Hacking: The Art of Exploitation

Front Cover
No Starch Press, 2003 - Computers - 241 pages
78 Reviews
A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking," Hacking: The Art of Exploitation is for both technical and non-technical people who are interested in computer security. It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits. Unlike many so-called hacking books, this book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

What people are saying - Write a review

User ratings

5 stars
33
4 stars
26
3 stars
12
2 stars
3
1 star
4

Review: Hacking: The Art of Exploitation

User Review  - Goodreads

It's very good book to start taking information about hacking and security attacks, but all parts of this book are practical using C programming language and starting from scratch. Read full review

Review: Hacking: The Art of Exploitation

User Review  - Jesse - Goodreads

Finally, years later, I've finished working through this. Do not recommend. The experience is probably better if you run Linux as packaged on the Live CD. I no longer own any devices with a CD drive ... Read full review

All 11 reviews »

Other editions - View all

References to this book

Computer Viruses and Malware
John Aycock
No preview available - 2006
Software-Qualität
Dirk W. Hoffmann
No preview available - 2008
All Book Search results »

About the author (2003)

Erickson has a formal education in computer science and speaks frequently at computer security conferences around the world. He currently works as a cryptologist and security specialist in Northern California.

Bibliographic information