Buy this item and get 90 days Free Amazon Music Unlimited. After purchase you will receive an email with further information. Offer valid for a limited time only. Terms and Conditions apply.” Learn more here.
Includes your first audiobook free, a bonus book selected by our editors, unlimited access to exclusive podcasts and more. $16.45/mo after 30 days. Cancel anytime. Learn more >
Product details
Publisher
:
NO STARCH; 2nd ed. edition (1 August 2017)
"A security professional's paradise, burrowing down to the code level of dozesn of different loopholes and explaining the underlying logic behind the attacks." --Wired
About the Author
Jon Erickson has a formal education in computer science and speaks frequently at computer security conferences around the world. He works as a cryptologist and security specialist in Northern California.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyses reviews to verify trustworthiness.
I agree with the gist of the reviews here. I started reading this after Jeff Duntemann's Step by Step Assembly, and it complements that very well. It probably helps if you already know some C.
I also couldn't get the CD to run. The solution was to make a disk image of it in "iso" format and run it on Oracle's virtual box with 32-bit ubuntu selected as the machine configuration. It then works perfectly.
I will give it 3 stars just because of the errors that I get when booting the CD. It seems that the version of the Ubuntu is just old, however, they could have made newer CDs with up to date environment. I am not rating the book as the content!
3.0 out of 5 stars
CD not running
Reviewed in the United Kingdom on 7 March 2019
I will give it 3 stars just because of the errors that I get when booting the CD. It seems that the version of the Ubuntu is just old, however, they could have made newer CDs with up to date environment. I am not rating the book as the content!
This book is like no other book in its field/segment/genre whatever you want to call it, this book won't "dummy" guide you through already made up stuff, that will turn you into a BOT. This book lays ground and rules to think and develop your skills outside of what you have been taught, it teaches you in a way that will let you evolve further without the book, and in no time you will be developing your own exploits, this book would be only worth for its programming side, it is that good. It comes with a a linux distro with some tools you can use, I have decided to use my own linux distro, but further in the book, it is advised to use the one provided by the book, because, some exploits have already been patched in later distributions, and all of the exploits and tools work on the one provided by the book. Also the package was adequate and it came in excellent condition.
Absolutely recommended, although not recommended for someone with very little computer knowledge, or someone that have never written a line of code before, if that is your case this will be very difficult to pick up.
Reviewed in the United Kingdom on 27 February 2014
Verified Purchase
This is a great read for people who want to know the nuts and bolts of exploitation. If you want to know how to 'hack facebook' ... look elsewhere! but, if you are interested in how programs, networks and computers work from a very fundamental level, I would recommend this book. Some programming experience would be helpful, but you don't have to be a programmer (I'm not) to get something out of this.
Once again, I would recommend this book to people who have a curiosity and interest in how things work.
Reviewed in the United Kingdom on 22 February 2021
Verified Purchase
The techniques themseves and the systems at which they are targeted are (largely) long gone, but it is a great introduction to the basic techniques. For those worried about the fact that the CD is out of date, I found it was straightforward to get hold online and upload the required software (VirtualBox and the book code) at no cost.