An edition of Hacking (2003)

Hacking

The Art of Exploitation

2nd ed.
  • 4.86 ·
  • 7 Ratings
  • 291 Want to read
  • 30 Currently reading
  • 17 Have read
Not in Library

My Reading Lists:

Create a new list

Check-In

×Close
Add an optional check-in date. Check-in dates are used to track yearly reading goals.
Today

  • 4.86 ·
  • 7 Ratings
  • 291 Want to read
  • 30 Currently reading
  • 17 Have read

Buy this book

Last edited by Amount1537
September 17, 2022 | History
An edition of Hacking (2003)

Hacking

The Art of Exploitation

2nd ed.
  • 4.86 ·
  • 7 Ratings
  • 291 Want to read
  • 30 Currently reading
  • 17 Have read

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.

The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:

Program computers using C, assembly language, and shell scripts
Corrupt system memory to run arbitrary code using buffer overflows and format strings
Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening
Outsmart common security measures like nonexecutable stacks and intrusion detection systems
Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence
Redirect network traffic, conceal open ports, and hijack TCP connections
Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix
Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.

Publish Date
Language
English
Pages
472

Buy this book

Previews available in: English

Edition Availability
Cover of: Hacking
Hacking: Die Kunst des Exploits
Oct 01, 2008, Dpunkt.Verlag GmbH
paperback
Cover of: Hacking
Hacking: The Art of Exploitation
2008
in English - 2nd ed.
Cover of: Hacking
Hacking: the art of exploitation
2008, No Starch Press
in English - 2nd ed.
Cover of: Hacking
Hacking: The Art of Exploitation, 2nd Edition
October 24, 2007, No Starch Press
Paperback in English - 2 edition
Cover of: Hacking The Art Of Exploitation
Hacking The Art Of Exploitation
2003, No Starch Press
Paperback in English
Cover of: Hacking
Hacking: The Art of Exploitation
October 2003, No Starch Press
Paperback in English - 1 edition

Add another edition?

Book Details


Published in

San Francisco, CA

Edition Notes

Includes bibliographical references and index.

Classifications

Dewey Decimal Class
005.8
Library of Congress
QA76.9.A25 E75 2008

The Physical Object

Pagination
x, 472 p. :
Number of pages
472

ID Numbers

Open Library
OL24891296M
ISBN 10
1593271441
ISBN 13
9781593271442
LCCN
2007042910
OCLC/WorldCat
175218338

Community Reviews (0)

Feedback?
No community reviews have been submitted for this work.

History

Download catalog record: RDF / JSON / OPDS | Wikipedia citation
September 17, 2022 Edited by Amount1537 Edited without comment.
September 17, 2022 Edited by Amount1537 //covers.openlibrary.org/b/id/12903347-S.jpg
September 11, 2021 Edited by Jenner merge authors
November 17, 2020 Edited by Mek Merge works
July 29, 2011 Created by LC Bot Imported from Library of Congress MARC record.