Buy Used
£8.85
+ £2.80 UK delivery
Used: Like New | Details
Sold by thriftbooks-USA
Condition: Used: Like New
Comment: All items ship from the USA.  Arrival time is usually 2-3 weeks. Almost in new condition. Book shows only very slight signs of use. Cover and binding are undamaged and pages show minimal use. Spend Less. Read More. Your satisfaction is guaranteed.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Hacking: The Art of Exploitation (One Off) Paperback – 11 Oct 2004

4.4 out of 5 stars 52 customer reviews

See all formats and editions Hide other formats and editions
Amazon Price
New from Used from
Paperback
"Please retry"
£32.00 £8.85

There is a newer edition of this item:

click to open popover

Special Offers and Product Promotions

Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone

To get the free app, enter your mobile phone number.




Product details

  • Paperback: 250 pages
  • Publisher: No Starch Press; 1 edition (11 Oct. 2004)
  • Language: English
  • ISBN-10: 1593270070
  • ISBN-13: 978-1593270070
  • Product Dimensions: 18.7 x 2 x 23.5 cm
  • Average Customer Review: 4.4 out of 5 stars  See all reviews (52 customer reviews)
  • Amazon Bestsellers Rank: 791,465 in Books (See Top 100 in Books)
  • See Complete Table of Contents

Customer Reviews

Top Customer Reviews

Format: Paperback
"Hacking: The Art of Exploitation" is a truly excellent resource for those *truly* interested in system exploitation. Erickson starts from the beginning by introducing the scene to the user, explaining what the book intends to teach the reader, as well as the whole deal with the hacking spirit and the workings of the hacking scene. Erickson wastes little time in delving deep into the technical details of common vulnerabilities often found in all sorts of programs, as well as teaching the reader how to write their very own homegrown exploit codes in several different programming languages. Whilst Erickson does not drown the user in boring or irrelevant information, he provides plenty of information which only encourages the reader even more to carry out some of the experimental exercises presented in the book.
A few topics covered in this truly great book include:
- Writing shellcodes (polymorphic, ASCII printable etc.)
- Defeating non-exec stacks (such as in OpenBSD) by teaching how to "return into libc" as an alternative to executing shellcode.
- Various network hacks (such as network DoS vulnerabilities aswell as a multitude of port scanning techniques).
- A wide and vast overview of crytography, including breaking WEP encryption, the details of various popular ciphers, and password cracking using a few little documented techniques.
- and much, much more...
I consider "Hacking: The Art of Exploitation" to be the bible of system exploitation. Whilst other "hacking" books provide an introduction to many off-the-shelf hacking tools, "Hacking: The Art of Exploitation" teaches the true spirit of hacking and system exploitation: creative thinking. This book is a must for all of those interested in true hacking.
Comment 66 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
This book is like no other book in its field/segment/genre whatever you want to call it, this book won't "dummy" guide you through already made up stuff, that will turn you into a BOT.
This book lays ground and rules to think and develop your skills outside of what you have been taught, it teaches you in a way that will let you evolve further without the book, and in no time you will be developing your own exploits, this book would be only worth for its programming side, it is that good.
It comes with a a linux distro with some tools you can use, I have decided to use my own linux distro, but further in the book, it is advised to use the one provided by the book, because, some exploits have already been patched in later distributions, and all of the exploits and tools work on the one provided by the book.
Also the package was adequate and it came in excellent condition.

Absolutely recommended, although not recommended for someone with very little computer knowledge, or someone that have never written a line of code before, if that is your case this will be very difficult to pick up.
Comment 13 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
This book gives a good introduction to general security concepts.
it starts off with some common programming exploits (eg buffer overflows) and explains how they work and shows you how to execute them. This section of the book is good, although i found the need for other material to expand on what i learned here. For example aleph1's excellent tutorial Smash the Stack is a good way to supplement this. Other programming exploits explained are heap overflows, format strings and returning into libc. These are all well explained introductions, but to gain a deeper understanding it is necessary to do some more research.
There is also a good section on writing your own shellcode. Some assembly language experience is useful here and generally it is well explained and set out.
The section on network attacks is also a very good although at times it seems like he is only explaining how to use existing tools and doesn't go into the theory behind them enough, but having said that it is an excellent introduction. Topics covered here include: packet sniffing, DOS attacks, port scanning and TCP/IP hijacking.
The final section on encryption offers some good theoretical knowledge on general encryption concepts but lacks a little on the practical implications of this. However if you are really into encryption you will want to get a dedicated book on it. In the meantime this definatly severs as a good introduction.
With the nature of the topics covered the best way i found to learn was to read over a section and experiment with it. You can only learn so much from a book, but this book will give you a good knowledge base to start from. A decent knowledge of C is assumed, some assembly knowledge would be helpful but isn't strictly necessary.
Comment 21 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
If you want to learn the subject of exploitation this is a must-have. Not an easy read for a new guy/girl to the field though. I would suggest at least being able to read and somewhat understand C/ASM code, it'll make things run smoother. I'll also make another suggestion, pick up a copy of shellcoder's handbook 2nd ed - great companions for reading up on the subject. Pick up this book and welcome to the next level.
Comment 7 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
While many of the so called hacking books do little more than act as a step by step guide on script kiddy tools and trojans, with the obligatory screenshots.
This one is different, and it's definately the one to get if you are serious about the subject.
A pretty comprehensive guide on some of the low level aspects of true hacking.
It's not for the faint hearted though, it's a heavy and complicated read, and I say that with a bachelors degree in I.T and Computing.
Some exposure to C, and more than a passing exposure to ASM might well be a healthy pre-requisite, as well as an understanding of memory addressing.
If you can't read and understand source code, you will be wasting your time and money here.
1 Comment 24 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse


Feedback