Hacking: The Art of Exploitation
Anyway, this book describes much more sophisticated techniques starting with ...more
I read this book with the aim to learn more about assembly language and (broadly speaking) the hardware / software interface. I learned more than I ever cared to know about either of these things and so much more. It should be said, prior to purchasing this book, my ...more
I enjoyed reading and practicing while reading and my only beef with this book is that in my o ...more
While other books merely show how to run existing exploits, Hacking: The Art of Exploitation broke ground as the first book to explain how hacking and software exploits work and how readers could develop and implement their own. In the extensively updated and expanded second edition, author Jon Erickson again uses practical examples to illustrate the most common computer security issues in three related fields: programming, networking and cryptography. Includes a live CD, which provides a Linux...more
the techniques shown in the book will not work on most modern Linux distributions without crippling the security features that are baked into them (ASLR, stack canaries, DEP, etc)
the book focuses on teaching you the concepts without having you worry about turning off security features on Linux. While most of these techniques are outdated
The book does not cover Windows exploitation at all
after all i enjoyed reading it an ...more
If you're looking for a general overview of security (buffer overflows, encryption, passwords, wireless networks, network-enabled apps...), I think this is still a great resource.
Erickson's book is simply a masterpiece - a very cleanly written book yet comprehensive which introduces many concepts of hacking to the reader in an effective manner. It will likely be quite a challenging read for the inexperienced reader but well worth the effort for those attempting to get into cybersecurity. I also highly recommend this to many C and C++ programmers who ar ...more
Erickson also takes you through the ‘history’ of an exploit, with step by step guides that build on each other. It’s fascinating to see how ‘small’ ideas turn into really powerful tools.
Not a life changing masterpiece but a good insight into the ‘hacker’ mindset, without skimping on the technical information.
|The Corliss Group Latest Tech Review: Unternehmen, die gezielt durch Hacker||1||3||Sep 10, 2014 06:12PM|
|Abney And Associates: Abney and Associates Cyber Security Warning: Hacking problem all sides need to tackle||2||5||Mar 22, 2013 06:14PM|
Goodreads is hiring!
Learn more »