×

Uh-oh, it looks like your Internet Explorer is out of date.

For a better shopping experience, please upgrade now.

Hacking, 2nd Edition: The Art of Exploitation
     

Hacking, 2nd Edition: The Art of Exploitation

4.3 20
by Jon Erickson
 

See All Formats & Editions

Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.

The included LiveCD

Overview

Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.

The included LiveCD provides a complete Linux programming and debugging environment—all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits.

Product Details

ISBN-13:
9781593273385
Publisher:
No Starch Press San Francisco, CA
Publication date:
02/01/2008
Sold by:
Barnes & Noble
Format:
NOOK Book
Sales rank:
240,174
File size:
3 MB

Customer Reviews

Average Review:

Post to your social network

     

Most Helpful Customer Reviews

See all customer reviews

Hacking 4.3 out of 5 based on 0 ratings. 20 reviews.
Guest More than 1 year ago
Are you a true hacker in the name of the word? If you are, then this book is for you. Author Jon Erickson, has done an outstanding job of writing a second edition of a book that shows you the true spirit of hacking. Erickson, begins with an explanation of how programs can be exploited. Then, the author discusses the less obvious errors that have given birth to more complex exploit techniques that can be applied in many different places. Next, he shows you how to network your applications by using sockets and how to deal with common network vulnerabilities. The author also discusses how writing shellcode develops assembly language skills and employs a number of hacking techniques worth knowing. He continues by showing you why defensive countermeasures can be separated into two groups: Those that try to detect the attack and those that try to protect the vulnerability. Finally, the author discusses why cryptology is relevant to hacking in a number of ways. This most excellent book has explained some of the basic techniques of hacking. But, more importantly, the book looked at various hacker techniques, from the past to the present, and dissected them to learn how and why they work.
Guest More than 1 year ago
This book dosn't just instruct you on running a program to create an exploit, it takes you into the anatomy of one, how it works, and shows you how to code it. I agree that this book is for more experienced programmers, and is a fine overview for any C or Assembly programmer. I would definately recommend getting this book if you just want to get more control over your computer and programs, or if you want to make your computer and programs secure. Overall, it is THE book to get.
Guest More than 1 year ago
You have probably heard of such hacking techniques as buffer overflows. Typically, a book might give only cursory explanation, especially if it is not devoted to hacking. But suppose you write in C. Chances are you've inadvertantly created buffer overflows and then spent hours chasing this down, after your program crashed. So how on earth can a deliberate overflow lead to a breakin? It is for such matters that Erickson expounds here. Written for you, whether you want to create such exploits or prevent them. In either case, the knowledge is the same. What the book requires is some knowledge of C and assembly. For the latter, it is the language of the Intel x86 family. But even if you don't know it, so long as you are familiar with any assembly language and the theory of a Neumann machine, then you can follow the text. This book is not for every programmer. It turns out that a fair number of programmers get into the field by learning a high level language like C, Fortran, Java or Pascal. But they never learn any assembly. To them, anything compiled from source is a black box. Instead, you need some background in assembly. The book also gives neat coverage of how to sniff network traffic and manipulate it. There is a section on cryptography. But for this, it is so specialised and vital that you should consult texts dedicated to it.
Guest More than 1 year ago
Its pretty good. Thier is one thing that i was looking for...beginner instructions. its not very user-friendly for a newbie. but even a newb can get it if they think a little harder... it was definately a good book. ;)
Anonymous 7 months ago
Chode chode chode chode chode chode...and more chode
Anonymous More than 1 year ago
Anonymous More than 1 year ago
Guest More than 1 year ago
Great work. The book is worth the value in coding lessons.
Anonymous More than 1 year ago
A great read especially for C programmers
Anonymous More than 1 year ago
Anonymous More than 1 year ago
Anonymous More than 1 year ago
Anonymous More than 1 year ago
LJ794 More than 1 year ago
This has a lot of interesting material from past, present and future. It gives the guidelines needed to exploit different systems from different angles and sources. It has a diverse knowledge base of every type of exploitation that is available for your own use to gain access, help protect or even secure your own system. I would recommend to anyone interested in protecting yourself from hackers.
Anonymous More than 1 year ago
Anonymous More than 1 year ago
Anonymous More than 1 year ago
Guest More than 1 year ago
This book is worth it because it gets down to the subject and lays it down for you in a clear and precise way. Have you ever had trouble reading some of the articles at phrack.org? This book will clear things up. It covers critical elements and gives good and essential examples. I also liked the attitude of the book, they don't take a position (exp: don't use this knowledge for evil, or something), they just share the knowledge and do what you will with it.
Guest More than 1 year ago
This is definately the book for people starting out in computer security and penetration testing. This book provides you with many techniques people use to utilize bugs in computer programs, such as format string exploitation, heap and buffer overflows, and general techniques on how to prevent them. Also goes into Cryptography, and LAN security.
Guest More than 1 year ago
this book is different from others .. written by a real geek ..