From Book News, Inc.
Erickson, a cryptologist and security specialist, introduces the spirit and theory of computer hacking as well as the science, allowing readers to understand the hacker mindset and thwart potential attacks. He explains how to exploit programs using buffer overflows and format strings, write printable ASCII polymorphic shellcode, defeat non- executable stacks by returning to libc, and crack encrypted 8-2.11b wireless traffic using the FMS attack.Copyright © 2004 Book News, Inc., Portland, OR
About.com, November 2003
"This is an excellent book."
Security Forums, January 2004
"the seminal hackers handbook"
Geekshelter.com, January 2004
"This would make a great addition to any computer enthusiast's book shelf."
IEEE Cipher, March 15, 2004
"I highly recommend this book."
IEEE Security & Privacy, March 2004
"Erickson presents the material in a manner that is both easy to follow and a joy to read."
UnixReview.com, June 2004
"every Linux/Unix administrator and applications programmer can learn something from the programming section"
Database-Book-Reviews.com http://www.database-book-reviews.com/book_reviews/by_publisher/No_Starch/
5 stars, "One of a kind
Superb, Thrilling , Excellent Book."
Book Description
Emphasizing a true understanding of the techniques as opposed to just breaking the rules, the author helps readers determine which areas are prone to attack and why. Unlike other so-called hacking guides, this book does not gloss over technical details, and includes detailed sections on stack-based overflows, heap based overflows, format string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.
About the Author
JON ERICKSON has a formal education in computer science and speaks frequently at computer security conferences around the world. He currently works as a cryptologist and security specialist in Northern California.
Hacking: The Art of Exploitation FROM OUR EDITORS
The Barnes & Noble Review
What is the true spirit of hacking? Itᄑs exploration. Discovery. Invention. If you want to be a pioneer, not just a ᄑscript kiddie,ᄑ read Hacking: The Art of Exploitation.
This book is about awakening and feeding your passionate curiosity about how software and networks work. What do overflows look like, and how do they make systems vulnerable? What can be done with shellcode? How do Denial of Service and TCP/IP Hijack attacks work? How does a man-in-the-middle attack circumvent encryption?
Whether youᄑre exploiting systems, protecting them, or just plain fascinated by them, this is the technical foundation you need to start hacking -- for real. Bill Camarda
Bill Camarda is a consultant, writer, and web/multimedia content developer. His 15 books include Special Edition Using Word 2003 and Upgrading & Fixing Networks for Dummies, Second Edition.
FROM THE PUBLISHER
ABOUT THE AUTHOR
Jon Erickson has a formal education in computer science and speaks
frequently at computer security conferences around the world. He currently
works as a cryptologist and security specialist for Luminare Consulting.
ABOUT NO STARCH PRESS
Since 1994, No Starch Press has published unique books on computing, with a
focus on Open Source, security, hacking, web development, programming,
gaming, and alternative operating systems. Our titles have personality, our
authors are passionate, and our goal is to make computing accessible to
everyone.
SYNOPSIS
This technical, code-filled book about the art of
creative problem solving known as hacking dissects various hacker
techniques, both old and new, to see what makes them work. Unlike many
hype-filled hacking books which explain how to download and use someone
else's exploit, Erickson goes in-depth into each exploit to explain what
happens at the code level, and the underlying logic. As the reader learns
about each exploit technique they learn not only about that particular
security flaw but also why most systems are vulnerable and most software is
insecure.
Some of the techniques covered in the book are:
Exploiting programs using buffer overflows and format strings
Writing printable ASCII polymorphic shellcode
Defeating non-executable stacks by returning into libc
Redirecting network traffic, concealing open ports, and hijacking TCP
connections
Cracking encrypted 802.11b wireless traffic using the FMS attack
This is a book for the true hacker, whether that means the black clad
system invader we see in the movies (thanks, Keanu), the underappreciated
sys admin keeping miscreants off his network, or just the neutral computer
technology enthusiast who enjoys the challenge. Hacking: The Art of
Exploitation teaches the reader to think like the hacker writing the
exploits so that he can learn to think for himself. And that is the essence
of hacking.