Hacking, 2nd Edition: The Art of Exploitation [NOOK Book]

Overview

Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.

The included LiveCD provides a complete Linux programming and debugging environment—all without modifying your current operating system. Use it to ...

See more details below
Hacking, 2nd Edition: The Art of Exploitation

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK
  • NOOK HD/HD+ Tablet
  • NOOK
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$22.99
BN.com price
(Save 42%)$39.95 List Price

Overview

Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.

The included LiveCD provides a complete Linux programming and debugging environment—all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits.

Read More Show Less

Product Details

  • ISBN-13: 9781593273385
  • Publisher: No Starch Press San Francisco, CA
  • Publication date: 2/1/2008
  • Sold by: Barnes & Noble
  • Format: eBook
  • Sales rank: 171,522
  • File size: 4 MB

Customer Reviews

Average Rating 4
( 18 )
Rating Distribution

5 Star

(8)

4 Star

(8)

3 Star

(0)

2 Star

(2)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 18 Customer Reviews
  • Anonymous

    Posted February 17, 2008

    HACKING!! WHICH SIDE OF THE FENCE ARE YOU ON??

    Are you a true hacker in the name of the word? If you are, then this book is for you. Author Jon Erickson, has done an outstanding job of writing a second edition of a book that shows you the true spirit of hacking. Erickson, begins with an explanation of how programs can be exploited. Then, the author discusses the less obvious errors that have given birth to more complex exploit techniques that can be applied in many different places. Next, he shows you how to network your applications by using sockets and how to deal with common network vulnerabilities. The author also discusses how writing shellcode develops assembly language skills and employs a number of hacking techniques worth knowing. He continues by showing you why defensive countermeasures can be separated into two groups: Those that try to detect the attack and those that try to protect the vulnerability. Finally, the author discusses why cryptology is relevant to hacking in a number of ways. This most excellent book has explained some of the basic techniques of hacking. But, more importantly, the book looked at various hacker techniques, from the past to the present, and dissected them to learn how and why they work.

    2 out of 2 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted February 23, 2005

    The only hacking book to get

    This book dosn't just instruct you on running a program to create an exploit, it takes you into the anatomy of one, how it works, and shows you how to code it. I agree that this book is for more experienced programmers, and is a fine overview for any C or Assembly programmer. I would definately recommend getting this book if you just want to get more control over your computer and programs, or if you want to make your computer and programs secure. Overall, it is THE book to get.

    1 out of 1 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted March 5, 2004

    Need to know Assembly

    You have probably heard of such hacking techniques as buffer overflows. Typically, a book might give only cursory explanation, especially if it is not devoted to hacking. But suppose you write in C. Chances are you've inadvertantly created buffer overflows and then spent hours chasing this down, after your program crashed. So how on earth can a deliberate overflow lead to a breakin? It is for such matters that Erickson expounds here. Written for you, whether you want to create such exploits or prevent them. In either case, the knowledge is the same. What the book requires is some knowledge of C and assembly. For the latter, it is the language of the Intel x86 family. But even if you don't know it, so long as you are familiar with any assembly language and the theory of a Neumann machine, then you can follow the text. This book is not for every programmer. It turns out that a fair number of programmers get into the field by learning a high level language like C, Fortran, Java or Pascal. But they never learn any assembly. To them, anything compiled from source is a black box. Instead, you need some background in assembly. The book also gives neat coverage of how to sniff network traffic and manipulate it. There is a section on cryptography. But for this, it is so specialised and vital that you should consult texts dedicated to it.

    1 out of 1 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted November 17, 2003

    Good

    Its pretty good. Thier is one thing that i was looking for...beginner instructions. its not very user-friendly for a newbie. but even a newb can get it if they think a little harder... it was definately a good book. ;)

    1 out of 1 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted December 6, 2011

    Amazing Coding!

    Great work. The book is worth the value in coding lessons.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted November 13, 2011

    Highly Recommended

    A great read especially for C programmers

    Was this review helpful? Yes  No   Report this review
  • Posted November 21, 2009

    Great Read!!

    This has a lot of interesting material from past, present and future. It gives the guidelines needed to exploit different systems from different angles and sources. It has a diverse knowledge base of every type of exploitation that is available for your own use to gain access, help protect or even secure your own system. I would recommend to anyone interested in protecting yourself from hackers.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted December 19, 2004

    This is a must have

    This book is worth it because it gets down to the subject and lays it down for you in a clear and precise way. Have you ever had trouble reading some of the articles at phrack.org? This book will clear things up. It covers critical elements and gives good and essential examples. I also liked the attitude of the book, they don't take a position (exp: don't use this knowledge for evil, or something), they just share the knowledge and do what you will with it.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted November 17, 2003

    Very Good

    This is definately the book for people starting out in computer security and penetration testing. This book provides you with many techniques people use to utilize bugs in computer programs, such as format string exploitation, heap and buffer overflows, and general techniques on how to prevent them. Also goes into Cryptography, and LAN security.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted September 27, 2003

    very good

    this book is different from others .. written by a real geek ..

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted December 21, 2009

    No text was provided for this review.

  • Anonymous

    Posted August 14, 2010

    No text was provided for this review.

  • Anonymous

    Posted May 20, 2010

    No text was provided for this review.

  • Anonymous

    Posted April 18, 2009

    No text was provided for this review.

  • Anonymous

    Posted February 9, 2013

    No text was provided for this review.

  • Anonymous

    Posted March 16, 2009

    No text was provided for this review.

  • Anonymous

    Posted April 27, 2009

    No text was provided for this review.

  • Anonymous

    Posted February 3, 2010

    No text was provided for this review.

Sort by: Showing all of 18 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)