In this all-new, expanded, second edition of Hacking: The Art of Exploitation, author Jon Erickson again peels back the skin of arcane exploits to explain what happens in the code—and the underlying logic of attacks.
As readers explore each technique, they not only learn about a particular security flaw, but also why most software is insecure. At nearly twice the size of the first edition, and including a new introduction to the complex, low-level workings of computers, this 2nd edition of Hacking offers readers more than ever, as they learn how to:
- Corrupt system memory to run arbitrary code using buffer overflows and format strings
- Inspect processor registers and system memory with a debugger
- Outsmart common security measures like nonexecutable stacks and intrusion detection systems
- Gain access to a remote server using port-binding or connect-back shellcode and alter a server’s logging behavior to hide your presence
- Redirect network traffic, conceal open ports, and hijack TCP connections
- Crack encryption protocols used for securing wireless traffic, storing passwords, and verifying identities.
The book also includes a LiveCD with a complete Linux environment preconfigured for programming, debugging, manipulating network traffic, and cracking encryption—all without modifying the current operating system.
Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope. Countless books on hacking only skim the surface, presenting existing exploits without explanation or a focus on understanding. But running someone else’s code can only get you so far. By revealing the science and reason behind the code, Hacking: The Art of Exploitation brings readers right into the creative world of hacking.