Hacking
The Art Of Exploitation, 2nd Edition
Hacking The Art of Exploitation, 2nd Edition
occupies the second position in my list of top
5 best hacking books for becoming an ethical hacker.
Hacking The
Art of Exploitation, 2nd Edition – Book Details
Author : Jon Erickson
Publisher : No Starch Press, San Francisco.
Book Length : 490 pages
External CD : Yes
Date of Release : 2008
Price : $ 49.59 (price is subject to change with time)
Hacking The
Art of Exploitation – About The Author
Jhon Erickson is a vulnerability researcher as well as a penetration tester. He comes from a background of computer science and later being interseted in the field of ethical hacking and cyber security, he choose to become what he is now. Currently living in California Jon Erickson has also adressed major events such as Deafcon, etc.
Hacking The
Art of Exploitation, 2nd Edition – Contents
- Preface
- Acknowledgement
- 0x 100 Introduction
- 0x200 Programming
- 0x300 Exploitation
- 0x400 Networking
- 0x500 Shellcode
- 0x600 Countermeasures
- 0x700 Cryptology
- 0x800 Conclusion
- Index
- Updates : About the CD
Hacking The Art of Exploitation, 2nd Edition – Why To Read?
The first chapter of Hacking The Art of Exploitation, 2nd Edition explains
its user about hackers and turns it into proving that hacking is not against
the law or illegal as everyone thinks. After which THE author explained about
who the bad guys are – Crackers. Apart from this the book will ask talk and
give you some informative knowledge.
The second chapter in the book
deals in Programming related stuffs. The programming section makes you familiar
with C programming language. Basically this section talks about the basic
commands, structure, syntax – operators, functions, logic, condition statements
and other components of a programme code in C programming language. A bit
introduction to GNU Compiler Collection is also done because the main motive of
learning C language is to compile your exploits which you shall/will make later
on in your career. This section also teaches about file permissions.
The next chapter deals in exploitation. This
is a relatable topic based on the previous chapter with a very short story with
clear explanation. Moving on which the chapter deals in Generalized exploit
techniques. Buffer Overflow.
Is also taken into consideration in
this part and explained beautifully.
The other chapter are also
important which deals in networking related queries which is a must to read
topic. Shell coding is also an important topic which the book covers and
explain its reader. Moreover it also teaches how to experiment with the bash.
Everything has a limit which is
talked about in the countermeasures in the book with a bit of advice not for
taking things for granted and making use of things in their correct path.
Cryptology – the technique of
protecting and sharing is well talked at the end of the book and the author thereafter
concludes in the book which a bit of useful tip and good wishing.
Hacking The Art of Exploitation, 2nd Edition – My Views
The intent of the book is to teach
you the real intent of hacking. The book discusses various hacking techniques.
The best part of the book apart from the paper content is that we get a live
bootable CD containing all the source code used within the book and is
preconfigured with the Linux Environment. This book will give you a hands on
understanding and appreciation that may inspire you to improve upon your
existing technique and work harder to become an ethical hacker.
No comments:
Post a Comment