- Used Books
- Staff Picks
- Gifts & Gift Cards
- Sell Books
- Stores & Events
- Let's Talk Books
Special Offers see all
More at Powell's
Recently Viewed clear list
This item may be
Check for Availability
Hacking: The Art of Exploitationby Jon Erickson
Synopses & Reviews
A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking." It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits. This book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.
"This is an excellent book. Those who are ready to move on to [the next level] should pick this book up and read it thoroughly." About.com
"Most complete tutorial on hacking techniques. Finally a book that does not just show how to use the exploits but how to develop them." Phrack
"While Hacking is probably a bit too technical for a casual computer user, it makes fascinating reading for those who either wish to know more or want to refine their advanced skills." The Tribune Review
Book News Annotation:
Erickson, a cryptologist and security specialist, introduces the spirit and theory of computer hacking as well as the science, allowing readers to understand the hacker mindset and thwart potential attacks. He explains how to exploit programs using buffer overflows and format strings, write printable ASCII polymorphic shellcode, defeat non- executable stacks by returning to libc, and crack encrypted 8-2.11b wireless traffic using the FMS attack.
Annotation ©2004 Book News, Inc., Portland, OR (booknews.com)
This book is for both technical and nontechnical people interested in computer security. Unlike many so-called hacking books, this explains technical aspects of hacking such as stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.
Includes bibliographical references (p. 230-232) and index.
About the Author
Jon Erickson has a formal education in computer science and speaks frequently at computer security conferences around the world. He currently works as a cryptologist and security specialist in Northern California.
What Our Readers Are Saying
Average customer rating based on 1 comment: