Feeds

A Geeks Guide2 ...Hacking

40% off

  • alert
  • submit to reddit

High performance access to file storage

Geeks Guide 2 from Register BooksReg Bookshop Electronic vandalism, government espionage, ITU hideouts, luminous hairstyles and the coolest body piercings; the Hollywood portrayal of the hacking scene is one we are all familiar with. However this common portrayal often skips the fact that hacking is an art – indeed it is the fine art of creative problem solving.

This week GG2 focuses on Hacking: The Art of Exploitation, the second edition of the international best-seller by Jon Erickson. Unlike many of its kind, Erickson’s book takes the complex subject matter of hacking and provides a complete picture of the scene – from programming to machine code exploitation.

There are seven chapters to gorge your way through, starting with the core principles of C programming. This comprehensive first section, which covers all the fundamentals, is followed by chapters on exploitation (such as buffer overflows), networking (e.g. TCP/IP hijacking), shellcode, hacking countermeasures, and finally cryptology.

Like all good books, Hacking: AE encourages you to get your hands dirty. Each chapter focuses on a series of examples with finely worded guidance from Erickson. It’s not a beast of a read either; it is highly accessible with an emphasis on allowing practice of the examples rather than drowning the reader in hacking theory.

To support this weight on developing your techniques, the book features a bootable LiveCD based on Ubuntu Linux that can be used in any computer running an x86 processor, without making modifications to the existing OS. The CD provides a complete Linux programming and debugging environment, allowing you rummage through the book’s examples and practice debugging code, overflowing buffers, hijacking network communications, and possibly inventing new exploits.

By taking advantage of everything the book has to offer, you should be able to program computers using C, assembly language and shell scripts; outsmart common security measures; gain access to a remote server; hijack TCP connections and more.

Hacking: The Art of Exploitation is available from Register Books with the usual Geeks Guide240% discount on the RRP – saving Reg readers over £16.

View a sample chapter

Buy this book

*Offer correct at time of going to press. Offer covers selected title only. Terms and Conditions apply. ®

High performance access to file storage

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
Microsoft: Windows version you probably haven't upgraded to yet is ALREADY OBSOLETE
Pre-Update versions of Windows 8.1 will no longer support patches
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Windows XP still has 27 per cent market share on its deathbed
Windows 7 making some gains on XP Death Day
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
US taxman blows Win XP deadline, must now spend millions on custom support
Gov't IT likened to 'a Model T with a lot of things on top of it'
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.