Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.
The included LiveCD provides a complete Linux programming and debugging environment—all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits.
Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.
The included LiveCD provides a complete Linux programming and debugging environment—all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits.
Hacking: The Art of Exploitation, 2nd Edition
488Hacking: The Art of Exploitation, 2nd Edition
488Product Details
ISBN-13: | 9781593273385 |
---|---|
Publisher: | No Starch Press San Francisco, CA |
Publication date: | 02/01/2008 |
Sold by: | Penguin Random House Publisher Services |
Format: | eBook |
Pages: | 488 |
Sales rank: | 228,925 |
File size: | 1 MB |
About the Author
Customer Reviews
Explore More Items
Pen Testing is necessary for companies looking to target, test, analyze, and patch the security vulnerabilities from
Stress, anxiety, and exhaustion are all-too-common features of our crazy-paced,
Running your own business can be cool, but some of the financial side—accounting and payroll, for instance—is
Investing and trading in gold and silver is always a sound idea—and that goes double in a time of unusual market fluctuation. As people look for
There's a reason why the first two editions of this book have sold thousands of copies
If you’re an experienced programmer interested in crunching data, this book will get you started with machine learning—a toolkit of algorithms that enables computers to train themselves
Web applications are the front door to most organizations, exposing them to attacks that may disclose personal
I'll Have You Exterminating
Get a comprehensive, in-depth introduction to the core Python language with this hands-on book. Based on author Mark Lutz’s popular training course, this updated fifth edition will help you
In the Guide, you'll learn