Network Protocols for Security Professionals

BIRMINGHAM—MUMBAI

Network Protocols for Security Professionals

Copyright © 2022 Packt Publishing

All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews.

Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the authors, nor Packt Publishing or its dealers and distributors, will be held liable for any damages caused or alleged to have been caused directly or indirectly by this book.

Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information.

Group Product Manager: Mohd Riyan Khan

Publishing Product Manager: Rahul Nair

Senior Editor: Tanya D’cruz

Content Development Editor: Nihar Kapadia

Technical Editor: Shruthi Shetty

Copy Editor: Safis Editing

Project Manager: Neil Dmello

Proofreader: Safis Editing

Indexer: Tejal Daruwale Soni

Production Designer: Aparna Bhagat

Marketing Coordinator: Ankita Bhonsle

First published: October 2022

Production reference: 1111022

Published by Packt Publishing Ltd.

Livery Place

35 Livery Street

Birmingham

B3 2PB, UK.

ISBN 978-1-78995-348-0

www.packt.com

To my parents, Sh. Rajesh Khanna and Smt. Saveena Khanna, and my brother, Himanshu Khanna, for their sacrifices and for exemplifying the power of determination.

– Deepanshu Khanna

Contributors

About the authors

Yoram Orzach is a senior network and network security advisor, providing network design and network security consulting services to a range of clients. Having spent thirty years in network and information security, Yoram has worked as a network and security engineer across many verticals in roles ranging from network engineer, security consultant, and instructor. Yoram gained his BSc from the Technion in Haifa, Israel. Yoram’s experience ranges from corporate networks and service providers to Internet service provider networks. His customers include Motorola Solutions, Elbit Systems, 888, Taboola, Bezeq, PHI Networks, Cellcom, the Strauss group, and many other high-tech companies.

I would like to thank my loving and patient wife and son first and foremost for their continued support, patience, and encouragement throughout the long process of writing this book. Thanks also to the Masters of Pie and Method teams for their generosity with their equipment – obviously a critical component for this book.

Deepanshu Khanna is a 29-year-old information security and cybercrime consultant and a pioneer in his country. The young and dynamic personality of Deepanshu has not only assisted him in handling information security and cybercrimes but also in creating awareness about these things. He’s a hacker who is appreciated by the Indian government, including the Ministry of Home Affairs and Defence, police departments, and many other institutes, universities, globally renowned IT firms, magazines, and newspapers. He started his career by presenting a popular hack of GRUB at HATCon. He also conducted popular research in the fields of IDS and AIDE and demonstrated MD5 collisions and Buffer overflows, among other things. His work has been published in various magazines such as pentestmag, Hakin9, e-forensics, SD Journal, and hacker5. He has been invited as a guest speaker to public conferences such as DEF CON, ToorCon, OWASP, HATCon, H1hackz, and many other universities and institutes.

Email: [email protected]

Facebook profile: https://www.facebook.com/deepanshu.khanna17

LinkedIn Profile: https://www.linkedin.com/in/deepanshukhanna/

I want to thank the people who have been close to me and supported me, especially my parents and my brother.

About the reviewers

Ron Cowen has been in the network security industry for over a decade, spanning roles at AT&T, Juniper Networks, and his current position as a systems engineer for Palo Alto Networks. He is based in Seattle, WA.

I’d like to acknowledge and thank all of those who have supported, and those who continue to support, my growth as a network security professional, as well as my wife and our two daughters.

Dhananjay Choubey has been working in the field of cybersecurity for over 10 years and has dedicated 6 years to defensive security and blue teaming. He has provided SOC and blue teaming services to different industries, such as banking, the petrochemical industry, mining companies, the healthcare sector, and media houses across the globe. He graduated with a B. Tech in Information Technology from MDU (India). In his current role, he is working at ATOS as a senior security consultant and primarily helps clients to deploy use cases on EDR, SIEM, and SOAR for quick detection. In his spare time, he works on enhancing his skills by performing malware reverse engineering on open malware and publishing it on open threat intel portals, and designing playbooks for incident response.

Sanjeev Kumar Verma is a CISSP-, GCIH-, and OSCP-certified security professional and has an enriching 15 years of experience in the security domain. He is currently working as a practice head of offensive and defensive security in the global digital security consulting team at Atos. Sanjeev has a solid technical background and a highly analytical mind, and he has helped hundreds of organizations identify and understand cybersecurity risks to allow them to make better and more informed business decisions. Sanjeev is very passionate about offensive cybersecurity, training, and mentoring and loves to take on challenges, which has led to him being a driving force in multiple key cybersecurity initiatives in his current and past organizations.

Reviewing a book is harder and more time-consuming than I thought and it wouldn’t have been possible without my family’s support. I am thankful to my whole family for providing all the support and tolerating my busy schedule without any complaint.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset