Hacking: The Art of Exploitation
A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking," Hacking: The Art of Exploitation is for both technical and non-technical people who are interested in computer security. It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits. Unlike many so-called hacking books, this book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.
What people are saying - Write a review
0x230 Generalized Exploit Techniques
17 other sections not shown
Other editions - View all
algorithm ALLOC argument ARP cache assembles attack bits buffer bytecode character ciphers connection DEBUG define eax push eax EAX to wrap encrypted environment variable execution exit exploit field width fmt_vuln following output format parameter format string getenvaddr global offset table hackers hacking hash hexadecimal IP address keystream layer least significant byte libc loader code MAC address machine memory addresses nemesis null bytes objdump overdose overflow overwrite overwritten Packet Injected password pcalc perl e print plaintext port printable ASCII printable shellcode printable values printf protocol push eax push Redirecting return address segment Segmentation fault sequence number setuid shellcode spoofed stack frame stack pointer strcpy sub eax Subtract more printable tcpdump technique test_val g values from EAX vuln vuln2 perl vulnerable program whoami whoami root wrap EAX write