Hacking: The Art of Exploitation

Paperback
from $0.00

Author: Jon Erickson

ISBN-10: 1593271441

ISBN-13: 9781593271442

Category: Security - Computer Networks

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.\ Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to...

Search in google:

This book is for both technical and nontechnical people interested in computer security. Unlike many so-called hacking books, this explains technical aspects of hacking such as stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

HACKING: THE ART OF EXPLOITATION, 2ND EDITION.; ACKNOWLEDGMENTS; PREFACE; Chapter 0x100: INTRODUCTION; Chapter 0x200: PROGRAMMING; 0x210 What Is Programming?; 0x220 Pseudo-code; 0x230 Control Structures; 0x240 More Fundamental Programming Concepts; 0x250 Getting Your Hands Dirty; 0x260 Back to Basics; 0x270 Memory Segmentation; 0x280 Building on Basics; Chapter 0x300: EXPLOITATION; 0x310 Generalized Exploit Techniques; 0x320 Buffer Overflows; 0x330 Experimenting with BASH; 0x340 Overflows in Other Segments; 0x350 Format Strings; Chapter 0x400: NETWORKING; 0x410 OSI Model; 0x420 Sockets; 0x430 Peeling Back the Lower Layers; 0x440 Network Sniffing; 0x450 Denial of Service; 0x460 TCP/IP Hijacking; 0x470 Port Scanning; 0x480 Reach Out and Hack Someone; Chapter 0x500: SHELLCODE; 0x510 Assembly vs. C; 0x520 The Path to Shellcode; 0x530 Shell-Spawning Shellcode; 0x540 Port-Binding Shellcode; 0x550 Connect-Back Shellcode; Chapter 0x600: COUNTERMEASURES; 0x610 Countermeasures That Detect; 0x620 System Daemons; 0x630 Tools of the Trade; 0x640 Log Files; 0x650 Overlooking the Obvious; 0x660 Advanced Camouflage; 0x670 The Whole Infrastructure; 0x680 Payload Smuggling; 0x690 Buffer Restrictions; 0x6a0 Hardening Countermeasures; 0x6b0 Nonexecutable Stack; 0x6c0 Randomized Stack Space; Chapter 0x700: CRYPTOLOGY; 0x710 Information Theory; 0x720 Algorithmic Run Time; 0x730 Symmetric Encryption; 0x740 Asymmetric Encryption; 0x750 Hybrid Ciphers; 0x760 Password Cracking; 0x770 Wireless 802.11b Encryption; 0x780 WEP Attacks; Chapter 0x800: CONCLUSION; 0x810 References; 0x820 Sources; COLOPHON;Jon Erickson has a formal education in computer science and has been hacking and programming since he was five years old. He speaks at computer security conferences and trains security teams around the world. Currently, he works as a vulnerability researcher and security specialist in Northern California.

\ From Barnes & NobleThe Barnes & Noble Review\ What is the true spirit of hacking? It’s exploration. Discovery. Invention. If you want to be a pioneer, not just a “script kiddie,” read Hacking: The Art of Exploitation. \ This book is about awakening and feeding your passionate curiosity about how software and networks work. What do overflows look like, and how do they make systems vulnerable? What can be done with shellcode? How do Denial of Service and TCP/IP Hijack attacks work? How does a man-in-the-middle attack circumvent encryption?\ Whether you’re exploiting systems, protecting them, or just plain fascinated by them, this is the technical foundation you need to start hacking -- for real. Bill Camarda\ Bill Camarda is a consultant, writer, and web/multimedia content developer. His 15 books include Special Edition Using Word 2003 and Upgrading & Fixing Networks for Dummies, Second Edition.\ \ \