Hacking: The Art of Exploitation
A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking," Hacking: The Art of Exploitation is for both technical and non-technical people who are interested in computer security. It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits. Unlike many so-called hacking books, this book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.
What people are saying - Write a review
0x230 Generalized Exploit Techniques
17 other sections not shown
Other editions - View all
algorithm ALL0C argument ARP cache assembles attack bits buffer bytecode C0NTENTS char character ciphers connection DEBUG define dtors encrypted environment variable execution exit exploit field width following output format parameter format string function function_ptr getenvaddr global offset table hackers hacking hash hexadecimal host fingerprint idle host instructions IP address keystream L0AD layer least significant byte libc loader code located MAC address machine memory address nemesis null bytes objdump open open open overdose overflow overwrite overwritten Packet Injected password pcalc perl e print plaintext port printable ASCII printable shellcode printable values printf protocol push eax READ0NLY Redirecting return address scan segment Segmentation fault sequence number setuid shellcode spoofed stack frame strcpy sub eax sudo tcpdump technique test_val g vuln2 perl vulnerable program whoami whoami root write