Hacking: The Art of Exploitation w/CD First Edition
Thumbnail 1

Hacking: The Art of Exploitation w/CD First Edition

4.3/5
Product ID: 40569213
Secure Transaction

Description

Full description not available

Reviews

4.3

All from verified purchases

S**N

The best book

This is the best book I have ever read. This book explains everything in each and every topic related to hacking. Unlike other books which explains the preexisting tools, the author has shown some light on how to create new tools and hence I would suggest that this book is for intellectual thinkers who are creative enough to get the knowledge from this book and create a new era.

T**R

Very good book.

Very good book ... i didn't get the CD but i find its a very good book very detailed on the instructions. Thanks for having this book

J**E

One of a Kind

This book is for the security pro or would be hacker who want's to begin to see how deep the rabbit hole really does go. There is no other book like it on the market, and I've read most of them. Jon Erickson's code included in the book all works well as designed on Linux. The author also suggests some good free Linux tools for use with the code examples including most notably a hex editor, basic dissassembler, and packet injector.The techniques in the book are best described by a caption on its back cover, "The fundamental techniques of serious hacking." It includes major sections on programming, networking, and cryptography. All material is covered with an eye towards exploitation. Languages used in the book material consist of C, PERL, and Assembly for X86.The techniques described in this book are fundamental to any hacker or security professional who takes their work seriously. The book is well worth the discounted amazon.com price. The material in this book is all original and cannot be found elsewhere. Each example in the programming section is truly an eye opener if you are new to code hacking. The examples in the networking and cryptography sections are relevant and fresh as well.

R**E

Superbe, thrilling , excellent book

This is one of the best books I've ever read. I have read most of the current books in network security, and this is the first one, teaching you how to "think". While most other books on the market will show how to run exploits written by others, this is the first one addressing how to make yourself working exploit code. I am familiar with most papers on this issue (Murat's text, Aleph0' etc), but never before have I seen such clarity and pedagogical approach as in "hacking : the art of exploitation". Besides, I learned new techniques on exploiting an elf binary from this book.Ever since I started reading it, I could not leave the book apart. The writing style is very clear, precise, making diffcult topics (like shellcode writing, printable shellcodes, heap/stack overflows) accesible and easily understandable for everyone.The author presents three major topics. The first one addresses in excellent detail how software exploits can be crafted. Here you can learn a methodology on how buffer/heap/format string vulnerabilities are done. A second part of the book discusses network level vulnerabilities, while the last part adddresses cryptography. Even on this last topic, which traditionally looks either to mathematical or to general in other books, "hacking : the art of exploitation" is great and keeps one breathless.To summarize : If you're interested in network security, or enjoying learning/reading neurons-stimulating stuff, this is the book to read.

J**N

Excellent book. A must have for programmers for the thought process presented alone.

This book does an excellent job of explain various techniques that hackers employ. The explainations include examples, source code, breakouts, and descriptions. The book progresses from basic examples to more complex by building upon a project a little at a time.The book bascially covers 3 broad areas: programming, networking, and cryptogrophy.Programming covers buffer overflows, stack exploits, heap overflows, polymorphic code, inline loaders and other information. Examples are presented in C and assembly. Networking covers many different exploits generally centered around the modification of packets and/or spoofing. Cryptography generally covers password based attacks.The author has a careful approach that makes the book enjoyable to read and easy to follow. He does not jump from one step to the next without covering each step in detail. This makes the text both readable and enjoyable.Most examples are realted to Unix or Linux but the exploits are universal. Several different tools are described and all were open source.Highly recommended.

J**N

Sufficient

This novel is pretty intricate and is definitely not for a beginning computer user. Knowledge of programming is almost mandatory before reading this book. It is very resourceful and informing. A very good book indeed! Worth the money if you can understand it...

U**T

So basic

Book just describes some basic "hacking" techniques. So basic it hurts.Every developer should know this basic tech.SQL injection in web pages? Jou must be joking. Buffer overrun? Ever tried that on an unknown app?Easy reading, but better spend time leaning assembler. I will find out more about hacking.It is not that easy anymore in 2010.

E**X

Great for a real understanding

I've been interested in hacking and security for years and spent most of those reading various online texts, Phrack, 2600, and anything else I could find. This was the first book that was able to explain just what is happening in enough detail and step-by-step that everything clicked. As is the case with any decent text for this topic you will need to know some programming (Assembly and C) to get the full effect. Without the programming knowledge it's still a valuable book for the concepts but you certainly won't be able to put that knowledge to any use. A great aspect is that Erickson begins with a rough "good enough" style explanation and example then slowly refines them both to a truly elegant end. This is unquestionably my favorite hacking book and without it I might still be trying to figure some of the topics out.

Common Questions

Trustpilot

TrustScore 4.5 | 7,300+ reviews

Yusuf A.

Fantastic experience overall. Will recommend to friends and family.

1 month ago

Rajesh P.

Customer service was outstanding when I had questions about the product.

2 days ago

Shop Global, Save with Desertcart
Value for Money
Competitive prices on a vast range of products
Shop Globally
Serving over 300 million shoppers across more than 200 countries
Enhanced Protection
Trusted payment options loved by worldwide shoppers
Customer Assurance
Trusted payment options loved by worldwide shoppers.
Desertcart App
Shop on the go, anytime, anywhere.
€ 72.63

Duties & taxes incl.

Irelandstore
1
Free Returns

30 daysfor PRO membership users

15 dayswithout membership

Secure Transaction

Trustpilot

TrustScore 4.5 | 7,300+ reviews

Fatima A.

Best international shipping I've ever tried. Worth every penny!

3 days ago

Ravi S.

I loved the variety of products available. Will definitely shop again.

2 months ago

Hacking The Art Of Exploitation W Cd First Edition | Desertcart Ireland