Hacking: The Art of Exploitation

Front Cover
No Starch Press, 2003 - Computers - 241 pages
76 Reviews
A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking," Hacking: The Art of Exploitation is for both technical and non-technical people who are interested in computer security. It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits. Unlike many so-called hacking books, this book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

What people are saying - Write a review

User ratings

5 stars
34
4 stars
25
3 stars
10
2 stars
3
1 star
4

Review: Hacking: The Art of Exploitation

User Review  - Nathan - Goodreads

This book was hard to read but more than worth it. This book argues that Hackers are misunderstood and that they should be respected as problem solvers, and the Author did a great job of persuading ... Read full review

Review: Hacking: The Art of Exploitation

User Review  - Jesse - Goodreads

Finally, years later, I've finished working through this. Do not recommend. The experience is probably better if you run Linux as packaged on the Live CD. I no longer own any devices with a CD drive ... Read full review

All 29 reviews »

References to this book

Computer Viruses and Malware
John Aycock
No preview available - 2006
Software-Qualität
Dirk W. Hoffmann
No preview available - 2008
All Book Search results »

About the author (2003)

Erickson has a formal education in computer science and speaks frequently at computer security conferences around the world. He currently works as a cryptologist and security specialist in Northern California.

Bibliographic information