
The Art of Exploitation, 2nd Edition
by Jon Erickson
February 2008, 488 pp., w/ CD
ISBN-10 1-59327-144-1
ISBN-13 978-1-59327-144-2
Hacking is a art of beautiful complaint solving, either which equates to anticipating an radical resolution to a formidable complaint or exploiting holes in messy programming. Many people call themselves hackers, though couple of have a clever technical substructure indispensable to unequivocally pull a envelope.
Rather than merely display how to run existent exploits, writer Jon Erickson explains how keen hacking techniques essentially work. To share a art as well as scholarship of hacking in a approach which is permitted to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces a fundamentals of C programming from a hacker’s perspective.
The enclosed LiveCD provides a finish Linux programming as well as debugging environment—all but modifying your stream handling system. Use it to follow along with a book’s examples as we fill gaps in your believe as well as try hacking techniques upon your own. Get your hands unwashed debugging code, superfluous buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, as well as maybe even inventing brand new exploits. This book will learn we how to:
- Program computers regulating C, public language, as well as bombard scripts
- Corrupt complement mental recall to run capricious formula regulating aegis overflows as well as format strings
- Inspect processor registers as well as complement mental recall with a debugger to benefit a genuine bargain of what is happening
- Outsmart usual confidence measures similar to nonexecutable stacks as well as penetration showing systems
- Gain entrance to a remote server regulating port-binding or connect-back shellcode, as well as change a server’s logging function to censor your presence
- Redirect network traffic, disguise open ports, as well as steal TCP connections
- Crack encrypted wireless trade regulating a FMS attack, as well as speed up brute-force attacks regulating a cue luck matrix
Hackers have been regularly pulling a boundaries, questioning a unknown, as well as elaborating their art. Even if we do not already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give we a finish design of programming, appurtenance architecture, network communications, as well as existent hacking techniques. Combine this believe with a enclosed Linux environment, as well as all we need is your own creativity.
No comments:
Post a Comment