Hacking: The Art of Exploitation, 2nd Edition Paperback – 1 Feb. 2008
Thumbnail 1

Hacking: The Art of Exploitation, 2nd Edition Paperback – 1 Feb. 2008

4.6/5
Product ID: 48012806
Secure Transaction
12 interest-free installments with tabby

Product is unavailable

Oops! The product you're looking for is currently unavailable. Explore similar products for a perfect fit!

Description

Full description not available

Large manufacture image 1
Small manufacture image 1Small manufacture image 2Small manufacture image 3Small manufacture image 4Small manufacture image 5

Reviews

4.6

All from verified purchases

G**A

Landmark on the genre

This book is like no other book in its field/segment/genre whatever you want to call it, this book won't "dummy" guide you through already made up stuff, that will turn you into a BOT.This book lays ground and rules to think and develop your skills outside of what you have been taught, it teaches you in a way that will let you evolve further without the book, and in no time you will be developing your own exploits, this book would be only worth for its programming side, it is that good.It comes with a a linux distro with some tools you can use, I have decided to use my own linux distro, but further in the book, it is advised to use the one provided by the book, because, some exploits have already been patched in later distributions, and all of the exploits and tools work on the one provided by the book.Also the package was adequate and it came in excellent condition.Absolutely recommended, although not recommended for someone with very little computer knowledge, or someone that have never written a line of code before, if that is your case this will be very difficult to pick up.

E**P

Simply put..... THIS BOOK SHOULD ...

Simply put.....THIS BOOK SHOULD BE BANNED. !Forget all that stuff you read about what is required to become a hacker...This is the REAL DEAL !!!its not talking too much about hacker mindset.It cuts to the chase...explains how hacking is really about understanding how to circumvent how computers and programs workthen it shows you how to start analysing programs....then onto getting and manipulating the machine code to change things up.need i say more...this book just goes deeper and deeper...its a proper hackers crackers book....its not for script kiddies.....this book is about creating zero days, and how them guys actually do it.script kiddies use some tools and then the exploits of guys who read this book.

J**N

Excellent introduction

The techniques themseves and the systems at which they are targeted are (largely) long gone, but it is a great introduction to the basic techniques. For those worried about the fact that the CD is out of date, I found it was straightforward to get hold online and upload the required software (VirtualBox and the book code) at no cost.

A**R

Dealing with assembly in the first chapter felt like being thrown in the deep end

I only have a basic understanding of computing/programming so I found this book a little hard to read. Dealing with assembly in the first chapter felt like being thrown in the deep end. What's covered in the book is excellent though. Instead of getting you to remeber a few "Magic Tricks" you get a working understanding of what you are doing and how computers work. This book put me way ahead of my class mates at Uni. The only thing I will say is the information is very dense. Jon teaches complex ideas in a very condescend way. My head feels like it will explode if I try to read too much of it in one sitting.

S**E

Me smart now

Honestly just get it and find out

D**N

Very interesting

Dont be expecting to hack your mates facebook account, facebook has very advanced security, this book will show you the kind of exploits like the recnt heartbleed vulnerability, it realy gets down to the bits and bytes and focuses on C and Assembly language. Extremely interesting and the information will certainly aid you as a penetration tester, youll learn all sorts or techniques to take advantage of overlooked 'mistakes' in the code written by apparently 'good' programmers, this teaches you to be better than them, it teaches you that a program that is executed that was written in C does no contain IF statements and FOR statements and all that, it contains 1101011101101, or translation to assembly, things likemov ecx, ebxadd eax, ecxsub edx, eax... you get the gist, it doesnt execute as C, but as binary code, the key difference between a programmer and a HACKER!!!

Y**!

Fantastic,

Easy steps to follow to "get the gist" of the point, first time, every time. No time wasting chapters.You won't need to be an expert programmer to get maximum benefit from it - even as a novice it has a great impact, due to its clean and clear instruction.

K**N

I think I received second hand book..

Book is good ,however , I think I have not received original one since It came with marks on it.

Common Questions

Trustpilot

TrustScore 4.5 | 7,300+ reviews

Sneha T.

Received my product in pristine condition. Great service overall.

1 month ago

Suresh K.

Very impressed with the quality and fast delivery. Will shop here again.

4 days ago

Shop Global, Save with Desertcart
Value for Money
Competitive prices on a vast range of products
Shop Globally
Serving over 300 million shoppers across more than 200 countries
Enhanced Protection
Trusted payment options loved by worldwide shoppers
Customer Assurance
Trusted payment options loved by worldwide shoppers.
Desertcart App
Shop on the go, anytime, anywhere.

Trustpilot

TrustScore 4.5 | 7,300+ reviews

Meera L.

Smooth transaction and product arrived in perfect condition.

3 weeks ago

Ali H.

Fast shipping and excellent packaging. The Leatherman tool feels very premium and sturdy.

1 day ago

Hacking The Art Of Exploitation 2nd Edition Paperback 1 Feb | Desertcart UAE