|
A comprehensive introduction to the techniques of exploitation and creative problemsolving methods commonly referred to as "hacking".Click here to view chapter 3.This book is for both technical and nontechnical people who are interested in computer security. It shows how hackers exploit programs and write exploits, instead of just how to run other people`s exploits. Unlike many socalled hacking books, this book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, returnintolibc, shellcode, and cryptographic attacks on 802.11b. If you`re serious about hacking, this book is for you.JON ERICKSON has a formal education in computer science and speaks frequently at computer security conferences around the world. He currently works as a cryptologist and security specialist in Northern California.
|
|
|