit testing with Docker Compose and PythonCrafting, manipulating, and fuzzing TCP, UDP, HTTP, DNS, Modbus, SMB, and other network protocolsAutomating attack workflows, continuous security, and detection testing with CI/CD pipelinesReal-world exploit techniques: NTLM relay, Modbus mis-actuation, DNS data theft, HTTP header attacks, protocol chaining, and covert exfiltrationBlue-team strategies for forensics, SIEM alert validation, and detection rules that really workDeveloping a modular exploit framework you can adapt, extend, and share across your organizationEvery chapter is packed with actionable insight, modern tooling, and field-tested methods you can put to work immediately-no fluff, no passive reading. Whether you want to sharpen your offensive skills, defend complex networks, or automate testing for a whole team, this book is your complete, up-to-date resource.", "item_img_path" : "https://covers3.booksamillion.com/covers/bam/9/79/826/437/9798264375934_b.jpg", "price_data" : { "retail_price" : "22.00", "online_price" : "22.00", "our_price" : "22.00", "club_price" : "22.00", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Network Protocol Hacking with Python|William L. Younker

Network Protocol Hacking with Python : Practical Exploit Development, Fuzzing, and Automation for Cybersecurity

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

Network Protocol Hacking with Python: Practical Exploit Development, Fuzzing, and Automation for Cybersecurity

What happens when the invisible protocols powering our networks become the battleground for modern security? Are you prepared to spot and exploit the subtle flaws that slip past most defenders?

Network Protocol Hacking with Python gives you the hands-on skills to transform theory into real, operational power. Designed for cybersecurity professionals, penetration testers, engineers, and advanced learners, this book bridges the gap between textbook knowledge and actual field expertise-equipping you with the tools, scripts, and mindset to attack, defend, and automate at scale.

You'll move far beyond the basics-working through reproducible labs, ready-to-run Docker environments, and fully documented Python scripts for every major attack and defense scenario. Explore the real mechanics behind protocol fuzzing, binary parsing, SMB and NTLM relay, SCADA attacks, DNS exfiltration, continuous security integration, and much more-all in a style that rewards curiosity and rewards action.

Inside, you'll master:

  • Building isolated labs for exploit testing with Docker Compose and Python

  • Crafting, manipulating, and fuzzing TCP, UDP, HTTP, DNS, Modbus, SMB, and other network protocols

  • Automating attack workflows, continuous security, and detection testing with CI/CD pipelines

  • Real-world exploit techniques: NTLM relay, Modbus mis-actuation, DNS data theft, HTTP header attacks, protocol chaining, and covert exfiltration

  • Blue-team strategies for forensics, SIEM alert validation, and detection rules that really work

  • Developing a modular exploit framework you can adapt, extend, and share across your organization

Every chapter is packed with actionable insight, modern tooling, and field-tested methods you can put to work immediately-no fluff, no passive reading. Whether you want to sharpen your offensive skills, defend complex networks, or automate testing for a whole team, this book is your complete, up-to-date resource.

This item is Non-Returnable

Details

  • ISBN-13: 9798264375934
  • ISBN-10: 9798264375934
  • Publisher: Independently Published
  • Publish Date: September 2025
  • Dimensions: 10 x 7 x 0.49 inches
  • Shipping Weight: 0.9 pounds
  • Page Count: 232

Related Categories

You May Also Like...

    1

BAM Customer Reviews