

Review: Landmark on the genre - This book is like no other book in its field/segment/genre whatever you want to call it, this book won't "dummy" guide you through already made up stuff, that will turn you into a BOT. This book lays ground and rules to think and develop your skills outside of what you have been taught, it teaches you in a way that will let you evolve further without the book, and in no time you will be developing your own exploits, this book would be only worth for its programming side, it is that good. It comes with a a linux distro with some tools you can use, I have decided to use my own linux distro, but further in the book, it is advised to use the one provided by the book, because, some exploits have already been patched in later distributions, and all of the exploits and tools work on the one provided by the book. Also the package was adequate and it came in excellent condition. Absolutely recommended, although not recommended for someone with very little computer knowledge, or someone that have never written a line of code before, if that is your case this will be very difficult to pick up. Review: Very interesting - Dont be expecting to hack your mates facebook account, facebook has very advanced security, this book will show you the kind of exploits like the recnt heartbleed vulnerability, it realy gets down to the bits and bytes and focuses on C and Assembly language. Extremely interesting and the information will certainly aid you as a penetration tester, youll learn all sorts or techniques to take advantage of overlooked 'mistakes' in the code written by apparently 'good' programmers, this teaches you to be better than them, it teaches you that a program that is executed that was written in C does no contain IF statements and FOR statements and all that, it contains 1101011101101, or translation to assembly, things like mov ecx, ebx add eax, ecx sub edx, eax ... you get the gist, it doesnt execute as C, but as binary code, the key difference between a programmer and a HACKER!!!





| Best Sellers Rank | 24,657 in Books ( See Top 100 in Books ) 15 in Computer Information Systems 58 in Web Administration 74 in Computing & Internet Programming |
| Customer reviews | 4.6 4.6 out of 5 stars (1,516) |
| Dimensions | 18.11 x 2.54 x 23.5 cm |
| Edition | 2nd ed. |
| ISBN-10 | 1593271441 |
| ISBN-13 | 978-1593271442 |
| Item weight | 805 g |
| Language | English |
| Print length | 480 pages |
| Publication date | 28 Jan. 2008 |
| Publisher | No Starch Press |
G**A
Landmark on the genre
This book is like no other book in its field/segment/genre whatever you want to call it, this book won't "dummy" guide you through already made up stuff, that will turn you into a BOT. This book lays ground and rules to think and develop your skills outside of what you have been taught, it teaches you in a way that will let you evolve further without the book, and in no time you will be developing your own exploits, this book would be only worth for its programming side, it is that good. It comes with a a linux distro with some tools you can use, I have decided to use my own linux distro, but further in the book, it is advised to use the one provided by the book, because, some exploits have already been patched in later distributions, and all of the exploits and tools work on the one provided by the book. Also the package was adequate and it came in excellent condition. Absolutely recommended, although not recommended for someone with very little computer knowledge, or someone that have never written a line of code before, if that is your case this will be very difficult to pick up.
D**N
Very interesting
Dont be expecting to hack your mates facebook account, facebook has very advanced security, this book will show you the kind of exploits like the recnt heartbleed vulnerability, it realy gets down to the bits and bytes and focuses on C and Assembly language. Extremely interesting and the information will certainly aid you as a penetration tester, youll learn all sorts or techniques to take advantage of overlooked 'mistakes' in the code written by apparently 'good' programmers, this teaches you to be better than them, it teaches you that a program that is executed that was written in C does no contain IF statements and FOR statements and all that, it contains 1101011101101, or translation to assembly, things like mov ecx, ebx add eax, ecx sub edx, eax ... you get the gist, it doesnt execute as C, but as binary code, the key difference between a programmer and a HACKER!!!
J**N
Excellent introduction
The techniques themseves and the systems at which they are targeted are (largely) long gone, but it is a great introduction to the basic techniques. For those worried about the fact that the CD is out of date, I found it was straightforward to get hold online and upload the required software (VirtualBox and the book code) at no cost.
A**R
Dealing with assembly in the first chapter felt like being thrown in the deep end
I only have a basic understanding of computing/programming so I found this book a little hard to read. Dealing with assembly in the first chapter felt like being thrown in the deep end. What's covered in the book is excellent though. Instead of getting you to remeber a few "Magic Tricks" you get a working understanding of what you are doing and how computers work. This book put me way ahead of my class mates at Uni. The only thing I will say is the information is very dense. Jon teaches complex ideas in a very condescend way. My head feels like it will explode if I try to read too much of it in one sitting.
Y**!
Fantastic,
Easy steps to follow to "get the gist" of the point, first time, every time. No time wasting chapters. You won't need to be an expert programmer to get maximum benefit from it - even as a novice it has a great impact, due to its clean and clear instruction.
C**S
The bible on the subject.
If you want to learn the subject of exploitation this is a must-have. Not an easy read for a new guy/girl to the field though. I would suggest at least being able to read and somewhat understand C/ASM code, it'll make things run smoother. I'll also make another suggestion, pick up a copy of shellcoder's handbook 2nd ed - great companions for reading up on the subject. Pick up this book and welcome to the next level.
J**S
If you're getting into modern hacking, this isn't the book for you!
The book is quite dated by now because technology advances so fast that it has left a lot of the techniques in this book behind. That said, the areas for assembly and reverse engineering early in the textbook are still quite strong. I would say it's 3 stars and nothing more, the contents can be quite wordy on occasion, but it would be a 4 star otherwise. It was the motivator for me to learn things on my own and build a solid understanding of assembly from what I knew prior.
S**E
Me smart now
Honestly just get it and find out
M**S
Il libro spiega molto bene i vari argomenti. Qualcuno potrebbe pensare che essendo il libro un po' datato non sia più utile. Ma non è così. Le tecniche che si utilizzano e le vulnerabilità sono le stesse e vengono spiegate molto bene. Consigliato a chiunque voglia imparare/approfondire gli argomenti che vengono spesso utilizzati nelle CTF.
E**T
It’s still a good book to read and with the time it’s become very clear to me
E**A
Excelente!!!!
Z**0
ハッカーの精神と基礎を学べる書籍である。 日本語版を購入後、良い本だったので原本も 購入した。内容も非常に濃くて本気で ハッカーになろうとするなら是非読むべき本 だと思う。この本を完全に理解出来たらハッカーの中級者くらいになれる。 自分は日本語版を一度読んでから英語版を読むことでより深く理解できた。 注意点としては日本語版に比べて薄い分、 大きいので持ち歩きには日本語版の方が良いと思った。もし第3版が出たら買う予定である。
A**X
Esta escrito en inglés pero tiene comprensión fácil aunque no seas bilingüe. Empieza desde lo más sencillo hasta casos Complejos entendiendo el lenguaje C desde sus inicios, y como se estructura los sistemas operativos desde su núcleo. Recomendable.
Trustpilot
Hace 3 semanas
Hace 2 semanas