Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.
Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.
The included LiveCD provides a complete Linux programming and debugging environment—all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:
– Program computers using C, assembly language, and shell scripts
– Corrupt system memory to run arbitrary code using buffer overflows and format strings
– Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening
– Outsmart common security measures like nonexecutable stacks and intrusion detection systems
– Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence
– Redirect network traffic, conceal open ports, and hijack TCP connections
– Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix
Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Jon Erickson has a formal education in computer science and speaks frequently at computer security conferences around the world. He works as a cryptologist and security specialist in Northern California.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Anbieter: Alchemy Books, San Diego, CA, USA
paperback. Zustand: Used: Good. 2nd ed. Second Edition. CD Included. Appears clean and unmarked. Some minor cosmetic shelf wear. From a private collection. Good condition. Comes from non smoking home. Bestandsnummer des Verkäufers 251130021
Anbieter: The Black Rose, Kitty Hawk, NC, USA
Book rarely opened. New unopened CD in the back. See photos for relevant condition description. Bestandsnummer des Verkäufers ABE-1759844011218
Anbieter: World of Books (was SecondSale), Montgomery, IL, USA
Zustand: Good. Item in good condition and has highlighting/writing on text. Used texts may not contain supplemental items such as CDs, info-trac etc. Bestandsnummer des Verkäufers 00095873943
Anbieter: HPB-Diamond, Dallas, TX, USA
Paperback. Zustand: Good. Connecting readers with great books since 1972! Used books may not include companion materials, and may have some shelf wear or limited writing. We ship orders daily and Customer Service is our top priority! Bestandsnummer des Verkäufers S_452682911
Anbieter: Better World Books, Mishawaka, IN, USA
Zustand: Good. Used book that is in clean, average condition without any missing pages. Bestandsnummer des Verkäufers 5528144-6
Anbieter: WorldofBooks, Goring-By-Sea, WS, Vereinigtes Königreich
Paperback. Zustand: Good. The book has been read but remains in clean condition. All pages are intact and the cover is intact. Some minor wear to the spine. Bestandsnummer des Verkäufers GOR002579846
Anzahl: 1 verfügbar
Anbieter: 3rd St. Books, Lees Summit, MO, USA
Soft cover. Zustand: Very Good. 2nd Edition. Very good, clean, tight condition. Text free of marks. Professional book dealer since 1999. All orders are processed promptly and carefully packaged. Bestandsnummer des Verkäufers 086028
Anbieter: Meadowland Media, Fayetteville, AR, USA
paperback. Zustand: WE SHIP DAILY WITH TRACKING. 2nd. Bestandsnummer des Verkäufers I220-AL-082925-102
Anbieter: GreatBookPrices, Columbia, MD, USA
Zustand: New. Bestandsnummer des Verkäufers 4936766-n
Anbieter: Grand Eagle Retail, Bensenville, IL, USA
Paperback. Zustand: new. Paperback. Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking- The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to-- Program computers using C, assembly language, and shell scripts- Corrupt system memory to run arbitrary code using buffer overflows and format strings- Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening- Outsmart common security measures like nonexecutable stacks and intrusion detection systems- Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence- Redirect network traffic, conceal open ports, and hijack TCP connections- Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrixHackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking- The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity. Deals with computers/software. Shipping may be from multiple locations in the US or from the UK, depending on stock availability. Bestandsnummer des Verkäufers 9781593271442