Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Hacking: The Art of Exploitation

Hacking: The Art of Exploitation

List Price: $39.95
Your Price: $26.37
Product Info Reviews

<< 1 2 3 >>

Rating: 3 stars
Summary: not bad, but...
Review: I like the idea of the book. But it gives only an overwiew or better an introduction into some hacking techniques. There is far more to tell about buffer overflows, for example. I fully agree that its contents isn't very new and that most papers are a little bit overloaded with printscreens or other stuff like that. But if you can live with them, it is not that bad.

Rating: 5 stars
Summary: The first comprehensive hacking textbook/reference manual
Review: I wonder why it's taken so long for a book like this to be published. Not only does the book clearly cover the most common network hacking programming techniques, he goes through all the major attacks and hacks of interests to today's network security enthusiast/professional.

Jon Erickson writes in a clear, concise and organized manner that I wish today's programming books were written in. It's not dumbed-down, but it isn't too obtuse for a complete newbie to understand. Some people in the field say, "we should teach hacking in schools". Well, to all who would--your textbook just arrived.

Rating: 5 stars
Summary: A vulnerability development bible.
Review: I've been working in systems security for roughly ten years. I've performed penetration testing and systems security review. I know computer and network systems security.

This book is without question, a penetration tester and vulnerability developer's bible. Jon brings eases the reader into to what are normally confusing concepts surrounding the technical nitty-gritty of systems penetration. I'm finding it dificult to write this review without the use of the explicatives I muttered aloud while reading. I believe my wife thought I was losing my mind. As I read, I kept exclaiming "holy ****!" among other colorful phrases as Jon brought arcane concepts into crystal clarity.

If you want to know how the truly talented hackers are breaking into systems, you *must* read this book. I will be strongly suggesting it as a read to all of my co-workers.

Rating: 5 stars
Summary: Judge this book by its cover
Review: If you can understand what is on the front cover, then you
will probably think the cover in itself is worth the price of
the book.

If you write software, you will find this book fascinating for
its explanation of "buffer overflows" and how they are exploited
by hackers (er, crackers) to take control of other people's
computers.

If you don't write software, then you'll probably have great
difficulty understanding this book.

Rating: 5 stars
Summary: A definitve guide to the cutting edge of hacking.
Review: In this book Mr. Erickson has made accessible to the rest of the world the kind of cutting edge techniques only discussed in tight knit underground hacking groups and private chat rooms in the dark fleshy underbelly of cyberspace. Though he does a laudable job of outlining the fundamentals of computer attacks, this book is most exceptional for it's clear yet technical explanations of some of the most advanced known hacking techniques. This book is a must-buy for script kiddies and uber-haxors alike.

Rating: 5 stars
Summary: Superb
Review: Jon Erickson brings to light some of the deepest concepts of hacking. Not just a lexicon of what scripts to run, but overflows and exploits and shellcode, oh my. He brings an understanding to terms you've only heard in confusing conversations. Jon Erickson is the reason why Windows Update [or even emerge rsync] is not the end-all-be-all of system security.

Rating: 4 stars
Summary: a good resource
Review: Overall this book is excellent and teaches the fundamentals of various types of exploits that exist and what they mean and how they "work". This book should be required reading for any aspiring programmer and should probably be taught as basic computer programming fundamentals in computer schools everywhere.

This book is an invaluable resource, but at times it can get VERY deep. Some of the code examples are quite intricate (especially the Assembly language ones) and other examples are very long (several pages of code) which can be intimidating for people newer to programming. But for intermediate-expert programmers this book is a must!

For the full review, visit http://www.flash-mx.com/books/hacking.cfm .

Rating: 4 stars
Summary: Advanced Hacking and Exploit Techniques
Review: People often talk about whether the hacker technique genre of books such as Hacking Exposed, Hack Attacks Revealed or Counter Hack actually do more to teach the next generation of hackers and crackers than they do to help educate people about security. Those books don't go to nearly the depth that Hacking: The Art of Exploitation does.

Jon Erickson picks up more or less where those other books leave off. He provides a look at techniques and tools used by hackers as well, but he also gives a more comprehensive look at stack overflows, heap overflows, string vulnerabilities and other commonly exploited weaknesses.

Rather than simply describing the vulnerabilities and their exploits theoretically or showing you how to use pre-existing tools to exploit the vulnerabilities, Jon Erickson provides the nuts & bolts you need to learn how to program your own exploit code.

Arguably, this information could very well be used by a hacker wannabe to learn how to break into machines illegally. However, like the other hacker technique genre books, the purpose is to educate so that we can better protect ourselves from such hackers.

Armed with the information in this book you can actively develop your own exploit code to conduct vulnerability and penetration testing- the results of which could be very valuable in helping to secure your networks and computers.

This is an excellent book. Those who are ready to move on to Level 2 should pick this book up and read it thoroughly.

Tony Bradley is a consultant and writer with a focus on network security, antivirus and incident response. He is the About.com Guide for Internet / Network Security (http://netsecurity.about.com), providing a broad range of information security tips, advice, reviews and information. Tony also contributes frequently to other industry publications. For a complete list of his freelance contributions you can visit Essential Computer Security (http://www.tonybradley.com).



Rating: 4 stars
Summary: The next step
Review: This book covers foundational exploit techniques very well the emphasis on how to do things efficent and then in more than one way is great. The programming section is unlike anything else you'll find on the shelf and is a great next step for someone who knows the concepts and techniques of exploitation just isn't making their own home grown stuff yet. The networking section leaves a lot to be desired if this book is to be considered to contain "The fundamental techniques of serious hacking". Still this book on the shelf is one on a level above Counter Hack/Hacking Exposed/Hack Attacks Revealed. Less concept, more application. Buy this book, read it, and read it again.

Rating: 5 stars
Summary: Best hacking book in the market
Review: This book is 10 times greater than any other hacking book. It gives useful code and examples rather than 250 pages of theory. Stack and heap overflows are explained in detail as well as many other modern types of exploits. The best part of the book is that it teaches the reader how to write his/her own shellcode and teaches some basic Assembly language along the way. Everything you need to know to be a hacker or stop hackers.

Includes detailed explanations and code for:
buffer / stack / heap based overflows
format string vulnerabilities
writing shellcode
sniffing switched and unswitched networks
tcp / ip hijacking
denial of service
port scanning and tricking port scans of your own computer
password cracking
Man in the middle attacks
Wireless internet security / hacking
and more


<< 1 2 3 >>

© 2004, ReviewFocus or its affiliates