Hacking: The Art of Exploitation
||Author: Jon Erickson|
List Price: $39.95
Our Price: Click to see the latest and low price
Publisher: No Starch Press (October, 2003)
Sales Rank: 997
Average Customer Rating: 4.57 out of 5
Customer ReviewsRating: 5 out of 5
The First Hacking Book I've Respected
Don't expect the conceptual fluff. Be prepared for school. This book does not use the time and motivation wasting filler that so many "hacking" books fill pages with. This describes in significant depth the root techniques used in exploitation. It can make some technical assumptions about the reader, and it is helpful to have programming experience, but I prefer this approach. I would rather have the author "teach to the highest common denominator" and not the lowest... What you don't know when you read this book, you will be motivated to learn.
The writing style can be a little empty, and could use a bit more of a layered approach, but this is a minor criticism.
I work in IT security, and this is the first hacking book I have ever recommended. Go for it.
Rating: 5 out of 5
One of a Kind
This book is for the security pro or would be hacker who want's to begin to see how deep the rabbit hole really does go. There is no other book like it on the market, and I've read most of them. Jon Erickson's code included in the book all works well as designed on Linux. The author also suggests some good free Linux tools for use with the code examples including most notably a hex editor, basic dissassembler, and packet injector.
The techniques in the book are best described by a caption on its back cover, "The fundamental techniques of serious hacking." It includes major sections on programming, networking, and cryptography. All material is covered with an eye towards exploitation. Languages used in the book material consist of C, PERL, and Assembly for X86.
The techniques described in this book are fundamental to any hacker or security professional who takes their work seriously. The book is well worth the discounted amazon.com price. The material in this book is all original and cannot be found elsewhere. Each example in the programming section is truly an eye opener if you are new to code hacking. The examples in the networking and cryptography sections are relevant and fresh as well.
Rating: 4 out of 5
The next step
This book covers foundational exploit techniques very well the emphasis on how to do things efficent and then in more than one way is great. The programming section is unlike anything else you'll find on the shelf and is a great next step for someone who knows the concepts and techniques of exploitation just isn't making their own home grown stuff yet. The networking section leaves a lot to be desired if this book is to be considered to contain "The fundamental techniques of serious hacking". Still this book on the shelf is one on a level above Counter Hack/Hacking Exposed/Hack Attacks Revealed. Less concept, more application. Buy this book, read it, and read it again.
· Exploiting Software : How to Break Code
· Crackproof Your Software: Protect Your Software Against Crackers (With CD-ROM)
· The Art of Assembly Language
· Hacker Disassembling Uncovered
· Stealing the Network: How to Own the Box