Hacking: The Art of Exploitation

Front Cover
No Starch Press, 2003 - Computers - 241 pages
97 Reviews
A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking," Hacking: The Art of Exploitation is for both technical and non-technical people who are interested in computer security. It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits. Unlike many so-called hacking books, this book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

What people are saying - Write a review

User ratings

5 stars
43
4 stars
33
3 stars
15
2 stars
2
1 star
4

Review: Hacking: The Art of Exploitation

User Review  - Thomas - Goodreads

Good book. Mostly about C and overflow-based attacks, which can be kind of confusing if you were looking for a more high-level book... Read full review

Review: Hacking: The Art of Exploitation

User Review  - Goodreads

Good book. Mostly about C and overflow-based attacks, which can be kind of confusing if you were looking for a more high-level book... Read full review

All 11 reviews »

References to this book

Computer Viruses and Malware
John Aycock
No preview available - 2006
Software-Qualität
Dirk W. Hoffmann
No preview available - 2008
All Book Search results »

About the author (2003)

Erickson has a formal education in computer science and speaks frequently at computer security conferences around the world. He currently works as a cryptologist and security specialist in Northern California.

Bibliographic information