Shop now Shop now Shop now Shop All Amazon Fashion Up to 70% off Fashion Cloud Drive Photos Shop now Shop Amazon Fire TV Shop now Shop Fire HD 6 Learn More Shop now Shop now Shop now

Customer Reviews

30
4.7 out of 5 stars
Hacking: The Art of Exploitation
Format: PaperbackChange
Price:£22.78+Free shipping with Amazon Prime
Your rating(Clear)Rate this item


There was a problem filtering reviews right now. Please try again later.

10 of 10 people found the following review helpful
on 30 March 2013
This book is like no other book in its field/segment/genre whatever you want to call it, this book won't "dummy" guide you through already made up stuff, that will turn you into a BOT.
This book lays ground and rules to think and develop your skills outside of what you have been taught, it teaches you in a way that will let you evolve further without the book, and in no time you will be developing your own exploits, this book would be only worth for its programming side, it is that good.
It comes with a a linux distro with some tools you can use, I have decided to use my own linux distro, but further in the book, it is advised to use the one provided by the book, because, some exploits have already been patched in later distributions, and all of the exploits and tools work on the one provided by the book.
Also the package was adequate and it came in excellent condition.

Absolutely recommended, although not recommended for someone with very little computer knowledge, or someone that have never written a line of code before, if that is your case this will be very difficult to pick up.
0CommentWas this review helpful to you?YesNoSending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
5 of 5 people found the following review helpful
on 29 December 2012
Having read many books on the subject i have to rate this as the best by far, at least from a developer view point. I now have the information needed to fully understand this subject.

If you just want to be a script kiddy then this is not the book for you,
However if you have a need to understand how the tools work and how to actualy find exploits then i highly recomend it.
0CommentWas this review helpful to you?YesNoSending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
5 of 5 people found the following review helpful
on 2 June 2013
I have been lost in the wilderness waiting for clarity and this book finally delivered. It bridges the gap between machine and man beautifully. This should be on every students bookshelf.
0CommentWas this review helpful to you?YesNoSending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
3 of 3 people found the following review helpful
on 18 February 2014
If you want to learn the subject of exploitation this is a must-have. Not an easy read for a new guy/girl to the field though. I would suggest at least being able to read and somewhat understand C/ASM code, it'll make things run smoother. I'll also make another suggestion, pick up a copy of shellcoder's handbook 2nd ed - great companions for reading up on the subject. Pick up this book and welcome to the next level.
0CommentWas this review helpful to you?YesNoSending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
23 of 26 people found the following review helpful
on 18 August 2011
While many of the so called hacking books do little more than act as a step by step guide on script kiddy tools and trojans, with the obligatory screenshots.
This one is different, and it's definately the one to get if you are serious about the subject.
A pretty comprehensive guide on some of the low level aspects of true hacking.
It's not for the faint hearted though, it's a heavy and complicated read, and I say that with a bachelors degree in I.T and Computing.
Some exposure to C, and more than a passing exposure to ASM might well be a healthy pre-requisite, as well as an understanding of memory addressing.
If you can't read and understand source code, you will be wasting your time and money here.
11 commentWas this review helpful to you?YesNoSending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
on 17 April 2015
I could preach this book all day. From a beginner's perspective, there are plenty of books available on the market that all claim to offer an in-depth introduction to 'Hacking'(Programming, Computer Science, Reverse Engineering), but many books fail to lay a foundation of knowledge, starting from the basics concepts. This book does just that, and at a quick but manageable pace brings the reader up to scratch to start tackling some of the more challenging concepts and their problems.

Personally, I would consider this book to be a fully comprehensive introduction to the field of computer security, because it doesn't miss out any of the key concepts that are a prerequisite to learning certain topics in the field computer science. Granted there are books like 'Violent Python' and books on using suites of tools such as provided in Kali Linux, which serve their purpose if you're studying penetration testing, but this books gives you the knowledge to be free with in the computer space and not be bound by specific tools. This book will teach from the ground up the basics of Networking and how these, and all tools do what they do, rather than just focus on their application.
This book won't teach you everything there is to know about computer science, but will provide a better introduction compared to any other book.
0CommentWas this review helpful to you?YesNoSending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
2 of 2 people found the following review helpful
on 12 January 2012
This book is absolutely perfect for the subject. I recieved my order couple of days ago, the begining chapter set you straight on fire to coding. Exactly what you expect for this subject.
0CommentWas this review helpful to you?YesNoSending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
on 27 February 2014
This is a great read for people who want to know the nuts and bolts of exploitation. If you want to know how to 'hack facebook' ... look elsewhere! but, if you are interested in how programs, networks and computers work from a very fundamental level, I would recommend this book.
Some programming experience would be helpful, but you don't have to be a programmer (I'm not) to get something out of this.

Once again, I would recommend this book to people who have a curiosity and interest in how things work.
0CommentWas this review helpful to you?YesNoSending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
on 4 May 2015
Although this is a contraversal area the insights that this book provides are deep and it will benefit you
as a software professional in general even if you don't use these techniques yourself in your work
0CommentWas this review helpful to you?YesNoSending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
on 28 December 2014
Bought as a present for my eldest son. It is a book he requested and although he is still reading it, he tells me it is very good and lives up to his expectations. Highly recommended (by him).
0CommentWas this review helpful to you?YesNoSending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
     
 
Customers who viewed this item also viewed

Rtfm: Red Team Field Manual
Rtfm: Red Team Field Manual by Ben Clark (Paperback - 11 Feb. 2014)
£4.94

 
     

Send us feedback

How can we make Amazon Customer Reviews better for you?
Let us know here.