Results 1 to 11 of 11

Threaded View

  1. #1
    radnomguywfq3's Avatar
    Join Date
    Jan 2007
    Gender
    male
    Location
    J:\E\T\A\M\A\Y.exe
    Posts
    8,858
    Reputation
    381
    Thanks
    1,823
    My Mood
    Sad

    Hacking: The Art Of Exploitation 2nd Edition

    Hacking: The Art Of Exploitation 2nd Edition


    I'm going to get back into low-level programming, thus I'm going to start hacking again. Okay, I know the cover looks a little cheap, but its a really good book. I've been reading it for a couple of days now, and it has a bunch of amazing ideas in it. The first chapter is not really hacking, but reviewing your C and ASM (I suggest you have a good understanding of C\C++ programming and a little assembly knowledge before reading it). The book was written quite well. You pretty much write and compile programs in C, and examine them line by line disassembled. The book provides you with a bootable linux, which has a C compiler and debugger implemented and setup in it. Aslong as you're using the provided compiler, they should be assembled the exact way the book has it. The only problem I have with this book is it's use of an out-dated Ubuntu redistributation of linux. -_- And the disk is 715MBs, which is pretty fucked up, because I kinda wanted to boot through it on my computer, but I only have 700MB disks ='(. I suggest you use VMware, and not your current version of linux. Your current version of linux may have an updated compiler and thus it will assemble your C code differently. Which will fuck you up hard if you're trying to follow the book.

    You should have good understanding of C\C++(or programming in general), and bit of asm, as well as how a computer stores\manages its memory(as this book doesn't explain that too clearly).

    It teaches you a lot more:

    • Program computers using C, assembly language, and shell scripts
    • Corrupt system memory to run arbitrary code using buffer overflows and format strings
    • Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening
    • Outsmart common security measures like nonexecutable stacks and intrusion detection systems
    • Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence
    • Redirect network traffic, conceal open ports, and hijack TCP connections
    • Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix


    I'm too lazy to write a whole review(and I can't, I haven't completed the book), so take a look at this :
    Amazon.com: Customer Reviews: Hacking: The Art of Exploitation, 2nd Edition

    If you see this book in the store, buy it. This is the first book I've ever felt guilty for torrenting.


    Last edited by radnomguywfq3; 12-31-2008 at 12:25 AM.



    There are two types of tragedies in life. One is not getting what you want, the other is getting it.

    If you wake up at a different time in a different place, could you wake up as a different person?


Similar Threads

  1. hacking the traffic!
    By dibola in forum General
    Replies: 10
    Last Post: 09-13-2008, 08:39 PM
  2. [Release] All Hacks For V54.. No Trainers//Bot. Editing MS Files :]
    By Lotion in forum MapleStory Hacks, Cheats & Trainers
    Replies: 3
    Last Post: 06-20-2008, 11:28 PM
  3. [release]lee n joe hack the best
    By lee9160 in forum WarRock - International Hacks
    Replies: 77
    Last Post: 10-11-2007, 04:49 PM
  4. Can Anybody Hack The Mu Online.....
    By boneslapz in forum General Gaming
    Replies: 3
    Last Post: 01-05-2006, 04:05 AM

Tags for this Thread