Hacking: The Art of Exploitation

Front Cover
No Starch Press, 2003 - Computers - 241 pages
23 Reviews
A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking," Hacking: The Art of Exploitation is for both technical and non-technical people who are interested in computer security. It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits. Unlike many so-called hacking books, this book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

From inside the book

What people are saying - Write a review

User ratings

5 stars
8
4 stars
9
3 stars
5
2 stars
1
1 star
0

Review: Hacking: The Art of Exploitation

User Review  - Nathan - Goodreads

This book was hard to read but more than worth it. This book argues that Hackers are misunderstood and that they should be respected as problem solvers, and the Author did a great job of persuading ... Read full review

Review: Hacking: The Art of Exploitation

User Review  - Jesse - Goodreads

Finally, years later, I've finished working through this. Do not recommend. The experience is probably better if you run Linux as packaged on the Live CD. I no longer own any devices with a CD drive ... Read full review

All 16 reviews »

Contents

Chapter
1
Programming
7
0x230 Generalized Exploit Techniques
14
Copyright

17 other sections not shown

Common terms and phrases

References to this book

Computer Viruses and Malware
John Aycock
No preview available - 2006
Software-Qualität
Dirk W. Hoffmann
No preview available - 2008
All Book Search results »

About the author (2003)

Erickson has a formal education in computer science and speaks frequently at computer security conferences around the world. He currently works as a cryptologist and security specialist in Northern California.

Bibliographic information