Hacking the art of exploitation 2nd edition by Jon Erickson – Ebook PDF Instant Download/Delivery: 1593271441, 978-1593271442
Full download Hacking the art of exploitation 2nd edition after payment
Product details:
ISBN 10: 1593271441
ISBN 13: 978-1593271442
Author: Jon Erickson
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.
Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker’s perspective.
The included LiveCD provides a complete Linux programming and debugging environment—all without modifying your current operating system. Use it to follow along with the book’s examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:
– Program computers using C, assembly language, and shell scripts
– Corrupt system memory to run arbitrary code using buffer overflows and format strings
– Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening
– Outsmart common security measures like nonexecutable stacks and intrusion detection systems
– Gain access to a remote server using port-binding or connect-back shellcode, and alter a server’s logging behavior to hide your presence
– Redirect network traffic, conceal open ports, and hijack TCP connections
– Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix
Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don’t already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.
Hacking the art of exploitation 2nd Table of contents:
-
Introduction
- The History of Hacking
- Overview of the Book and Ethical Hacking
- Prerequisites: Tools and Resources
-
Chapter 1: Programming
- Introduction to C Programming
- Memory Layout and Buffer Overflows
- Shellcode and Exploits
- Compilers and Debuggers
- Stack-based Vulnerabilities
-
Chapter 2: Exploitation
- Basic Exploit Techniques
- Stack Smashing and Return-Oriented Programming
- Shellcode Injection
- Format String Vulnerabilities
- Bypassing Security Measures
-
Chapter 3: Networking
- Introduction to Networking Basics
- Packet Sniffing and Injection
- TCP/IP, UDP, and Protocol Analysis
- Exploiting Network Vulnerabilities
- Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
-
Chapter 4: Shellcode
- What is Shellcode?
- Writing Shellcode in Assembly
- Buffer Overflows and Shellcode Execution
- Advanced Shellcode Techniques
- Creating and Testing Shellcode
-
Chapter 5: Reverse Engineering
- Introduction to Reverse Engineering
- Using Debuggers and Disassemblers
- Analyzing Assembly Code
- Identifying Vulnerabilities
- Patching and Modifying Binaries
-
Chapter 6: Web Application Security
- Common Web Vulnerabilities (SQL Injection, XSS, etc.)
- Web Server Configuration and Security
- Attacking Web Applications
- Defensive Techniques for Web Security
-
Chapter 7: Cryptography
- Basic Concepts of Cryptography
- Symmetric and Asymmetric Encryption
- Cryptanalysis Techniques
- Exploiting Weak Cryptographic Systems
-
Chapter 8: Practical Exploitation
- Step-by-Step Exploitation of Real-World Vulnerabilities
- Developing Exploits for Known Security Flaws
- Post-Exploitation Techniques
-
Chapter 9: Defenses
- Stack Canaries, DEP, ASLR, and Other Security Features
- How Hackers Bypass Modern Security Measures
- Hardening Systems Against Attacks
-
Chapter 10: Real-World Scenarios
- Case Studies of Major Security Incidents
- Analysis of How Exploits Were Executed
- Lessons Learned from Hacking Incidents
-
Conclusion
- Future Trends in Hacking and Cybersecurity
- How to Continue Learning and Stay Up-to-Date
- Ethical Responsibility in Hacking and Exploitation
-
Appendices
- Tools for Hackers and Security Professionals
- Further Reading and Resources
-
Index
People also search for Hacking the art of exploitation 2nd :
hacking the art of exploitation review
hacking the art of exploitation reddit
hacking the art of exploitation barnes and noble
hacking the art of exploitation github
hacking the art of exploitation audiobook
Tags:
Jon Erickson,the art,exploitation