- Paperback: 488 pages
- Publisher: No Starch Press; 2nd edition (February 4, 2008)
- Language: English
- ISBN-10: 1593271441
- ISBN-13: 978-1593271442
- Product Dimensions: 7 x 1.2 x 9.2 inches
- Shipping Weight: 1.9 pounds (View shipping rates and policies)
- Average Customer Review: 233 customer reviews
- Amazon Best Sellers Rank: #20,913 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Hacking: The Art of Exploitation, 2nd Edition 2nd Edition
Use the Amazon App to scan ISBNs and compare prices.
"Children of Blood and Bone"
Tomi Adeyemi conjures a stunning world of dark magic and danger in her West African-inspired fantasy debut. Learn more
Frequently bought together
Customers who bought this item also bought
Customers who viewed this item also viewed
"A security professional's paradise, burrowing down to the code level of dozesn of different loopholes and explaining the underlying logic behind the attacks."
About the Author
Jon Erickson has a formal education in computer science and speaks frequently at computer security conferences around the world. He works as a cryptologist and security specialist in Northern California.
Author interviews, book reviews, editors picks, and more. Read it now
Top customer reviews
There was a problem filtering reviews right now. Please try again later.
This book will cover everything you need to know, and while that sounds great it's not for beginners or people looking to start quickly.
I recommend seeking introductory knowledge elsewhere, C, OSI, TCP/IP, operating systems etc. Penetration Testing a Hands on Guide by Georgia Weidmam is a good way to get started with just getting hands on practice.
Once I went back and got a grip on these concepts and had some practice the book was easier to understand and I came to appreciate it much more.
Its not an easy read, and you need to have some solid understanding of the machine as a whole. After I played with buffer overflows in a VM I went back and appreciated chapter 0x200s coverage of registers and what they do.
Buy this book only if you have a solid understanding of the computer as a whole, or will develop it alongside.
The book will not get you started. It will definitely help you develop the understanding of why a buffer overflow script written in Python works, and how. If you want to get up and running quickly look elsewhere. But that doesn't mean it's a bad text, it's well done, insightful, and will help you understand the why of exploiting software.
The book moves pretty quick, but is written concisely and to the point. It is a little dated, and probably always will be due to the nature of how fast these technologies develop. That being said, it is still a fantastic book, and I will most likely order subsequent editions as they come out.
When I first started reading it, everything made since and it was a smooth read.
I should also note that I'm a Computer Science major at a university, with my strongest programming language being C++.
In the beginning, the author uses the C programming language as a way of "introducing" the concept of programming and some intro-logic, etc.
What didn't sit right with me: He continued with his beginner introduction to C, and then started referencing assembly language and memory registers.
Isn't that somewhat of an overstep when it comes to the speed of learning this kind of material?
I know nothing about assembly, nor the specifics of memory. I only know how memory is manipulated and moved. It still threw me off a little bit.
Other than that, it's a good read and fairly informative.