To get the free app, enter your email address or mobile phone number.
Writing Security Tools and Exploits 1st Edition
Use the Amazon App to scan ISBNs and compare prices.
Frequently Bought Together
Customers Who Bought This Item Also Bought
More About the Author
Vincent is a recognized expert with regular columns in Dark Reading and SecurityWeek. He has presented at Black Hat, ToorCon, InfoSec World, SANS, and Microsoft BlueHat. In addition to regularly being cited by the press, Vincent has been interviewed and quoted in Al Jazeera, USA Today, NPR, and CSO Magazine. He has also co-authored several industry best-selling books, including: Hacking Exposed Wireless 1st and 2nd Edition; Hacking Exposed Web Applications 3rd Edition, and most recently Web Application Security: A Beginner's Guide.
Prior to founding Bishop Fox, Vincent led the Attack & Penetration team for the Global Security unit at Honeywell International. Before that, he was a consultant with the Ernst & Young Advanced Security Centers and an analyst at the National Security Agency.
Vincent holds a Bachelor of Science and Engineering from the University of Pennsylvania with a major in Computer Science and Engineering and a minor in Psychology.
Top Customer Reviews
The Editorial review claims:
"The book is accompanied with a companion Web site containing both commented and uncommented versions of the source code examples presented throughout the book. In addition to the book source code, the CD also contains a copy of the author-developed Hacker Code Library v1.0."
Well, sorrily, that's NOT true.
Perhaps this confusion is due to changes resulting from the merge of Syngress with ORA, but still not fair with buyers.
Otherwise, if you, like me, are a researcher (or just interested) in the "secure code" area, then buy the book in spite of all.
By far it is the very best book written about these issues. Best in the sense of most useful. Well designed organized, with in deep study of vulnerabilities and associated exploit codes. Shellcode is explained in a rich and fresh way and the Why, How and When of shellcode are explained under an integrated framework.
NASL and MSF are explained and used in detailed and useful examples, and IMHO, this book presents the most easy, clear and condensed explanation about the Race Conditions, Format Strings, and Buffer Overflows problems I ever read yet.
Warning: Not an entry level book. You need to be familiar with several software and hardware architecture concepts to obtain full benefits from it.
If you work in IT and want to learn about how to keep the hackers out, this text is a worthwhile read for you