CDN$ 41.81
  • List Price: CDN$ 54.95
  • You Save: CDN$ 13.14 (24%)
Only 4 left in stock (more on the way).
Ships from and sold by Amazon.ca. Gift-wrap available.
Quantity:1
Hacking : The Art of Expl... has been added to your Cart
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 3 images

Hacking : The Art of Exploitation, 2nd Edition Paperback – Feb 7 2008

4.6 out of 5 stars 25 customer reviews

See all 2 formats and editions Hide other formats and editions
Amazon Price
New from Used from
Kindle Edition
"Please retry"
Paperback
"Please retry"
CDN$ 41.81
CDN$ 35.31 CDN$ 35.04

Harry Potter and the Cursed Child
click to open popover

Special Offers and Product Promotions

  • You'll save an extra 5% on Books purchased from Amazon.ca, now through July 29th. No code necessary, discount applied at checkout. Here's how (restrictions apply)

Frequently Bought Together

  • Hacking : The Art of Exploitation, 2nd Edition
  • +
  • Metasploit: The Penetration Tester's Guide
  • +
  • The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
Total price: CDN$ 109.95
Buy the selected items together

No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.
Getting the download link through email is temporarily not available. Please check back later.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your mobile phone number.




Product Details

  • Paperback: 480 pages
  • Publisher: No Starch Press; 2 edition (Feb. 7 2008)
  • Language: English
  • ISBN-10: 1593271441
  • ISBN-13: 978-1593271442
  • Product Dimensions: 17.8 x 3 x 23.5 cm
  • Shipping Weight: 862 g
  • Average Customer Review: 4.6 out of 5 stars 25 customer reviews
  • Amazon Bestsellers Rank: #6,324 in Books (See Top 100 in Books)
  •  Would you like to update product info, give feedback on images, or tell us about a lower price?

  • See Complete Table of Contents

Product Description

About the Author

Jon Erickson has a formal education in computer science and has been hacking and programming since he was five years old. He speaks at computer security conferences and trains security teams around the world. Currently, he works as a vulnerability researcher and security specialist in Northern California.


What Other Items Do Customers Buy After Viewing This Item?

Customer Reviews

4.6 out of 5 stars
Share your thoughts with other customers

Top Customer Reviews

Format: Paperback Verified Purchase
Definitely not for beginners. While the first 19 pages do a decent job of teaching the fundamentals of programming, the book then takes off at break neck speed, leaving the novice in the dust. The amount of information in this book is overwhelming.

If you know at least one high level programming language, are an expert in assembly language, and have a comprehensive knowledge about the inner workings of microprocessors, this may be the book for you. Also, if you are going to tackle the cryptography section, you are going to need to know advanced math.

The advertising for this book should read: for advanced users only.
5 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again.
Report abuse
Format: Paperback
This book is 10 times greater than any other hacking book. It gives useful code and examples rather than 250 pages of theory. Stack and heap overflows are explained in detail as well as many other modern types of exploits. The best part of the book is that it teaches the reader how to write his/her own shellcode and teaches some basic Assembly language along the way. Everything you need to know to be a hacker or stop hackers.
Includes detailed explanations and code for:
buffer / stack / heap based overflows
format string vulnerabilities
writing shellcode
sniffing switched and unswitched networks
tcp / ip hijacking
denial of service
port scanning and tricking port scans of your own computer
password cracking
Man in the middle attacks
Wireless internet security / hacking
and more
10 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again.
Report abuse
Format: Paperback Verified Purchase
Excellent book. Explains the fundamentals quite well, and as another review mentioned, even if you know C and assembler, there are interesting tricks and insights in this book. In my opinion, different from other reviewers, this book is also a good introduction into (mid-low level) programming, although I can see how it might be a little abstract for some. I mostly write C code, and I think the basics of programming in C are very well explained in the first 115 pages. I do agree that for the beginner the information density per page can be high, but that's ok; don't panic, just take your time.

Well written book by an author who knows his stuff.
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again.
Report abuse
Format: Paperback
You have probably heard of such hacking techniques as buffer overflows. Typically, a book might give only cursory explanation, especially if it is not devoted to hacking. But suppose you write in C. Chances are you've inadvertantly created buffer overflows and then spent hours chasing this down, after your program crashed. So how on earth can a deliberate overflow lead to a breakin?
It is for such matters that Erickson expounds here. Written for you, whether you want to create such exploits or prevent them. In either case, the knowledge is the same.
What the book requires is some knowledge of C and assembly. For the latter, it is the language of the Intel x86 family. But even if you don't know it, so long as you are familiar with any assembly language and the theory of a Neumann machine, then you can follow the text.
This book is not for every programmer. It turns out that a fair number of programmers get into the field by learning a high level language like C, Fortran, Java or Pascal. But they never learn any assembly. To them, anything compiled from source is a black box. Instead, you need some background in assembly.
The book also gives neat coverage of how to sniff network traffic and manipulate it. There is a section on cryptography. But for this, it is so specialised and vital that you should consult texts dedicated to it.
5 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again.
Report abuse
Format: Paperback
This book is a step in the right direction, but it could be better. It seems to have a lot to say about certain topics, a little to say about others, and nothing to say about still other topics. The coverage of buffer overflows, format string exploits, and writing shellcode is excellent. But then when we get to the networking section, there are a couple of paragraphs devoted to some topics. There is no discussion of web vulnerabilities in the book. Nothing on SQL injection. Nothing on cross-site scripting. Furthermore, the Windows world is totally ignored; Linux is used exclusively in the book. Nevertheless, the book is worth it if only for its unsurpassed overflow/format string/shellcode explanations.
4 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again.
Report abuse
Format: Paperback Verified Purchase
This is a great book for someone who wants to have an introduction to how software is exploited. For something a bit more practical I would recommend the web hacking book instead since exploits like these are rare amongst current software.
One person found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again.
Report abuse
Format: Paperback
This book is for the security pro or would be hacker who want's to begin to see how deep the rabbit hole really does go. There is no other book like it on the market, and I've read most of them. Jon Erickson's code included in the book all works well as designed on Linux. The author also suggests some good free Linux tools for use with the code examples including most notably a hex editor, basic dissassembler, and packet injector.
The techniques in the book are best described by a caption on its back cover, "The fundamental techniques of serious hacking." It includes major sections on programming, networking, and cryptography. All material is covered with an eye towards exploitation. Languages used in the book material consist of C, PERL, and Assembly for X86.
The techniques described in this book are fundamental to any hacker or security professional who takes their work seriously. The book is well worth the discounted amazon.com price. The material in this book is all original and cannot be found elsewhere. Each example in the programming section is truly an eye opener if you are new to code hacking. The examples in the networking and cryptography sections are relevant and fresh as well.
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again.
Report abuse


Feedback