Hacking: The Art of Exploitation

Front Cover
No Starch Press, 2003 - Computers - 241 pages
65 Reviews

A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking." It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits. This book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

What people are saying - Write a review

User ratings

5 stars
31
4 stars
20
3 stars
8
2 stars
2
1 star
4

Review: Hacking: The Art of Exploitation

User Review  - عَبدُالكَرِيمْ الهاشمي - Goodreads

Hands down this is one of the best technical books I've read so far. The only missing part I think is: - no integer overflow exploitation - no details about recent techniques to bypass ASLR - some chapters are not about exploits or memory corruptions Read full review

Review: Hacking: The Art of Exploitation

User Review  - Terry - Goodreads

Really, really good. Wonderful code examples and 'theory' behind the practice. Read full review

References to this book

Computer Viruses and Malware
John Aycock
No preview available - 2006
Software-Qualität
Dirk W. Hoffmann
No preview available - 2008
All Book Search results »

About the author (2003)

Erickson has a formal education in computer science and speaks frequently at computer security conferences around the world. He currently works as a cryptologist and security specialist in Northern California.

Bibliographic information