Hacking: The Art of Exploitation is a book by John "Smips" Erickson on computer and network security. [1] [2] It was published by No Starch Press in 2003, with a second edition in 2008. All examples in the book were developed, compiled, and tested on Gentoo Linux.
Author information and history
John Erickson is a computer security expert with a background in computer science. Since 2011, he has worked as a vulnerability researcher and computer security specialist in California.
A Starter CD is included with the book which provides a Linux-based programming and debugging environment for users.
Contents of the first edition
The content of the operation evolves between programming, networking and coding. The book does not use any appreciable scale for real world examples; Discussions about specific worms and exploits rarely provoke.
Programming
The computer programming part of the hack takes up more than half of the book. This section deals with developing, designing, building, and testing operating code, and therefore includes basic assembly programming. Attacks proven to range from simple stack buffer overflows to sophisticated techniques that include global shift table overwriting.
While Ericsson discusses countermeasures such as the runnable stack and how to dodge them with libc kickback attacks, it does not delve into things without known vulnerabilities such as address space layout randomization. . The book also does not cover Openwall, GrSecurity, PaX projects or kernel exploits.
Networks
The Network section in Hacking explains the basics of the OSI model and basic networking concepts, including packet sniffing, connection hijacking, denial of service, and port scanning.
cryptology
The Hack Cryptography section covers basic information theory, as well as symmetric and asymmetric encryption. He ends up cracking the WEP using a Fluhrer, Mantin and Shamir attack. Besides the basics, including man-in-the-middle attacks, dictionary attacks, and using John the Ripper; Hacking discusses Quantum Key Distribution, Love Grover's Quantum Search Algorithm, and Peter Shore's Quantum Analysis Algorithm for Breaking RSA Ciphers Using a Very Large Quantum Computer.
Other details
Hack coverage is the full cycle, from reverse engineering to executing the attack, to developing a vulnerability for a program that dies due to a buffer overflow via long command line arguments .
link for dowanlod : CLIK HERE
0 Comments:
Post a Comment