Hacking: The Art of Exploitation, 2nd Edition 2nd Edition
Use the Amazon App to scan ISBNs and compare prices.
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Frequently bought together
Customers who viewed this item also viewed
About the Author
There was a problem filtering reviews right now. Please try again later.
This book will cover everything you need to know, and while that sounds great it's not for beginners or people looking to start quickly.
I recommend seeking introductory knowledge elsewhere, C, OSI, TCP/IP, operating systems etc. Penetration Testing a Hands on Guide by Georgia Weidmam is a good way to get started with just getting hands on practice.
Once I went back and got a grip on these concepts and had some practice the book was easier to understand and I came to appreciate it much more.
Its not an easy read, and you need to have some solid understanding of the machine as a whole. After I played with buffer overflows in a VM I went back and appreciated chapter 0x200s coverage of registers and what they do.
Buy this book only if you have a solid understanding of the computer as a whole, or will develop it alongside.
The book will not get you started. It will definitely help you develop the understanding of why a buffer overflow script written in Python works, and how. If you want to get up and running quickly look elsewhere. But that doesn't mean it's a bad text, it's well done, insightful, and will help you understand the why of exploiting software.
When I first started reading it, everything made since and it was a smooth read.
I should also note that I'm a Computer Science major at a university, with my strongest programming language being C++.
In the beginning, the author uses the C programming language as a way of "introducing" the concept of programming and some intro-logic, etc.
What didn't sit right with me: He continued with his beginner introduction to C, and then started referencing assembly language and memory registers.
Isn't that somewhat of an overstep when it comes to the speed of learning this kind of material?
I know nothing about assembly, nor the specifics of memory. I only know how memory is manipulated and moved. It still threw me off a little bit.
Other than that, it's a good read and fairly informative.
Top international reviews
I am not rating the book as the content!
This book lays ground and rules to think and develop your skills outside of what you have been taught, it teaches you in a way that will let you evolve further without the book, and in no time you will be developing your own exploits, this book would be only worth for its programming side, it is that good.
It comes with a a linux distro with some tools you can use, I have decided to use my own linux distro, but further in the book, it is advised to use the one provided by the book, because, some exploits have already been patched in later distributions, and all of the exploits and tools work on the one provided by the book.
Also the package was adequate and it came in excellent condition.
Absolutely recommended, although not recommended for someone with very little computer knowledge, or someone that have never written a line of code before, if that is your case this will be very difficult to pick up.
Some programming experience would be helpful, but you don't have to be a programmer (I'm not) to get something out of this.
Once again, I would recommend this book to people who have a curiosity and interest in how things work.
If you just want to be a script kiddy then this is not the book for you,
However if you have a need to understand how the tools work and how to actualy find exploits then i highly recomend it.