HCIA-RS(H12-211) -Topic 7 Transport Layer Protocols
2021-08-18 19:00:22 124.08MB HCIA-RS(H12-211)
1
Interconnections(Bridges, Routers, Switches and Internetworking Protocols
2021-08-13 18:34:15 3.04MB Bridges Routers Switches
1
WebRTC 最好的入门书籍,《WebRTC权威指南》的英文原版,第三版。
2021-08-01 11:41:14 18.18MB WebRTC API
1
l7-protocols-2009-05-10.tar
2021-08-01 11:09:16 140KB l7-protocols-2009-05-10.tar
1
TCP IP Illustrated, Vol 1 The Protocols 2nd edition tcpip详解 卷一 第二版
2021-06-24 13:57:02 19.51MB tcpip
1
layer7 l7-protocols-2009-05-28.tar.gz
2021-04-11 23:10:53 139KB layer7 l7-protocols
1
串行通讯协议 I2C: 集成电路间或两线制接口是一种串行通信协议,半双工。 广泛用于短距离板内通信。 I2C连接嵌入式系统中的微控制器,EEPROMS,A / D和D / A转换器,I / O接口和其他类似外设接口等设备。 I2C总线中的数据传输 理想状态:当主机和从机之间没有数据传输时,则SDA和SCL线处于高逻辑状态。 启动条件:SDA线从高逻辑变为低逻辑,而SCL线保持在高逻辑。 这称为“开始信号”。 从站地址:发送目标从站的7位地址。 ACK:从机将产生一个1位信号来确认主机。 数据传输:8位数据通过SDA线传输的顺序是:先传输MSB,最后传输LSB。 ACK2:当从主机接收到一个字节(8位)时,从机再次产生一个确认信号。 停止条件:SDA线从低逻辑变为高逻辑,并且SCL线保持高电平,这称为“停止信号”。
2021-03-17 15:13:25 7KB Verilog
1
Attacking Network Protocols is a deep dive into network protocol security from James ­Forshaw, one of the world’s leading bug ­hunters. This comprehensive guide looks at networking from an attacker’s perspective to help you discover, exploit, and ultimately ­protect vulnerabilities. You’ll start with a rundown of networking basics and protocol traffic capture before moving on to static and dynamic protocol analysis, common protocol structures, cryptography, and protocol security. Then you’ll turn your focus to finding and exploiting vulnerabilities, with an overview of common bug classes, fuzzing, debugging, and exhaustion attacks. Learn how to Capture, manipulate, and replay packets Develop tools to dissect traffic and reverse engineer code to understand the inner workings of a network protocol Discover and exploit vulnerabilities such as memory corruptions, authentication bypasses, and denials of service Use capture and analysis tools like ­Wireshark and develop your own custom network proxies to manipulate ­network traffic Attacking Network Protocols is a must-have for any penetration tester, bug hunter, or developer looking to understand and discover network vulnerabilities. Table of Contents Chapter 1: The Basics of Networking Chapter 2: Capturing Application Traffic Chapter 3: Network Protocol Structures Chapter 4: Advanced Application Traffic Capture Chapter 5: Analysis from the Wire Chapter 6: Application Reverse Engineering Chapter 7: Network Protocol Security Chapter 8: Implementing the Network Protocol Chapter 9: The Root Causes of Vulnerabilities Chapter 10: Finding and Exploiting Security Vulnerabilities Appendix: Network Protocol Analysis Toolkit
2021-03-09 10:14:19 12.12MB Attacking Network Protocols
1