Hacking: The Art of Exploitation 2nd Edition by Jon Erickson – Ebook PDF Instant Download/Delivery. 1593271441 978-1593271442
Full download Hacking: The Art of Exploitation 2nd edition after payment

Product details:
ISBN 10: 1593271441
ISBN 13: 978-1593271442
Author: Jon Erickson
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.
Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker’s perspective.
The included LiveCD provides a complete Linux programming and debugging environment—all without modifying your current operating system. Use it to follow along with the book’s examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:
– Program computers using C, assembly language, and shell scripts
– Corrupt system memory to run arbitrary code using buffer overflows and format strings
– Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening
– Outsmart common security measures like nonexecutable stacks and intrusion detection systems
– Gain access to a remote server using port-binding or connect-back shellcode, and alter a server’s logging behavior to hide your presence
– Redirect network traffic, conceal open ports, and hijack TCP connections
– Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix
Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don’t already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.
Hacking: The Art of Exploitation 2nd Table of contents:
Preface
- Acknowledgments
- About the Author
Part I: Introduction to Hacking
Chapter 1: Introduction to Hacking
1.1. What is Hacking?
1.2. The Basics of Exploiting Systems
1.3. The Hacker’s Toolbox
1.4. Understanding System Security
Chapter 2: Programming for Hackers
2.1. Understanding C and Assembly Language
2.2. Compilers, Linkers, and Debuggers
2.3. The Basics of Buffer Overflows
2.4. Writing and Compiling Code for Exploits
Part II: Exploiting and Analyzing Vulnerabilities
Chapter 3: Exploiting Memory
3.1. Memory Layout and the Stack
3.2. Stack-based Buffer Overflows
3.3. Heap-based Exploits
3.4. Introduction to Format String Vulnerabilities
3.5. Overwriting Function Pointers
Chapter 4: Attacking the Network
4.1. Network Basics and TCP/IP
4.2. Network Sniffing
4.3. Analyzing Network Traffic
4.4. Man-in-the-Middle Attacks
4.5. Exploiting Network Services
Part III: Advanced Topics
Chapter 5: Shellcode and Exploits
5.1. What is Shellcode?
5.2. Writing Shellcode
5.3. Buffer Overflow Exploits with Shellcode
5.4. Using NOP Sleds and Return-to-libc Attacks
Chapter 6: Understanding Linux Exploits
6.1. Linux Memory Management
6.2. Stack Smashing and Return-Oriented Programming (ROP)
6.3. Using gdb for Debugging Linux Applications
6.4. Writing Exploits for Linux
Chapter 7: Reverse Engineering
7.1. The Basics of Reverse Engineering
7.2. Disassembling Code
7.3. Analyzing Executables with gdb
7.4. Cracking Software Protection
7.5. Using IDA Pro for Disassembly
Part IV: Web and System Security
Chapter 8: Web Application Security
8.1. Common Web Application Vulnerabilities (SQL Injection, XSS, CSRF)
8.2. Web Application Architecture and Security
8.3. Exploiting Web Vulnerabilities
8.4. Web Security Tools and Techniques
Chapter 9: Linux and System Security
9.1. The Basics of Unix/Linux Security
9.2. File Permissions and SUID Programs
9.3. Exploiting Setuid and Sudo Programs
9.4. Protecting Systems from Attack
Part V: Defensive Security
Chapter 10: Defending Against Attacks
10.1. Intrusion Detection Systems (IDS)
10.2. Firewalls and Network Security
10.3. Preventing Buffer Overflows and Other Exploits
10.4. Hardening Systems and Applications
10.5. Log Monitoring and Incident Response
Chapter 11: Cryptography and Security
11.1. Introduction to Cryptography
11.2. Cryptographic Attacks and Defenses
11.3. Encryption Algorithms and Tools
11.4. Cryptography in Real-World Systems
Appendices
Appendix A: Compiling Exploits with gcc
- How to Use gcc and Makefiles for Exploit Development
Appendix B: Debugging with gdb
- Introduction to gdb for Debugging and Exploit Analysis
Appendix C: Tools for Hackers
- List of Tools and Resources for Penetration Testing and Hacking
Index
People also search for Hacking: The Art of Exploitation 2nd:
borrow hacking the art of exploitation 2nd edition
synopsis of hacking the art of exploitation 2nd edition
hacking the art of exploitation 2nd edition pdf
hacking the art of exploitation 2nd edition pdf github
hacking the art of exploitation 2nd edition analysis