Hacking

Jon Erickson has a formal background in computer science and travels the world speaking at computer security conferences. In Northern California, he works as a cryptologist and security professional.


Hacking is the art of issue solving through creativity, whether it's finding an alternative solution to a challenging problem or exploiting flaws in careless programming. Many people call themselves hackers, but few have the technical basis required to truly push the boundaries.


Author Jon Erickson explains how obscure hacking techniques work rather than simply teaching how to run current exploits. Hacking: The Art of Exploitation, 2nd Edition covers the principles of C programming from a hacker's perspective in order to share the art and science of hacking in a way that is accessible to everyone.


The bundled LiveCD provides a full Linux development and debugging environment without requiring any changes to your current operating system. Use it to follow along with the examples in the book as you cover knowledge gaps and experiment with hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network traffic, circumventing security, exploiting cryptographic flaws, and possibly designing new attacks.


Among the best books on computer networking, this book will teach you how to do the following:

  • C, assembly language, and shell scripts are used to program machines.
  • Using buffer overflows and format strings, corrupt system memory to run arbitrary code.
  • Debug processor registers and system memory to acquire a true grasp of what is going on
  • Outwit traditional security mechanisms such as nonexecutable stacks and intrusion detection systems
  • Use port-binding or connect-back shellcode to get access to a remote server, and change a server's logging behavior to conceal your existence.
  • Hijack TCP connections, redirect network traffic, and conceal open ports
  • The FMS attack is used to crack encrypted wireless traffic, and a password probability matrix is used to speed up brute-force attacks.


Hackers are constantly pushing the envelope, exploring the unknown, and perfecting their craft. Even if you have no prior programming experience, Hacking: The Art of Exploitation, 2nd Edition will provide you with a comprehensive understanding of programming, machine architecture, network communications, and existing hacking techniques. When you combine this knowledge with the supplied Linux environment, all you need is your own imagination.


Author: Jon Erickson

Link to buy: https://www.amazon.com/Hacking-Art-Exploitation-Jon-Erickson/dp/1593271441/

Ratings: 4.7 out of 5 stars (from 1181 reviews)

Best Sellers Rank: #27,120 in Books

#5 in Computer Cryptography

#5 in Web Encryption

#10 in Privacy & Online Safety


https://www.amazon.com/
https://www.amazon.com/
https://www.amazon.com/
https://www.amazon.com/

Toplist Joint Stock Company
Address: 3rd floor, Viet Tower Building, No. 01 Thai Ha Street, Trung Liet Ward, Dong Da District, Hanoi City, Vietnam
Phone: +84369132468 - Tax code: 0108747679
Social network license number 370/GP-BTTTT issued by the Ministry of Information and Communications on September 9, 2019
Privacy Policy