Hacking: The Art of Exploitation

Front Cover
No Starch Press, 2003 - Computers - 241 pages
20 Reviews
A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking," Hacking: The Art of Exploitation is for both technical and non-technical people who are interested in computer security. It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits. Unlike many so-called hacking books, this book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

From inside the book

What people are saying - Write a review

User ratings

5 stars
8
4 stars
8
3 stars
4
2 stars
0
1 star
0

Review: Hacking: The Art of Exploitation

User Review  - عَبدُالكَرِيمْ الهاشمي - Goodreads

Hands down this is one of the best technical books I've read so far. The only missing part I think is: - no integer overflow exploitation - no details about recent techniques to bypass ASLR - some chapters are not about exploits or memory corruptions Read full review

Review: Hacking: The Art of Exploitation

User Review  - Terry - Goodreads

Really, really good. Wonderful code examples and 'theory' behind the practice. Read full review

Contents

Chapter
1
PROGRAMMING
7
0x230 Generalized Exploit Techniques
14
Copyright

17 other sections not shown

Common terms and phrases

References to this book

Computer Viruses and Malware
John Aycock
No preview available - 2006
Software-Qualität
Dirk W. Hoffmann
No preview available - 2008
All Book Search results »

About the author (2003)

Erickson has a formal education in computer science and speaks frequently at computer security conferences around the world. He currently works as a cryptologist and security specialist in Northern California.

Bibliographic information