- Prime Student members get 10% off Books. Enter code STUDENT10 at checkout. Enter code STUDENT10 at checkout. Here's how (terms and conditions apply)
Hacking: The Art of Exploitation Paperback – 7 Feb 2008
|New from||Used from|
- Choose from over 13,000 locations across the UK
- Prime members get unlimited deliveries at no additional cost
- Find your preferred location and add it to your address book
- Dispatch to this address when you check out
Special offers and product promotions
Frequently bought together
Customers who viewed this item also viewed
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Would you like to tell us about a lower price?
If you are a seller for this product, would you like to suggest updates through seller support?
"A security professional's paradise, burrowing down to the code level of dozesn of different loopholes and explaining the underlying logic behind the attacks."
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope. Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective. The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits.This book will teach you how to: Program computers using C, assembly language, and shell scripts Corrupt system memory to run arbitrary code using buffer overflows and format strings Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening Outsmart common security measures like nonexecutable stacks and intrusion detection systems Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence Redirect network traffic, conceal open ports, and hijack TCP connections Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix Hackers are always pushing the boundaries, investigating the unknown, and evolving their art.Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity. See all Product description
Customers who bought this item also bought
Top customer reviews
There was a problem filtering reviews right now. Please try again later.
This book lays ground and rules to think and develop your skills outside of what you have been taught, it teaches you in a way that will let you evolve further without the book, and in no time you will be developing your own exploits, this book would be only worth for its programming side, it is that good.
It comes with a a linux distro with some tools you can use, I have decided to use my own linux distro, but further in the book, it is advised to use the one provided by the book, because, some exploits have already been patched in later distributions, and all of the exploits and tools work on the one provided by the book.
Also the package was adequate and it came in excellent condition.
Absolutely recommended, although not recommended for someone with very little computer knowledge, or someone that have never written a line of code before, if that is your case this will be very difficult to pick up.
Some programming experience would be helpful, but you don't have to be a programmer (I'm not) to get something out of this.
Once again, I would recommend this book to people who have a curiosity and interest in how things work.
If you just want to be a script kiddy then this is not the book for you,
However if you have a need to understand how the tools work and how to actualy find exploits then i highly recomend it.
Would you like to see more reviews about this item?
Most recent customer reviews
Note that, although not strictly required, some knowledge in C programming is useful to understand this book.
Forget all that stuff you read about what is required to become a hacker...This is the REAL DEAL !!!Read more