×

Uh-oh, it looks like your Internet Explorer is out of date.

For a better shopping experience, please upgrade now.

Hacking: The Art of Exploitation / Edition 2
  • Alternative view 1 of Hacking: The Art of Exploitation / Edition 2
  • Alternative view 2 of Hacking: The Art of Exploitation / Edition 2
     

Hacking: The Art of Exploitation / Edition 2

4.3 20
by Jon Erickson
 

See All Formats & Editions

ISBN-10: 1593271441

ISBN-13: 9781593271442

Pub. Date: 02/28/2008

Publisher: No Starch Press San Francisco, CA

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Rather than merely showing how to run existing exploits, author Jon Erickson

Overview

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.

The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:

  • Program computers using C, assembly language, and shell scripts
  • Corrupt system memory to run arbitrary code using buffer overflows and format strings
  • Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening
  • Outsmart common security measures like nonexecutable stacks and intrusion detection systems
  • Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence
  • Redirect network traffic, conceal open ports, and hijack TCP connections
  • Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix

Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.

Product Details

ISBN-13:
9781593271442
Publisher:
No Starch Press San Francisco, CA
Publication date:
02/28/2008
Edition description:
Second Edition
Pages:
480
Sales rank:
43,154
Product dimensions:
7.04(w) x 9.23(h) x 1.17(d)

Table of Contents

HACKING: THE ART OF EXPLOITATION, 2ND EDITION.

ACKNOWLEDGMENTS

PREFACE

Chapter 0x100: INTRODUCTION

Chapter 0x200: PROGRAMMING

Chapter 0x300: EXPLOITATION

Chapter 0x400: NETWORKING

Chapter 0x500: SHELLCODE

Chapter 0x600: COUNTERMEASURES

Chapter 0x700: CRYPTOLOGY

Chapter 0x800: CONCLUSION

COLOPHON

Customer Reviews

Average Review:

Post to your social network

     

Most Helpful Customer Reviews

See all customer reviews

Hacking 4.3 out of 5 based on 0 ratings. 20 reviews.
Guest More than 1 year ago
Are you a true hacker in the name of the word? If you are, then this book is for you. Author Jon Erickson, has done an outstanding job of writing a second edition of a book that shows you the true spirit of hacking. Erickson, begins with an explanation of how programs can be exploited. Then, the author discusses the less obvious errors that have given birth to more complex exploit techniques that can be applied in many different places. Next, he shows you how to network your applications by using sockets and how to deal with common network vulnerabilities. The author also discusses how writing shellcode develops assembly language skills and employs a number of hacking techniques worth knowing. He continues by showing you why defensive countermeasures can be separated into two groups: Those that try to detect the attack and those that try to protect the vulnerability. Finally, the author discusses why cryptology is relevant to hacking in a number of ways. This most excellent book has explained some of the basic techniques of hacking. But, more importantly, the book looked at various hacker techniques, from the past to the present, and dissected them to learn how and why they work.
Guest More than 1 year ago
This book dosn't just instruct you on running a program to create an exploit, it takes you into the anatomy of one, how it works, and shows you how to code it. I agree that this book is for more experienced programmers, and is a fine overview for any C or Assembly programmer. I would definately recommend getting this book if you just want to get more control over your computer and programs, or if you want to make your computer and programs secure. Overall, it is THE book to get.
Guest More than 1 year ago
You have probably heard of such hacking techniques as buffer overflows. Typically, a book might give only cursory explanation, especially if it is not devoted to hacking. But suppose you write in C. Chances are you've inadvertantly created buffer overflows and then spent hours chasing this down, after your program crashed. So how on earth can a deliberate overflow lead to a breakin? It is for such matters that Erickson expounds here. Written for you, whether you want to create such exploits or prevent them. In either case, the knowledge is the same. What the book requires is some knowledge of C and assembly. For the latter, it is the language of the Intel x86 family. But even if you don't know it, so long as you are familiar with any assembly language and the theory of a Neumann machine, then you can follow the text. This book is not for every programmer. It turns out that a fair number of programmers get into the field by learning a high level language like C, Fortran, Java or Pascal. But they never learn any assembly. To them, anything compiled from source is a black box. Instead, you need some background in assembly. The book also gives neat coverage of how to sniff network traffic and manipulate it. There is a section on cryptography. But for this, it is so specialised and vital that you should consult texts dedicated to it.
Guest More than 1 year ago
Its pretty good. Thier is one thing that i was looking for...beginner instructions. its not very user-friendly for a newbie. but even a newb can get it if they think a little harder... it was definately a good book. ;)
Anonymous 6 months ago
Chode chode chode chode chode chode...and more chode
Anonymous More than 1 year ago
Anonymous More than 1 year ago
Guest More than 1 year ago
Great work. The book is worth the value in coding lessons.
Anonymous More than 1 year ago
A great read especially for C programmers
Anonymous More than 1 year ago
Anonymous More than 1 year ago
Anonymous More than 1 year ago
Anonymous More than 1 year ago
LJ794 More than 1 year ago
This has a lot of interesting material from past, present and future. It gives the guidelines needed to exploit different systems from different angles and sources. It has a diverse knowledge base of every type of exploitation that is available for your own use to gain access, help protect or even secure your own system. I would recommend to anyone interested in protecting yourself from hackers.
Anonymous More than 1 year ago
Anonymous More than 1 year ago
Anonymous More than 1 year ago
Guest More than 1 year ago
This book is worth it because it gets down to the subject and lays it down for you in a clear and precise way. Have you ever had trouble reading some of the articles at phrack.org? This book will clear things up. It covers critical elements and gives good and essential examples. I also liked the attitude of the book, they don't take a position (exp: don't use this knowledge for evil, or something), they just share the knowledge and do what you will with it.
Guest More than 1 year ago
This is definately the book for people starting out in computer security and penetration testing. This book provides you with many techniques people use to utilize bugs in computer programs, such as format string exploitation, heap and buffer overflows, and general techniques on how to prevent them. Also goes into Cryptography, and LAN security.
Guest More than 1 year ago
this book is different from others .. written by a real geek ..