• RRP: £39.99
  • You Save: £13.98 (35%)
FREE Delivery in the UK.
In stock.
Dispatched from and sold by Amazon. Gift-wrap available.
Hacking: The Art of Explo... has been added to your Basket
+ £2.99 delivery
Used: Like New | Details
Condition: Used: Like New
Comment: Ships from USA: May take 10 to 15 business days for delivery. LIKE NEW/UNREAD!!! Text is Clean and Unmarked! Has a small black line or red dot on bottom/exterior edge of pages. Tracking is not available for orders shipped outside of the United States.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 3 images

Hacking: The Art of Exploitation Paperback – 7 Feb 2008

4.3 out of 5 stars 66 customer reviews

See all 4 formats and editions Hide other formats and editions
Amazon Price
New from Used from
Kindle Edition
Paperback
£26.01
£25.44 £14.20
Promotion Message Prime Students get 10% off on Books 1 promotion

Note: This item is eligible for click and collect. Details
Pick up your parcel at a time and place that suits you.
  • Choose from over 13,000 locations across the UK
  • Prime members get unlimited deliveries at no additional cost
How to order to an Amazon Pickup Location?
  1. Find your preferred location and add it to your address book
  2. Dispatch to this address when you check out
Learn more
click to open popover

Special offers and product promotions


Frequently bought together

  • Hacking: The Art of Exploitation
  • +
  • Rtfm: Red Team Field Manual
  • +
  • The Hacker Playbook 2: Practical Guide To Penetration Testing
Total price: £45.92
Buy the selected items together

Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone

To get the free app, enter your mobile phone number.



Product details

  • Paperback: 480 pages
  • Publisher: No Starch Press; 2 edition (7 Feb. 2008)
  • Language: English
  • ISBN-10: 1593271441
  • ISBN-13: 978-1593271442
  • Product Dimensions: 17.8 x 3 x 23.5 cm
  • Average Customer Review: 4.3 out of 5 stars 66 customer reviews
  • Amazon Bestsellers Rank: 16,631 in Books (See Top 100 in Books)
  • Would you like to tell us about a lower price?
    If you are a seller for this product, would you like to suggest updates through seller support?

  • See Complete Table of Contents

Product description

Review

"A security professional's paradise, burrowing down to the code level of dozesn of different loopholes and explaining the underlying logic behind the attacks."
--Wired

Synopsis

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope. Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective. The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits.This book will teach you how to: Program computers using C, assembly language, and shell scripts Corrupt system memory to run arbitrary code using buffer overflows and format strings Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening Outsmart common security measures like nonexecutable stacks and intrusion detection systems Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence Redirect network traffic, conceal open ports, and hijack TCP connections Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix Hackers are always pushing the boundaries, investigating the unknown, and evolving their art.

Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.

See all Product description

Customer reviews

Read reviews that mention

Top customer reviews

30 March 2013
Format: PaperbackVerified Purchase
23 people found this helpful
Comment Report abuse
27 February 2014
Format: Kindle EditionVerified Purchase
3 people found this helpful
Comment Report abuse
29 December 2012
Format: Kindle EditionVerified Purchase
6 people found this helpful
Comment Report abuse
18 January 2018
Format: PaperbackVerified Purchase
One person found this helpful
Comment Report abuse
18 January 2017
Format: PaperbackVerified Purchase
11 January 2018
Format: PaperbackVerified Purchase
One person found this helpful
Comment Report abuse
28 December 2014
Format: PaperbackVerified Purchase
One person found this helpful
Comment Report abuse
6 February 2017
Format: PaperbackVerified Purchase

Would you like to see more reviews about this item?

Most recent customer reviews

Pages with related products. See and discover other items: kali linux, theory test book, computer networking

Where's My Stuff?

Delivery and Returns

Need Help?