Feeds

A Geeks Guide2 ...Hacking

40% off

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

Geeks Guide 2 from Register BooksReg Bookshop Electronic vandalism, government espionage, ITU hideouts, luminous hairstyles and the coolest body piercings; the Hollywood portrayal of the hacking scene is one we are all familiar with. However this common portrayal often skips the fact that hacking is an art – indeed it is the fine art of creative problem solving.

This week GG2 focuses on Hacking: The Art of Exploitation, the second edition of the international best-seller by Jon Erickson. Unlike many of its kind, Erickson’s book takes the complex subject matter of hacking and provides a complete picture of the scene – from programming to machine code exploitation.

There are seven chapters to gorge your way through, starting with the core principles of C programming. This comprehensive first section, which covers all the fundamentals, is followed by chapters on exploitation (such as buffer overflows), networking (e.g. TCP/IP hijacking), shellcode, hacking countermeasures, and finally cryptology.

Like all good books, Hacking: AE encourages you to get your hands dirty. Each chapter focuses on a series of examples with finely worded guidance from Erickson. It’s not a beast of a read either; it is highly accessible with an emphasis on allowing practice of the examples rather than drowning the reader in hacking theory.

To support this weight on developing your techniques, the book features a bootable LiveCD based on Ubuntu Linux that can be used in any computer running an x86 processor, without making modifications to the existing OS. The CD provides a complete Linux programming and debugging environment, allowing you rummage through the book’s examples and practice debugging code, overflowing buffers, hijacking network communications, and possibly inventing new exploits.

By taking advantage of everything the book has to offer, you should be able to program computers using C, assembly language and shell scripts; outsmart common security measures; gain access to a remote server; hijack TCP connections and more.

Hacking: The Art of Exploitation is available from Register Books with the usual Geeks Guide240% discount on the RRP – saving Reg readers over £16.

View a sample chapter

Buy this book

*Offer correct at time of going to press. Offer covers selected title only. Terms and Conditions apply. ®

The essential guide to IT transformation

More from The Register

next story
Microsoft boots 1,500 dodgy apps from the Windows Store
DEVELOPERS! DEVELOPERS! DEVELOPERS! Naughty, misleading developers!
'Stop dissing Google or quit': OK, I quit, says Code Club co-founder
And now a message from our sponsors: 'STFU or else'
Apple promises to lift Curse of the Drained iPhone 5 Battery
Have you tried turning it off and...? Never mind, here's a replacement
Uber, Lyft and cutting corners: The true face of the Sharing Economy
Casual labour and tired ideas = not really web-tastic
Mozilla's 'Tiles' ads debut in new Firefox nightlies
You can try turning them off and on again
Linux turns 23 and Linus Torvalds celebrates as only he can
No, not with swearing, but by controlling the release cycle
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up Big Data
Solving backup challenges and “protect everything from everywhere,” as we move into the era of big data management and the adoption of BYOD.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?