Hacking: The Art of Exploitation

( 18 )

Overview

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is ...

See more details below
Paperback (Second Edition)
$30.34
BN.com price
(Save 39%)$49.95 List Price

Pick Up In Store

Reserve and pick up in 60 minutes at your local store

Other sellers (Paperback)
  • All (42) from $11.70   
  • New (14) from $21.82   
  • Used (28) from $11.70   
Hacking, 2nd Edition: The Art of Exploitation

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK
  • NOOK HD/HD+ Tablet
  • NOOK
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$22.99
BN.com price
(Save 42%)$39.95 List Price

Overview

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.

The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:

  • Program computers using C, assembly language, and shell scripts
  • Corrupt system memory to run arbitrary code using buffer overflows and format strings
  • Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening
  • Outsmart common security measures like nonexecutable stacks and intrusion detection systems
  • Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence
  • Redirect network traffic, conceal open ports, and hijack TCP connections
  • Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix

Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.

This book is for both technical and nontechnical people interested in computer security. Unlike many so-called hacking books, this explains technical aspects of hacking such as stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

Read More Show Less

Editorial Reviews

From Barnes & Noble
The Barnes & Noble Review
What is the true spirit of hacking? It’s exploration. Discovery. Invention. If you want to be a pioneer, not just a “script kiddie,” read Hacking: The Art of Exploitation.

This book is about awakening and feeding your passionate curiosity about how software and networks work. What do overflows look like, and how do they make systems vulnerable? What can be done with shellcode? How do Denial of Service and TCP/IP Hijack attacks work? How does a man-in-the-middle attack circumvent encryption?

Whether you’re exploiting systems, protecting them, or just plain fascinated by them, this is the technical foundation you need to start hacking -- for real. Bill Camarda

Bill Camarda is a consultant, writer, and web/multimedia content developer. His 15 books include Special Edition Using Word 2003 and Upgrading & Fixing Networks for Dummies, Second Edition.

Read More Show Less

Product Details

  • ISBN-13: 9781593271442
  • Publisher: No Starch Press San Francisco, CA
  • Publication date: 2/28/2008
  • Edition description: Second Edition
  • Edition number: 2
  • Pages: 480
  • Sales rank: 81,118
  • Product dimensions: 7.04 (w) x 9.23 (h) x 1.17 (d)

Meet the Author

Jon Erickson has a formal education in computer science and has been hacking and programming since he was five years old. He speaks at computer security conferences and trains security teams around the world. Currently, he works as a vulnerability researcher and security specialist in Northern California.
Read More Show Less

Table of Contents

  • HACKING: THE ART OF EXPLOITATION, 2ND EDITION.
  • ACKNOWLEDGMENTS
  • PREFACE
  • Chapter 0x100: INTRODUCTION
  • Chapter 0x200: PROGRAMMING
  • Chapter 0x300: EXPLOITATION
  • Chapter 0x400: NETWORKING
  • Chapter 0x500: SHELLCODE
  • Chapter 0x600: COUNTERMEASURES
  • Chapter 0x700: CRYPTOLOGY
  • Chapter 0x800: CONCLUSION
  • COLOPHON

Read More Show Less

Customer Reviews

Average Rating 4
( 18 )
Rating Distribution

5 Star

(8)

4 Star

(8)

3 Star

(0)

2 Star

(2)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 18 Customer Reviews
  • Anonymous

    Posted February 17, 2008

    HACKING!! WHICH SIDE OF THE FENCE ARE YOU ON??

    Are you a true hacker in the name of the word? If you are, then this book is for you. Author Jon Erickson, has done an outstanding job of writing a second edition of a book that shows you the true spirit of hacking. Erickson, begins with an explanation of how programs can be exploited. Then, the author discusses the less obvious errors that have given birth to more complex exploit techniques that can be applied in many different places. Next, he shows you how to network your applications by using sockets and how to deal with common network vulnerabilities. The author also discusses how writing shellcode develops assembly language skills and employs a number of hacking techniques worth knowing. He continues by showing you why defensive countermeasures can be separated into two groups: Those that try to detect the attack and those that try to protect the vulnerability. Finally, the author discusses why cryptology is relevant to hacking in a number of ways. This most excellent book has explained some of the basic techniques of hacking. But, more importantly, the book looked at various hacker techniques, from the past to the present, and dissected them to learn how and why they work.

    2 out of 2 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted February 23, 2005

    The only hacking book to get

    This book dosn't just instruct you on running a program to create an exploit, it takes you into the anatomy of one, how it works, and shows you how to code it. I agree that this book is for more experienced programmers, and is a fine overview for any C or Assembly programmer. I would definately recommend getting this book if you just want to get more control over your computer and programs, or if you want to make your computer and programs secure. Overall, it is THE book to get.

    1 out of 1 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted March 5, 2004

    Need to know Assembly

    You have probably heard of such hacking techniques as buffer overflows. Typically, a book might give only cursory explanation, especially if it is not devoted to hacking. But suppose you write in C. Chances are you've inadvertantly created buffer overflows and then spent hours chasing this down, after your program crashed. So how on earth can a deliberate overflow lead to a breakin? It is for such matters that Erickson expounds here. Written for you, whether you want to create such exploits or prevent them. In either case, the knowledge is the same. What the book requires is some knowledge of C and assembly. For the latter, it is the language of the Intel x86 family. But even if you don't know it, so long as you are familiar with any assembly language and the theory of a Neumann machine, then you can follow the text. This book is not for every programmer. It turns out that a fair number of programmers get into the field by learning a high level language like C, Fortran, Java or Pascal. But they never learn any assembly. To them, anything compiled from source is a black box. Instead, you need some background in assembly. The book also gives neat coverage of how to sniff network traffic and manipulate it. There is a section on cryptography. But for this, it is so specialised and vital that you should consult texts dedicated to it.

    1 out of 1 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted November 17, 2003

    Good

    Its pretty good. Thier is one thing that i was looking for...beginner instructions. its not very user-friendly for a newbie. but even a newb can get it if they think a little harder... it was definately a good book. ;)

    1 out of 1 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted December 6, 2011

    Amazing Coding!

    Great work. The book is worth the value in coding lessons.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted November 13, 2011

    Highly Recommended

    A great read especially for C programmers

    Was this review helpful? Yes  No   Report this review
  • Posted November 21, 2009

    Great Read!!

    This has a lot of interesting material from past, present and future. It gives the guidelines needed to exploit different systems from different angles and sources. It has a diverse knowledge base of every type of exploitation that is available for your own use to gain access, help protect or even secure your own system. I would recommend to anyone interested in protecting yourself from hackers.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted December 19, 2004

    This is a must have

    This book is worth it because it gets down to the subject and lays it down for you in a clear and precise way. Have you ever had trouble reading some of the articles at phrack.org? This book will clear things up. It covers critical elements and gives good and essential examples. I also liked the attitude of the book, they don't take a position (exp: don't use this knowledge for evil, or something), they just share the knowledge and do what you will with it.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted November 17, 2003

    Very Good

    This is definately the book for people starting out in computer security and penetration testing. This book provides you with many techniques people use to utilize bugs in computer programs, such as format string exploitation, heap and buffer overflows, and general techniques on how to prevent them. Also goes into Cryptography, and LAN security.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted September 27, 2003

    very good

    this book is different from others .. written by a real geek ..

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted May 20, 2010

    No text was provided for this review.

  • Anonymous

    Posted August 14, 2010

    No text was provided for this review.

  • Anonymous

    Posted December 21, 2009

    No text was provided for this review.

  • Anonymous

    Posted April 18, 2009

    No text was provided for this review.

  • Anonymous

    Posted February 9, 2013

    No text was provided for this review.

  • Anonymous

    Posted March 16, 2009

    No text was provided for this review.

  • Anonymous

    Posted April 27, 2009

    No text was provided for this review.

  • Anonymous

    Posted February 3, 2010

    No text was provided for this review.

Sort by: Showing all of 18 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)