Synopses & Reviews
A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking." It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits. This book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.
"This is an excellent book. Those who are ready to move on to [the next level] should pick this book up and read it thoroughly." About.com
"Most complete tutorial on hacking techniques. Finally a book that does not just show how to use the exploits but how to develop them." Phrack
"While Hacking is probably a bit too technical for a casual computer user, it makes fascinating reading for those who either wish to know more or want to refine their advanced skills." The Tribune Review
This book is for both technical and nontechnical people interested in computer security. Unlike many so-called hacking books, this explains technical aspects of hacking such as stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.
Includes bibliographical references (p. 230-232) and index.
About the Author
Jon Erickson has a formal education in computer science and speaks frequently at computer security conferences around the world. He currently works as a cryptologist and security specialist in Northern California.