Hacking: The Art of Exploitation
Rather than merely showing how to run existing exploits, author Jon Erickson explains how
Anyway, this book describes much more sophisticated techniques starting with ...more
I read this book with the aim to learn more about assembly language and (broadly speaking) the hardware / software interface. I learned more than I ever cared to know about either of these things and so much more. It should be said, prior to purchasing this book, my ...more
I enjoyed reading and practicing while reading and my only beef with this book is that in my ...more
While other books merely show how to run existing exploits, Hacking: The Art of Exploitation broke ground as the first book to explain how hacking and software exploits work and how readers could develop and implement their own. In the extensively updated and expanded second edition, author Jon Erickson again uses practical examples to illustrate the most common computer security issues in three related fields: programming, networking and cryptography. Includes a live CD, which provides a Linux...more
the techniques shown in the book will not work on most modern Linux distributions without crippling the security features that are baked into them (ASLR, stack canaries, DEP, etc)
the book focuses on teaching you the concepts without having you worry about turning off security features on Linux. While most of these techniques are outdated
The book does not cover Windows exploitation at all
after all i enjoyed reading it ...more
If you're looking for a general overview of security (buffer overflows, encryption, passwords, wireless networks, network-enabled apps...), I think this is still a great resource.
The only missing part I think is:
- no integer overflow exploitation
- no details about recent techniques to bypass ASLR
- some chapters are not about exploits or memory corruptions
Erickson also takes you through the ‘history’ of an exploit, with step by step guides that build on each other. It’s fascinating to see how ‘small’ ideas turn into really powerful tools.
Not a life changing masterpiece but a good insight into the ‘hacker’ mindset, without skimping on the technical information.
It starts off gentle, doing the typical street analogy with avenues, streets, cars, houses, and homeowners... but then it quickly picks up pace to a point where I feel that unless you have some experience in programming (preferably C) than you will get lost quick.
I was actually stuck in an Airport on a layover for something like 10 hours and I had this book in my bag. I was able to really dive into it in that time and it really kept me busy all the way even on the ...more
[Speaking of the .ISO file, it was quite a little trick for me to be able to access the content. If you have a physical book, you would just pop the DVD into your computer. (Although fewer computers have ...more
|The Corliss Group Latest Tech Review: Unternehmen, die gezielt durch Hacker||1||3||Sep 10, 2014 06:12PM|
|Abney And Associates: Abney and Associates Cyber Security Warning: Hacking problem all sides need to tackle||2||5||Mar 22, 2013 06:14PM|
Goodreads is hiring!
Learn more »