Hacking: The Art of Exploitation, 2nd Edition 🔍
Jon Erickson, Jon Erickson No Starch Press, Incorporated, High tech, 2-е изд., Санкт-Петербург, Москва, Russia, 2010
English [en] · MOBI · 1.1MB · 2010 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/upload/zlib · Save
description
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.
Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.
The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:
Program computers using C, assembly language, and shell scripts
Corrupt system memory to run arbitrary code using buffer overflows and format strings
Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening
Outsmart common security measures like nonexecutable stacks and intrusion detection systems
Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence
Redirect network traffic, conceal open ports, and hijack TCP connections
Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix
Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.
This book is for both technical and nontechnical people interested in computer security. Unlike many so-called hacking books, this explains technical aspects of hacking such as stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.
Alternative filename
upload/duxiu_main/v/rar/G-M/Jon Erickson/Jon Erickson/Hacking_ The Art of Exploitation, 2nd Ed (8105)/Hacking_ The Art of Exploitation, 2nd Ed - Jon Erickson.mobi
Alternative filename
upload/duxiu_main/v/rar/[4700册MOBI英文文字版图书].(PART 4 J-K).多人作家.MOBI/Jon Erickson/Jon Erickson/Hacking_ The Art of Exploitation, 2nd Ed (8105)/Hacking_ The Art of Exploitation, 2nd Ed - Jon Erickson.mobi
Alternative filename
upload/duxiu_main/v/rar/extracted__./Jon Erickson.zip/Jon Erickson/Hacking_ The Art of Exploitation, 2nd Ed (8105)/Hacking_ The Art of Exploitation, 2nd Ed - Jon Erickson.mobi
Alternative filename
upload/duxiu_main/v/zip/extracted__./Jon Erickson.zip/Jon Erickson/Hacking_ The Art of Exploitation, 2nd Ed (8105)/Hacking_ The Art of Exploitation, 2nd Ed - Jon Erickson.mobi
Alternative filename
upload/duxiu_main/v/rar/33/Jon Erickson/Hacking_ The Art of Exploitation, 2nd Edition (8105)/Hacking_ The Art of Exploitation, 2nd Edition - Jon Erickson.mobi
Alternative filename
upload/duxiu_main/v/rar/extracted__Jon Erickson.zip/Jon Erickson/Hacking_ The Art of Exploitation, 2nd Ed (8105)/Hacking_ The Art of Exploitation, 2nd Ed - Jon Erickson.mobi
Alternative filename
upload/emo37c/2024-10-21/content/Jon Erickson - Hacking The Art of Exploitation, 2nd Edition - [mobi]/Hacking_ The Art of Exploitation, 2nd Ed - Jon Erickson.mobi
Alternative filename
upload/duxiu_main/v/mobi/Hacking_ The Art of Exploitation, 2nd Edition - Jon Erickson.mobi
Alternative filename
upload/duxiu_main/v/rar/Hacking_ The Art of Exploitation, 2nd Ed - Jon Erickson.mobi
Alternative filename
upload/duxiu_main/v/rar/Hacking_ The Art of Exploitation, 2nd Edition - Jon Erickson.mobi
Alternative filename
lgli/L:\bib\Jon Erickson\Hacking_ The Art of Exploitation, 2nd Ed (21785)\Hacking_ The Art of Exploitation, 2nd Ed - Jon Erickson.mobi
Alternative filename
lgrsfic/L:\bib\Jon Erickson\Hacking_ The Art of Exploitation, 2nd Ed (21785)\Hacking_ The Art of Exploitation, 2nd Ed - Jon Erickson.mobi
Alternative filename
zlib/Computers/Networking/Erickson Jon/Hacking: The Art of Exploitation_1661940.mobi
Alternative title
Хакинг: искусство эксплойта: [16+]
Alternative author
Джон Эриксон; [перевела с английского И. Рузмайкина]
Alternative author
Джон Эриксон; [перевод с английского И. Рузмайкина]
Alternative author
Джон Эриксон; [пер. с англ. С. Маккавеева]
Alternative author
Эриксон, Джон
Alternative publisher
Random House LLC US
Alternative publisher
Символ
Alternative publisher
Питер
Alternative edition
Серия "Библиотека программиста", 2-е изд., Санкт-Петербург [и др.], Russia, 2019
Alternative edition
Серия "Библиотека программиста", 2-е изд., Санкт-Петербург [и др.], Russia, 2020
Alternative edition
Penguin Random House LLC (Publisher Services), San Francisco, Calif, 2008
Alternative edition
2nd ed., San Francisco, CA, California, 2008
Alternative edition
United States, United States of America
Alternative edition
2 edition, October 24, 2007
metadata comments
lg_fict_id_421327
metadata comments
Includes bibliographical references and index.
metadata comments
Фактическая дата выхода в свет - 2018
Библиогр.: с. 491-493
Пер.: Erickson, Jon Hacking 2nd ed. 978-1-59327-144-2
metadata comments
РГБ
metadata comments
Russian State Library [rgb] MARC:
=001 009804533
=005 20190312120347.0
=008 181116s2019\\\\ru\||||\\\\\\\|||\|\rus|d
=017 \\ $a КН-П-19-016060 $b RuMoRKP
=017 \\ $a КН-П-18-086188 $b RuMoRKP
=020 \\ $a 978-5-4461-0712-4 $c 1200 экз.
=040 \\ $a RuMoRGB $b rus $e rcr
=041 1\ $a rus $h eng
=044 \\ $a ru
=084 \\ $a З973.26-082.03-642я78-5 $2 rubbk
=100 1\ $a Эриксон, Джон
=245 00 $a Хакинг $h [Текст] : $b искусство эксплойта : [16+] $c Джон Эриксон ; [перевод с английского И. Рузмайкина]
=250 \\ $a 2-е изд.
=260 \\ $a Санкт-Петербург [и др.] $b Питер $c 2019
=300 \\ $a 493 с. $b ил., табл. $c 24 см
=336 \\ $a текст (text) $b txt $2 rdacontent
=337 \\ $a неопосредованный (unmediated) $b n $2 rdamedia
=338 \\ $a том (volume) $b nc $2 rdacarrier
=490 0\ $a Серия "Библиотека программиста"
=500 \\ $a Фактическая дата выхода в свет - 2018
=504 \\ $a Библиогр.: с. 491-493
=534 \\ $p Пер.: $a Erickson, Jon $t Hacking $b 2nd ed. $z 978-1-59327-144-2
=650 \7 $a Вычислительная техника -- Вычислительные машины электронные цифровые -- Персональные компьютеры -- Эксплуатация -- Аварии и неисправности и борьба сними -- Выбор технологического варианта -- Практическое пособие для самообразования $2 rubbk
=852 \\ $a РГБ $b FB $j 3 18-46/150 $x 90
=852 7\ $a РГБ $b CZ2 $h З973.202/Э77 $x 83
=852 \\ $a РГБ $b ORF $x 82
=852 \\ $a РГБ $b ORF $x 82
metadata comments
Библиогр.: с. 491-493
Пер.: Erickson, Jon Hacking. The art of exploitation 2nd ed. 978-1-59327-144-2
metadata comments
Russian State Library [rgb] MARC:
=001 010234318
=005 20200131152955.0
=008 200124s2020\\\\ru\||||\\\\\\\0||\u\rus|d
=017 \\ $a КН-П-20-002698 $b RuMoRKP
=020 \\ $a 978-5-4461-0712-4
=040 \\ $a RuMoRGB $b rus $e rcr
=041 1\ $a rus $h eng
=044 \\ $a ru
=084 \\ $a 2019734857 $2 rubbk
=084 \\ $a З973.26-082.03-642я78-5 $2 rubbk
=100 1\ $a Эриксон, Джон
=245 00 $a Хакинг. Искусство эксплойта : $b 16+ $c Джон Эриксон ; [перевела с английского И. Рузмайкина]
=250 \\ $a 2-е изд.
=260 \\ $a Санкт-Петербург [и др.] $b Питер $c 2020
=300 \\ $a 493 с. $b ил., табл. $c 24 см
=336 \\ $a Текст (визуальный)
=337 \\ $a непосредственный
=490 0\ $a Серия "Библиотека программиста"
=504 \\ $a Библиогр.: с. 491-493
=534 \\ $p Пер.: $a Erickson, Jon $t Hacking. The art of exploitation $b 2nd ed. $z 978-1-59327-144-2
=650 \7 $a Техника. Технические науки -- Энергетика. Радиоэлектроника -- Вычислительная техника -- Вычислительные машины электронные цифровые -- Персональные компьютеры -- Эксплуатация -- Аварии и неисправности и борьба сними -- Выбор технологического варианта -- Практическое пособие для самообразования $2 rubbk
=852 \\ $a РГБ $b FB $j 3 20-6/111 $x 90
=852 \\ $a РГБ $b ORF $x 82
metadata comments
Указ.
Фактическая дата выхода в свет: 2009
Библиогр.: с. 500-502
Пер.: Erickson, Jon Hacking: the Art of Exploitation 2nd ed. 978-1-59327-144-2
metadata comments
Russian State Library [rgb] MARC:
=001 004416579
=005 20091207142731.0
=008 091120s2010\\\\ru\\\\\\\\\\\\000\|\rus|d
=017 \\ $a 09-93831
=020 \\ $a 978-5-93286-158-5
=040 \\ $a RuMoRKP $b rus $e rcr $d RuMoRGB
=041 1\ $a rus $h eng
=080 \\ $a 004.42
=084 \\ $a З973.26-082.03-642я78-5 $2 rubbk
=100 1\ $a Эриксон, Джон
=245 00 $a Хакинг: искусство эксплойта $c Джон Эриксон ; [пер. с англ. С. Маккавеева]
=250 \\ $a 2-е изд.
=260 \\ $a Санкт-Петербург ; $a Москва $b Символ $c 2010
=300 \\ $a 508 с. $b ил., табл. $c 24 см
=490 0\ $a High tech
=500 \\ $a Указ.
=500 \\ $a Фактическая дата выхода в свет: 2009
=504 \\ $a Библиогр.: с. 500-502
=534 \\ $p Пер.: $a Erickson, Jon $t Hacking: the Art of Exploitation $b 2nd ed. $z 978-1-59327-144-2
=650 \7 $a Вычислительная техника -- Вычислительные машины электронные цифровые -- Персональные компьютеры -- Эксплуатация -- Аварии и неисправности и борьба сними -- Выбор технологического варианта -- Практическое пособие для самообразования $2 rubbk
=650 \7 $2 nlr_sh $0 RU\NLR\AUTH\661270115 $a Хакинг(компьют.) $v Учебные издания для высших учебных заведений
=852 \\ $a РГБ $b FB $j 3 09-43/211 $x 90
Alternative description
While other books merely show how to run existing exploits, Hacking: The Art of Exploitation broke ground as the first book to explain how hacking and software exploits work and how readers could develop and implement their own. In the second edition, author Jon Erickson again uses practical examples to illustrate the most common computer security issues in three related fields: programming, networking and cryptography. All sections have been extensively updated and expanded, including a more thorough introduction to the complex, low-level workings of a computer. Readers can easily follow along with example code by booting the included live CD, which provides a Linux programming environment and all of its benefits without the hassle of installing a new operating system
Alternative description
While other books merely show how to run existing exploits, Hacking: The Art of Exploitation broke ground as the first book to explain how hacking and software exploits work and how readers could develop and implement their own. In the extensively updated and expanded second edition, author Jon Erickson again uses practical examples to illustrate the most common computer security issues in three related fields: programming, networking and cryptography. Includes a live CD, which provides a Linux programming environment and all of its benefits without the hassle of installing a new operating system.
Reference:Computers
COMPUTERS / Security / General
Alternative description
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Rather than merely showing how to run existing exploits, Hacking: The Art of Exploitation , 2nd Edition author Jon Erickson explains how arcane hacking techniques actually work. Using the included Ubuntu LiveCD, get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits
date open sourced
2011-11-04
Read more…

🚀 Fast downloads

Become a member to support the long-term preservation of books, papers, and more. To show our gratitude for your support, you get fast downloads. ❤️

🐢 Slow downloads

From trusted partners. More information in the FAQ. (might require browser verification — unlimited downloads!)

All download options have the same file, and should be safe to use. That said, always be cautious when downloading files from the internet, especially from sites external to Anna’s Archive. For example, be sure to keep your devices updated.
  • For large files, we recommend using a download manager to prevent interruptions.
    Recommended download managers: Motrix
  • You will need an ebook or PDF reader to open the file, depending on the file format.
    Recommended ebook readers: Anna’s Archive online viewer, ReadEra, and Calibre
  • Use online tools to convert between formats.
    Recommended conversion tools: CloudConvert and PrintFriendly
  • You can send both PDF and EPUB files to your Kindle or Kobo eReader.
    Recommended tools: Amazon‘s “Send to Kindle” and djazz‘s “Send to Kobo/Kindle”
  • Support authors and libraries
    ✍️ If you like this and can afford it, consider buying the original, or supporting the authors directly.
    📚 If this is available at your local library, consider borrowing it for free there.