Rating:  Summary: not bad, but... Review: I like the idea of the book. But it gives only an overwiew or better an introduction into some hacking techniques. There is far more to tell about buffer overflows, for example. I fully agree that its contents isn't very new and that most papers are a little bit overloaded with printscreens or other stuff like that. But if you can live with them, it is not that bad.
Rating:  Summary: The first comprehensive hacking textbook/reference manual Review: I wonder why it's taken so long for a book like this to be published. Not only does the book clearly cover the most common network hacking programming techniques, he goes through all the major attacks and hacks of interests to today's network security enthusiast/professional.Jon Erickson writes in a clear, concise and organized manner that I wish today's programming books were written in. It's not dumbed-down, but it isn't too obtuse for a complete newbie to understand. Some people in the field say, "we should teach hacking in schools". Well, to all who would--your textbook just arrived.
Rating:  Summary: A vulnerability development bible. Review: I've been working in systems security for roughly ten years. I've performed penetration testing and systems security review. I know computer and network systems security. This book is without question, a penetration tester and vulnerability developer's bible. Jon brings eases the reader into to what are normally confusing concepts surrounding the technical nitty-gritty of systems penetration. I'm finding it dificult to write this review without the use of the explicatives I muttered aloud while reading. I believe my wife thought I was losing my mind. As I read, I kept exclaiming "holy ****!" among other colorful phrases as Jon brought arcane concepts into crystal clarity. If you want to know how the truly talented hackers are breaking into systems, you *must* read this book. I will be strongly suggesting it as a read to all of my co-workers.
Rating:  Summary: Judge this book by its cover Review: If you can understand what is on the front cover, then you will probably think the cover in itself is worth the price of the book. If you write software, you will find this book fascinating for its explanation of "buffer overflows" and how they are exploited by hackers (er, crackers) to take control of other people's computers. If you don't write software, then you'll probably have great difficulty understanding this book.
Rating:  Summary: A definitve guide to the cutting edge of hacking. Review: In this book Mr. Erickson has made accessible to the rest of the world the kind of cutting edge techniques only discussed in tight knit underground hacking groups and private chat rooms in the dark fleshy underbelly of cyberspace. Though he does a laudable job of outlining the fundamentals of computer attacks, this book is most exceptional for it's clear yet technical explanations of some of the most advanced known hacking techniques. This book is a must-buy for script kiddies and uber-haxors alike.
Rating:  Summary: Superb Review: Jon Erickson brings to light some of the deepest concepts of hacking. Not just a lexicon of what scripts to run, but overflows and exploits and shellcode, oh my. He brings an understanding to terms you've only heard in confusing conversations. Jon Erickson is the reason why Windows Update [or even emerge rsync] is not the end-all-be-all of system security.
Rating:  Summary: a good resource Review: Overall this book is excellent and teaches the fundamentals of various types of exploits that exist and what they mean and how they "work". This book should be required reading for any aspiring programmer and should probably be taught as basic computer programming fundamentals in computer schools everywhere. This book is an invaluable resource, but at times it can get VERY deep. Some of the code examples are quite intricate (especially the Assembly language ones) and other examples are very long (several pages of code) which can be intimidating for people newer to programming. But for intermediate-expert programmers this book is a must! For the full review, visit http://www.flash-mx.com/books/hacking.cfm .
Rating:  Summary: Advanced Hacking and Exploit Techniques Review: People often talk about whether the hacker technique genre of books such as Hacking Exposed, Hack Attacks Revealed or Counter Hack actually do more to teach the next generation of hackers and crackers than they do to help educate people about security. Those books don't go to nearly the depth that Hacking: The Art of Exploitation does.
Jon Erickson picks up more or less where those other books leave off. He provides a look at techniques and tools used by hackers as well, but he also gives a more comprehensive look at stack overflows, heap overflows, string vulnerabilities and other commonly exploited weaknesses.
Rather than simply describing the vulnerabilities and their exploits theoretically or showing you how to use pre-existing tools to exploit the vulnerabilities, Jon Erickson provides the nuts & bolts you need to learn how to program your own exploit code.
Arguably, this information could very well be used by a hacker wannabe to learn how to break into machines illegally. However, like the other hacker technique genre books, the purpose is to educate so that we can better protect ourselves from such hackers.
Armed with the information in this book you can actively develop your own exploit code to conduct vulnerability and penetration testing- the results of which could be very valuable in helping to secure your networks and computers.
This is an excellent book. Those who are ready to move on to Level 2 should pick this book up and read it thoroughly.
Tony Bradley is a consultant and writer with a focus on network security, antivirus and incident response. He is the About.com Guide for Internet / Network Security (http://netsecurity.about.com), providing a broad range of information security tips, advice, reviews and information. Tony also contributes frequently to other industry publications. For a complete list of his freelance contributions you can visit Essential Computer Security (http://www.tonybradley.com).
Rating:  Summary: The next step Review: This book covers foundational exploit techniques very well the emphasis on how to do things efficent and then in more than one way is great. The programming section is unlike anything else you'll find on the shelf and is a great next step for someone who knows the concepts and techniques of exploitation just isn't making their own home grown stuff yet. The networking section leaves a lot to be desired if this book is to be considered to contain "The fundamental techniques of serious hacking". Still this book on the shelf is one on a level above Counter Hack/Hacking Exposed/Hack Attacks Revealed. Less concept, more application. Buy this book, read it, and read it again.
Rating:  Summary: Best hacking book in the market Review: This book is 10 times greater than any other hacking book. It gives useful code and examples rather than 250 pages of theory. Stack and heap overflows are explained in detail as well as many other modern types of exploits. The best part of the book is that it teaches the reader how to write his/her own shellcode and teaches some basic Assembly language along the way. Everything you need to know to be a hacker or stop hackers. Includes detailed explanations and code for: buffer / stack / heap based overflows format string vulnerabilities writing shellcode sniffing switched and unswitched networks tcp / ip hijacking denial of service port scanning and tricking port scans of your own computer password cracking Man in the middle attacks Wireless internet security / hacking and more
|