Hacking: The Art Of Exploitation, 2nd Edition

Hacking: The Art Of Exploitation, 2nd Edition

Description

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.

The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:

Program computers using C, assembly language, and shell scripts Corrupt system memory to run arbitrary code using buffer overflows and format strings Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening Outsmart common security measures like nonexecutable stacks and intrusion detection systems Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presenceRedirect network traffic, conceal open ports, and hijack TCP connections Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix

Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.

Similar Books

ISBN 10: 1118026470
ISBN 13: 9781118026472

07 Oct 2011
Dafydd Stuttard

ISBN 10: 1512214566
ISBN 13: 9781512214567

20 Jun 2015
Peter Kim

ISBN 10: 0124116442
ISBN 13: 9780124116443

26 Sep 2013
Patrick Engebretson

ISBN 10: 1593275900
ISBN 13: 9781593275907

21 Jan 2015
Justin Seitz

ISBN 10: 1593272901
ISBN 13: 9781593272906

27 Mar 2012
Michael Sikorski

ISBN 10: 1980901759
ISBN 13: 9781980901754

02 May 2018
Peter Kim

ISBN 10: 1118907442
ISBN 13: 9781118907443

13 Aug 2014
Jon Duckett

ISBN 10: 1494932636
ISBN 13: 9781494932633

13 Mar 2014
Peter Kim

ISBN 10: 1494295504
ISBN 13: 9781494295509

11 Feb 2014
Ben Clark

ISBN 10: 0316212180
ISBN 13: 9780316212182

03 May 2012
Kevin Mitnick

ISBN 10: 0321563840
ISBN 13: 9780321563842

05 Jun 2013
Bjarne Stroustrup

ISBN 10: 1597499579
ISBN 13: 9781597499576

17 Dec 2012
TJ O'Connor

Warning: fopen(/var/www/johnbellbooks.com/htdocs/core/../sitemap_datas/auto/isbn_and_title_1.txt): failed to open stream: Permission denied in /var/www/johnbellbooks.com/htdocs/core/krenabiz.php on line 0

Warning: fwrite() expects parameter 1 to be resource, bool given in /var/www/johnbellbooks.com/htdocs/core/krenabiz.php on line 0

Warning: fclose() expects parameter 1 to be resource, bool given in /var/www/johnbellbooks.com/htdocs/core/krenabiz.php on line 0