Hacking: The Art of Exploitation
Jon Erickson is a computer science graduate who has been hacking and programming since he was five years old. He travels the world speaking at computer security conferences and training security teams. He is currently employed in Northern California as a vulnerability researcher and security specialist.
Hacking is the art of issue solving through creativity, whether it's finding an alternative solution to a challenging problem or exploiting flaws in careless programming. Many people call themselves hackers, but few have the technical basis required to truly push the boundaries.
Author Jon Erickson explains how obscure hacking techniques work rather than simply teaching how to run current exploits. Hacking: The Art of Exploitation, 2nd Edition covers the principles of C programming from a hacker's perspective in order to share the art and science of hacking in a way that is accessible to everyone.
The bundled LiveCD provides a full Linux development and debugging environment without requiring any changes to your current operating system. Use it to follow along with the examples in the book as you cover knowledge gaps and experiment with hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network traffic, circumventing security, exploiting cryptographic flaws, and possibly designing new attacks.
This book will teach you how to do the following:
- C, assembly language, and shell scripts are used to program machines.
- Using buffer overflows and format strings, corrupt system memory to run arbitrary code.
- Debug processor registers and system memory to acquire a true grasp of what is going on
- Outwit traditional security mechanisms such as nonexecutable stacks and intrusion detection systems
- Use port-binding or connect-back shellcode to get access to a remote server, and change a server's logging behavior to conceal your existence.
- Hijack TCP connections, redirect network traffic, and conceal open ports
- The FMS attack is used to crack encrypted wireless traffic, and a password probability matrix is used to speed up brute-force attacks.
Hackers are constantly pushing the envelope, exploring the unknown, and perfecting their craft. Even if you have no prior programming experience, Hacking: The Art of Exploitation, 2nd Edition will provide you with a comprehensive understanding of programming, machine architecture, network communications, and existing hacking techniques. When you combine this knowledge with the supplied Linux environment, all you need is your own imagination.
Author: Jon Erickson
Link to buy: https://www.amazon.com/Hacking-Art-Exploitation-Jon-Erickson/dp/1593271441/
Ratings: 4.7 out of 5 stars (from 1181 reviews)
Best Sellers Rank: #27,120 in Books
#5 in Computer Cryptography
#5 in Web Encryption
#10 in Privacy & Online Safety