Buy Used
FREE Delivery on orders over £10.
Used: Very Good | Details
Sold by the book house
Condition: Used: Very Good
Comment: This item will be picked, packed and shipped by Amazon and is eligible for free delivery within the UK
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Hacking Exposed 5th Edition: Network Security Secrets & Solutions: Network Security Secrets and Solutions Paperback – 1 May 2005

3.0 out of 5 stars 3 customer reviews

See all formats and editions Hide other formats and editions
Amazon Price
New from Used from
Kindle Edition
"Please retry"
"Please retry"
£14.99 £0.01

There is a newer edition of this item:

click to open popover

Special Offers and Product Promotions

Enter your mobile number below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
Getting the download link through email is temporarily not available. Please check back later.

  • Apple
  • Android
  • Windows Phone

To get the free app, enter your mobile phone number.

Product details

  • Paperback: 692 pages
  • Publisher: McGraw-Hill Osborne; 5 edition (1 May 2005)
  • Language: English
  • ISBN-10: 0072260815
  • ISBN-13: 978-0072260816
  • Product Dimensions: 18.3 x 3.7 x 22.6 cm
  • Average Customer Review: 3.0 out of 5 stars  See all reviews (3 customer reviews)
  • Amazon Bestsellers Rank: 487,248 in Books (See Top 100 in Books)
  • See Complete Table of Contents

Product Description

From the Publisher

Hacking Exposed Fifth Edition includes a companion website ( which is a great place to get the latest information about Hacking Exposed. It provides a broad introduction to the fifth edition of Hacking Exposed as well as the latest table of contents; foreword by Gene Hodges; updated links, tools, and scripts; and any new information regarding corrections, reviews, etc.

From the Inside Flap

"A must-read for anyone in security…. One of the best security books available." --Tony Bradley, CISSP,

"Authoritative….Even readers of earlier editions will find critical new insight on the more modern attacks." --From the Foreword by Gene Hodges, President of McAfee

"A cross between a spy novel and a tech manual." --Mark A. Kellner, Washington Times

"The seminal book on white-hat hacking and countermeasures.... Should be required reading for anyone with a server or a network to secure." —Bill Machrone, PC Magazine

"With every edition this book keeps getting better and better. I can recommend it to anyone interested in computer security, as it will certainly give you a real-world course on the subject." —Mirko Zorz,

The fifth edition of this world-renowned security reference offers completely up-to-date coverage of today's most devastating hacks and how to prevent them. Using the proven Hacking Exposed methodology, the book shows you, step by step, how to locate and patch system vulnerabilities and explains what you need to know to stay vigilant in today's 24x7 digital world.

New and Updated Material:

New chapter on hacking code, with contributions by Michael Howard, covering the ways flaws get introduced into software and how best to prevent them
New Windows hacks including RPCSS (Blaster), LSASS (Sasser), and PCT (Download.ject) buffer overflow exploits
Updated denial of service chapter with descriptions of large scale zombie attacks and practical countermeasures
Coverage of new web hacking tools and techniques including HTTP response splitting and automated vulnerability scanners
New content on remote connectivity including VoIP hacking
New coverage of web and e-mail client hacking, including the latest Internet
Explorer exploits, phishing, spyware, rootkits, and bots
New hacks and countermeasures using Google as a reconnaissance tool
An updated footprinting chapter that deals with changes regarding finding information from Internet databases
Brand new case studies covering relevant and timely security attacks including Google, wireless, UNIX/Linux, and Mac OS X hacks

See all Product Description

Customer Reviews

3.0 out of 5 stars
Share your thoughts with other customers

Top Customer Reviews

Format: Paperback Verified Purchase
A lot of techniques to hack softwares and systems. I chose it to find some interesting techniques or hack, and I recommend it to everyone who likes practical hacks, almost ready to use them.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
I love it excellent.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
Not impressed
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse

Most Helpful Customer Reviews on (beta) HASH(0x9e1bf6f0) out of 5 stars 18 reviews
18 of 19 people found the following review helpful
HASH(0x9e3ad318) out of 5 stars Good, but aging 21 Jan. 2006
By Tomas Znamenacek - Published on
Format: Paperback
The book is not bad, but needs serious rewriting. The "fifth edition" is a joke-it looks more like an attempt to beat some more money out of the book's reputation than a serious release.

Some parts of the book are dated and should be left out or rewritten. Half of the URLs mentioned in the book does not work, because the websites have died a long time ago. Some nmap switches described in the text are not usable anymore, because the authors used an old version of nmap. A good deal of the text speaks about Windows NT, which is an OS almost unused today. There is a lot of typos in the book, which is quite unusal for a fifth edition. The HE website lists corrections for the first issue of the book, which is not very useful.

That said, I have learned a lot of interesting things from the book. It's a good book if you are trying to get the big picture-if you are looking for in-depth explanations and fresh information, I think you'd better look elsewhere. It's worth reading, I just wouldn't say it's a computer security Bible.
10 of 12 people found the following review helpful
HASH(0x9eb1ae64) out of 5 stars An excellent source of security information... 13 Aug. 2005
By Thomas Duff - Published on
Format: Paperback
So much for the days of trusting everyone on-line to use software in the way that it was intended. Now the stakes are much higher, and attacking systems can be a profitable activity for those so inclined. To protect yourself, you need to understand the wide range of vulnerabilities. Reading Hacking Exposed (5th Edition) by Stuart McClure, Joel Scambray, and George Kurtz goes a long way towards getting you prepared.


Part 1 - Casing the Establishment: Footprinting; Scanning; Enumeration

Part 2 - System Hacking: Hacking Windows; Hacking Unix; Remote Connectivity and VoIP Hacking

Part 3 - Network Hacking: Network Drives; Wireless Hacking; Firewalls; Denial of Service Attacks

Part 4 - Software Hacking: Hacking Code; Web Hacking; Hacking the Internet User

Part 5 - Appendixes: Ports; Top 14 Security Vulnerabilities

Hacking Exposed follows a consistent format in covering areas subject to misuse and attack. They name the type of attack or information gathering technique and give it a risk rating based on popularity, simplicity, and impact. Following an explanation of the particular area, they follow up with a countermeasure section to help the reader understand how this type of attack or exploit can be mitigated. That format scores high on my practicality scale because you can immediately make changes to secure your environment. It's not as if they just spell out the doom and gloom and leave you to fend for yourself.

Another aspect of the book I like is the wide range of hacking covered. Admittedly, a number of these areas (such as hacking Unix or Windows) could easily be made into a whole separate book (and in most cases, they *have* been). But I really don't want to have to buy a dozen books to gain a broad overview of my potential exposure. I want to cover everything at a reasonable level of detail to understand the overall subject. Then if I have the need to get into more detail (like if I need to focus on firewalls), I at least have a framework on which to dive deeper into the subject matter. Hacking Exposed gives me that "reasonable level", and it's greatly appreciated.

Does this book cover every single hack or vulnerability out there? No, and no book (or web site or anything else) ever could. New attacks are discovered and exploited every day. But this gives you a very good knowledge base on which to understand current and future problems. It's a book I'd recommend highly to anyone who needs to understand security. And that should be everyone...
4 of 4 people found the following review helpful
HASH(0x9e656dbc) out of 5 stars Good overall security reference 30 Aug. 2005
By TB - Published on
Format: Paperback
I recently received my copy of HE5 and despite some shortcomings (i.e. strong material removed from HE4) this book is a great overall security reference. The wireless stuff was a much needed component and although the book targets the latest O/S releases it's got a lot of useful discovery/fingerprinting techniques, including searching the web for sensitive info. Recommended.
3 of 3 people found the following review helpful
HASH(0x9dea66cc) out of 5 stars Still solid but redundant and a bit tired 27 July 2006
By SBJ400 - Published on
Format: Paperback Verified Purchase
I cannot say anything more that other positive reviews have not already said.

Simply put, the Hacking Exposed series is THE source. However, it is getting tired and repetitive. Many topics covered in earlier chapters gets repeated AD NAUSEUM in later chapters.

Also, I feel this particular book is getting bloated at 750 pages. Hacking is a diverse subject. This book tries to narrow things down, but not enough in my opinion. The authors spread themselves too thin in some areas...thus adding to the page count unnecessarily. To their credit (and I love them dearly for this) they did not take chunks of old material and cut and paste like some other authors do! These guys keep the fresh material coming.

My 3 stars would have been 4 or 5 stars if I had seen really great improvements over the previous edition.
3 of 3 people found the following review helpful
HASH(0x9dea678c) out of 5 stars Excellent book for the beginner 1 Aug. 2007
By Frank Carreiro - Published on
Format: Paperback Verified Purchase
While starting out in a new career, this book has been recommended to me time and time again. I have some background in security and penetration testing however this book takes you into a deeper understanding of how things work. I strongly recommend it for the beginner as well as the seasoned Information Security Professional.
Were these reviews helpful? Let us know