Shopping Cart

No products in the cart.

Hacking: The Art of Exploitation (2 ed)

Original price was: $49.95.Current price is: $5.00.

  • Publisher: No Starch Press; 2nd edition
  • Publication date: February 4, 2008
  • Author: Jon Erickson
  • Language: ‎English
  • File size: ‎6.50 MB
  • Format: ‎PDF
  • Pages: 488 pages
Brand Electro eBooks

Hacking: The Art of Exploitation, 2nd Edition

Hacking is the art of creative problem-solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.

Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:

  • Program computers using C, assembly language, and shell scripts.
  • Corrupt system memory to run arbitrary code using buffer overflows and format strings
  • Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening.
  • Outsmart common security measures like nonexecutable stacks and intrusion detection systems.
  • Gain access to a remote server using port binding or connect-back shellcode, and alter a server's logging behavior to hide your presence.
  • Redirect network traffic, conceal open ports, and hijack TCP connections.
  • Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix.

Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. With this knowledge and the Linux environment, you only need creativity.

About the Author

Jon Erickson has a formal education in computer science and has been hacking and programming since he was five years old. He speaks at computer security conferences and trains security teams around the world. Currently, he works as a vulnerability researcher and security specialist in Northern California.

Reviews

There are no reviews yet.

Be the first to review “Hacking: The Art of Exploitation (2 ed)”

Your email address will not be published. Required fields are marked *

Secure Payments
Securing online payments is a shared responsibility, and everyone can contribute their share.
Free Shipping
You get unlimited free shipping on eligible items with Electro eBooks, with no minimum spend.
Gifts & Sales
Sales gifts are helpful tools that are often used to show appreciation to clients for purchasing a product.
24/7 Support
Our customer care service is offered in the form of 1st or 2nd level support.
Electro eBooks W 170

Important updates waiting for you!

Subscribe and grab 20% OFF!
Subscription Form

Hacking: The Art of Exploitation (2 ed) PDF
Hacking: The Art of Exploitation (2 ed)

Original price was: $49.95.Current price is: $5.00.