๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Cover of Hacking: the art of exploitation, 2nd edition

Hacking: the art of exploitation, 2nd edition

โœ Scribed by Jon Erickson


Publisher
No Starch Press
Year
2008
Tongue
en-GB
Weight
335 KB
Category
Fiction
ISBN
159327338X

No coin nor oath required. For personal study only.

โœฆ Synopsis


Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope. Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective. The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to: - Program computers using C, assembly language, and shell scripts - Corrupt system memory to run arbitrary code using buffer overflows and format strings - Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening - Outsmart common security measures like nonexecutable stacks and intrusion detection systems - Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence - Redirect network traffic, conceal open ports, and hijack TCP connections - Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.

โœฆ Subjects


COMPUTERS -- Security -- Networking


๐Ÿ“œ SIMILAR VOLUMES


cover
โœ O'Hagan, Timothy(Author) ๐Ÿ“‚ Fiction ๐Ÿ“… 2003 ๐Ÿ› Taylor and Francis ๐ŸŒ English โš– 355 KB ๐Ÿ‘ 1 views

Timothy O'Hagan investigates Jean-Jacques Rousseau's writings concerning the formation of humanity, of the individual and of the citizen in his three master works: the Discourse on the Origin of Inequality among Men, Emile and the Social Contract. He explores Rousseau's reflections on the sexes, lan

cover
โœ Brown, Kevin ๐Ÿ“‚ Fiction ๐Ÿ“… 2018 ๐ŸŒ English โš– 183 KB ๐Ÿ‘ 1 views
cover
โœ David G. Hartwell ๐Ÿ“‚ Fiction ๐Ÿ“… 2017 ๐Ÿ› Tor Books ๐ŸŒ en-US โš– 193 KB ๐Ÿ‘ 1 views

A leading science-fiction editor examines the work of the great science-fiction writers, defines the genres many subdivisions, surveys the history of science fiction, and comments on the genres values as literature, entertainment, and escape. Age of Wonders: Exploring the World of Science Fiction gi

cover
โœ Mary Hughes ๐Ÿ“‚ Fiction ๐Ÿ“… 2015 ๐Ÿ› Samhain Publishing ๐ŸŒ English โš– 194 KB ๐Ÿ‘ 1 views

***To survive, theyll have to find the missing pieces - starting with their own.*** Sophia Blue wishes the cute little doggie shes found in her aunts abandoned magic shop could talk. Maybe hed tell her if the old woman has wandered off on a walkabout, or if theres foul magic afoot. ***Odd how the s

cover
โœ Holger Matthes ๐Ÿ“‚ Fiction ๐Ÿ“… 2019 ๐Ÿ› dpunkt ๐ŸŒ en-US โš– 3 MB ๐Ÿ‘ 1 views

Die LEGO-Eisenbahn lรคsst seit 50 Jahren nicht nur Kinderherzen hรถher schlagen โ€“ auch Erwachsene entdecken ihre alte LEGO-Eisenbahn im Keller oder auf dem Dachboden wieder. Die zweite Auflage des Buchs zur faszinierenden Welt der LEGO Eisenbahn enthรคlt zahlreiche รœberarbeitungen. Holger Matthes stell