Programming Books C Java PHP Python Learn more Browse Programming Books
Buy Used
$10.50
FREE Shipping on orders over $35.
Used: Very Good | Details
Sold by Book Robot
Condition: Used: Very Good
Comment: Book only, no CD. Binding is tight, pages are clean and crisp, no marks. Book looks unread.
Add to Cart
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more

Hacking: The Art of Exploitation w/CD Paperback

ISBN-13: 978-1593270070 ISBN-10: 1593270070 Edition: 1st

See all 4 formats and editions Hide other formats and editions
Amazon Price New from Used from Collectible from
Paperback
"Please retry"
$19.98 $3.73 $19.00

There is a newer edition of this item:


Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student



NO_CONTENT_IN_FEATURE

Sell Your Books
Get up to 75% back when you sell your books on Amazon. Ship your books for free and get Amazon.com Gift Cards. Learn more.

Product Details

  • Paperback: 264 pages
  • Publisher: No Starch Press; 1 edition (October 2003)
  • Language: English
  • ISBN-10: 1593270070
  • ISBN-13: 978-1593270070
  • Product Dimensions: 9.3 x 7.4 x 0.8 inches
  • Shipping Weight: 1.2 pounds
  • Average Customer Review: 4.3 out of 5 stars  See all reviews (40 customer reviews)
  • Amazon Best Sellers Rank: #536,367 in Books (See Top 100 in Books)

Editorial Reviews

Review

"Erickson presents the material in a manner that is both easy to follow and a joy to read." -- IEEE Security & Privacy, March 2004

"I highly recommend this book." -- IEEE Cipher, March 15, 2004

"This is an excellent book." -- About.com, November 2003

"This would make a great addition to any computer enthusiast's book shelf." -- Geekshelter.com, January 2004

"every Linux/Unix administrator and applications programmer can learn something from the programming section" -- UnixReview.com, June 2004

"the seminal hackers handbook" -- Security Forums, January 2004

5 stars, "One of a kind… Superb, Thrilling , Excellent Book." -- Database-Book-Reviews.com http://www.database-book-reviews.com/book_reviews/by_publisher/No_Starch/

About the Author

Jon Erickson has a formal education in computer science and has been hacking and programming since he was five years old. He speaks at computer security conferences and trains security teams around the world. Currently, he works as a vulnerability researcher and security specialist in Northern California.


More About the Author

Jon Erickson has a formal education in computer science and speaks frequently at computer security conferences around the world. He currently works as a cryptologist and security specialist in Northern California.

Customer Reviews

4.3 out of 5 stars
5 star
21
4 star
11
3 star
8
2 star
0
1 star
0
See all 40 customer reviews
A very good book indeed!
J. Anderson
Besides, I learned new techniques on exploiting an elf binary from this book.
Radu State
I recommend this book to anyone interested in computer security.
Zarif Alimov

Most Helpful Customer Reviews

113 of 122 people found the following review helpful By W Boudville HALL OF FAMETOP 1000 REVIEWERVINE VOICE on March 5, 2004
Format: Paperback
You have probably heard of such hacking techniques as buffer overflows. Typically, a book might give only cursory explanation, especially if it is not devoted to hacking. But suppose you write in C. Chances are you've inadvertantly created buffer overflows and then spent hours chasing this down, after your program crashed. So how on earth can a deliberate overflow lead to a breakin?
It is for such matters that Erickson expounds here. Written for you, whether you want to create such exploits or prevent them. In either case, the knowledge is the same.
What the book requires is some knowledge of C and assembly. For the latter, it is the language of the Intel x86 family. But even if you don't know it, so long as you are familiar with any assembly language and the theory of a Neumann machine, then you can follow the text.
This book is not for every programmer. It turns out that a fair number of programmers get into the field by learning a high level language like C, Fortran, Java or Pascal. But they never learn any assembly. To them, anything compiled from source is a black box. Instead, you need some background in assembly.
The book also gives neat coverage of how to sniff network traffic and manipulate it. There is a section on cryptography. But for this, it is so specialised and vital that you should consult texts dedicated to it.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
56 of 59 people found the following review helpful By A. Chopra on February 10, 2006
Format: Paperback
After reading more than 12 different books on this subject, finally I came across this, the best book ever on security. This is the kind of book that gives you what it promises on the cover. I was quiet impressed with the contents and style of writing.

I must add that I have learned a lot from this book, enough to help me in protecting my network and any unauthorized attempt to access my information. This is not for entertainment, like the others which I found in this genre (read Ankit Fadia and you will know what I mean here), this is some serious work by done by an author who knows what he his telling to the readers, and what they will understand. However, somewhere in between it get too technical, and one actually has to sit in front a computer to try and see what the author is trying to tell, but I liked it for being so real and accurate about computer security.

The author has done his homework well before writing it. I found almost all the information correct and original. Wonder why some people have given negative reviews for this book? Because, one has to be a technical qualified in computer security to fully understand what author is telling you. It's like me writing a review for a cooking recipe book. Also, I will like to add that buy it for securing your network, but don't expect it to teach you some serious hacking. For that you have to put lots of real efforts than just buying a book and reading it, though this book can always be a firm stepping stone!
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
38 of 40 people found the following review helpful By A Customer on April 16, 2004
Format: Paperback
This book is 10 times greater than any other hacking book. It gives useful code and examples rather than 250 pages of theory. Stack and heap overflows are explained in detail as well as many other modern types of exploits. The best part of the book is that it teaches the reader how to write his/her own shellcode and teaches some basic Assembly language along the way. Everything you need to know to be a hacker or stop hackers.
Includes detailed explanations and code for:
buffer / stack / heap based overflows
format string vulnerabilities
writing shellcode
sniffing switched and unswitched networks
tcp / ip hijacking
denial of service
port scanning and tricking port scans of your own computer
password cracking
Man in the middle attacks
Wireless internet security / hacking
and more
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
20 of 21 people found the following review helpful By David Maynor on October 17, 2004
Format: Paperback
I found this to be a decent book but nothing over the top. The best chapter is the second, which deals with buffer overflows. The rest of the chapters are quiet basic intros to networking and crypto. If you are completely new to the security scene, this is a great book to start with.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
15 of 15 people found the following review helpful By Phil H on December 28, 2003
Format: Paperback
This book is a step in the right direction, but it could be better. It seems to have a lot to say about certain topics, a little to say about others, and nothing to say about still other topics. The coverage of buffer overflows, format string exploits, and writing shellcode is excellent. But then when we get to the networking section, there are a couple of paragraphs devoted to some topics. There is no discussion of web vulnerabilities in the book. Nothing on SQL injection. Nothing on cross-site scripting. Furthermore, the Windows world is totally ignored; Linux is used exclusively in the book. Nevertheless, the book is worth it if only for its unsurpassed overflow/format string/shellcode explanations.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
25 of 28 people found the following review helpful By A Customer on February 21, 2004
Format: Paperback
Don't expect the conceptual fluff. Be prepared for school. This book does not use the time and motivation wasting filler that so many "hacking" books fill pages with. This describes in significant depth the root techniques used in exploitation. It can make some technical assumptions about the reader, and it is helpful to have programming experience, but I prefer this approach. I would rather have the author "teach to the highest common denominator" and not the lowest... What you don't know when you read this book, you will be motivated to learn.
The writing style can be a little empty, and could use a bit more of a layered approach, but this is a minor criticism.
I work in IT security, and this is the first hacking book I have ever recommended. Go for it.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Product Images from Customers

Most Recent Customer Reviews

Search
ARRAY(0xa5a6984c)