Buy new:
$38.95$38.95
Delivery Friday, July 26
Ships from: Amazon.com Sold by: Amazon.com
Save with Used - Very Good
$16.99$16.99
Delivery July 22 - 31
Ships from: Amazon Sold by: usedbooks2ya
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Buffer Overflow Attacks: Detect, Exploit, Prevent 1st Edition
Purchase options and add-ons
Buffer overflows make up one of the largest collections of vulnerabilities in existence; And a large percentage of possible remote exploits are of the overflow variety. Almost all of the most devastating computer attacks to hit the Internet in recent years including SQL Slammer, Blaster, and I Love You attacks. If executed properly, an overflow vulnerability will allow an attacker to run arbitrary code on the victim’s machine with the equivalent rights of whichever process was overflowed. This is often used to provide a remote shell onto the victim machine, which can be used for further exploitation.
A buffer overflow is an unexpected behavior that exists in certain programming languages. This book provides specific, real code examples on exploiting buffer overflow attacks from a hacker's perspective and defending against these attacks for the software developer.
- Over half of the "SANS TOP 10 Software Vulnerabilities" are related to buffer overflows.
- None of the current-best selling software security books focus exclusively on buffer overflows.
- This book provides specific, real code examples on exploiting buffer overflow attacks from a hacker's perspective and defending against these attacks for the software developer.
- ISBN-101932266674
- ISBN-13978-1932266672
- Edition1st
- PublisherSyngress
- Publication dateMarch 7, 2005
- LanguageEnglish
- Dimensions6.06 x 1.38 x 9.02 inches
- Print length304 pages
Customers who bought this item also bought
Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and ExploitationPaperback$16.97 shippingOnly 20 left in stock (more on the way).
Product details
- Publisher : Syngress; 1st edition (March 7, 2005)
- Language : English
- Paperback : 304 pages
- ISBN-10 : 1932266674
- ISBN-13 : 978-1932266672
- Item Weight : 1.37 pounds
- Dimensions : 6.06 x 1.38 x 9.02 inches
- Best Sellers Rank: #3,368,086 in Books (See Top 100 in Books)
- #4,475 in Software Development (Books)
- #8,107 in Computer Security & Encryption (Books)
- #55,288 in Law (Books)
- Customer Reviews:
About the author

Vitaly Osipov was born in Soviet Union when it still was a thing. He spent 20 years living working in information security (which is called "cyber" nowadays) in five countries all over the globe. He is currently enjoying his early (40s) retirement.
He either has an encyclopedic set of interests or simply suffers from an attention span of a goldfish, he has not decided that yet.
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on Amazon-
Top reviews
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
As advertised...
this is a valuable title and worth the wait!
I doubt it. This book is so full of errors and inaccuracies that it becomes painful to read after a while. Especially the annotated examples, where the line numbers for the code listings often bear no relation to the line numbers listed in the accompanying analysis.
And then there's the confusion of ESP and EIP in several places throughout the book. For a collection of 'expert information' it comes off as a rather amateurish production. Makes you wonder... what else have they got wrong?
You'll notice this is very much the same as the review I've posted for "Sockets, Shellcode, Porting & Coding"... that is because it too is horrendous for errors.
This is 2 books from Syngress I've got that are very poor quality. What's going on guys?
It is hard to believe that programmers keep making the same mistakes over and over again. This book shows what those mistakes are and how hackers exploit them. You need a good understanding of assembly language to get much out of this, but if you do have that background, this is a real eye-opener.
Extremely detailed, and some of this is a bit of a reach for me (it's been many a year since I did any C or Assembler), but it is fascinating, though in the same sense that watching a tiger stalk you would be: it's scary.
Certainly recommended for people who are writing code today, and I hope more of them pay attention, though the authors attitude seems to be that these problems will continue to plague us.
I'd like to offer a few reasons for a two star review. First, the book is published in a weird format -- 8.8 x 6 x 1.3 inches. I don't know why the publisher produced such a physically small but thick book. Second, this book suffers from too many authors addressing the same issues. BOA is disorganized and internally repetitive. There's no consistent style; some chapters prefer to show memory as a line of characters, others show hex dumps, while others show screen captures. Third, in many sections the writing style is too difficult to follow. Often code is listed for the reader, followed by page upon page of "Analysis." It's tough to match the explanation with the code. Furthermore, many of these Analysis sections have mistakes or look incomplete. Finally, the material itself isn't very compelling. For example, the "introduction to assembly" in chapter 2 is weak, and the book doesn't mention the differences between Intel and AT&T syntax until p 179!
One other point -- if you have the Syngress book Writing Security Tools and Exploits (WSTAE), you already have most of BOA. Ch 1 and Ch 2 appears to be the same in both books. Ch 3 in BOA is Ch 5 in WSTAE, 4 in BOA is 6 in WSTAE, 5 in BOA is 7 in WSTAE, and so on. Duplication of chapters was a problem for Syngress in the mid-2000s, unfortunately.
Thankfully, Syngress and others are publishing much better offensive security books now. I recommend checking for newer resources.
Top reviews from other countries
It's in depth, and if you need to understand the stack, registers in addition to buffer overflows, you can't go wrong. It's a brilliant book.

