But scarcely anybody understands what a hacker is doing at all. What the heck is hacking actually?
This book is a story about exploit development. It demonstrates how a hacker exploits a browser vulnerability, step-by-step.
Starting with the crash time analysis of a vulnerable program, the author develops an exploit and shows blow-by-blow how a hacker thinks; what problems come up, and how an attacker can bypass the security protection mechanisms of the operating system.
This book is highly technical! The reader is required to have a slightly perverse inclination to read debug messages, memory addresses and assembler instructions.
If you're interested in hacking, you will get a quite good understanding about what hacking is in practice.
If you're a newbie to Win32 hacking, roll up your sleeves and become a hacker! Learn about shellcode, and how to bypass ASLR and DEP!
If you're part of the InfoSec community, have a good reading. This is no theory, this is deep dive!
|Publisher:||Books on Demand|
|Product dimensions:||8.27(w) x 11.69(h) x 0.34(d)|
About the Author