Hacking: The Art of Exploitation

Front Cover
No Starch Press, 2003 - Computers - 241 pages
20 Reviews
A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking," Hacking: The Art of Exploitation is for both technical and non-technical people who are interested in computer security. It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits. Unlike many so-called hacking books, this book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

From inside the book

What people are saying - Write a review

User ratings

5 stars
4 stars
3 stars
2 stars
1 star

Review: Hacking: The Art of Exploitation

User Review  - عَبدُالكَرِيمْ الهاشمي - Goodreads

Hands down this is one of the best technical books I've read so far. The only missing part I think is: - no integer overflow exploitation - no details about recent techniques to bypass ASLR - some chapters are not about exploits or memory corruptions Read full review

Review: Hacking: The Art of Exploitation

User Review  - Terry - Goodreads

Really, really good. Wonderful code examples and 'theory' behind the practice. Read full review


0x230 Generalized Exploit Techniques

17 other sections not shown

Common terms and phrases

References to this book

Computer Viruses and Malware
John Aycock
No preview available - 2006
Dirk W. Hoffmann
No preview available - 2008
All Book Search results »

About the author (2003)

Erickson has a formal education in computer science and speaks frequently at computer security conferences around the world. He currently works as a cryptologist and security specialist in Northern California.

Bibliographic information