![]() | This article has multiple issues. Please help improve it or discuss these issues on the talk page . (Learn how and when to remove these messages)
|
Hacking: The Art of Exploitation ( ISBN 1-59327-007-0) is a book by Jon "Smibbs" Erickson about computer security and network security. [1] It was published by No Starch Press in 2003, [2] [3] with a second edition in 2008. [4] [5] All the examples in the book were developed, compiled, and tested on Gentoo Linux. The accompanying CD provides a Linux environment containing all the tools and examples referenced in the book.
Jon "Smibbs" Erickson worked in the field of computer security with a background in computer science. [6] As of 2011, he worked as a vulnerability researcher and computer security specialist in northern California. A bootable CD is included with the book which provides a Linux-based programming and debugging environment for the users.
The content of Exploiting (2003) moves between programming, networking, and cryptography. The book does not use any notable measure of real-world examples: discussions rarely bring up specific worms and exploits.
The computer programming portion of Hacking takes up over half of the book. This section goes into the development, design, construction, and testing of exploit code, and thus involves some basic assembly programming. The demonstrated attacks range from simple buffer overflows on the stack to techniques involving overwriting the Global Offset Table.
While Erickson discusses countermeasures such as a non-executable stack and how to evade them with return-to-libc attacks, he does not dive into deeper matters without known guaranteed exploits such as address space layout randomization. The book also does not cover the Openwall, GrSecurity, and PaX projects, or kernel exploits.
The networking segment of Hacking explains the basics of the OSI model and basic networking concepts, including packet sniffing, connection hijacking, denial of service, and port scanning.
The cryptology section of Hacking covers basic information theory, in addition to symmetric and asymmetric encryption. It winds out in cracking WEP utilizing the Fluhrer, Mantin, and Shamir attacks. Besides the basics, including man-in-the-middle attacks, dictionary attacks, and the use of John the Ripper; Hacking discusses quantum key distribution, Lov Grover's Quantum Search Algorithm, and Peter Shor's Quantum Factoring Algorithm, which are used for breaking RSA encryption using a very large quantum computer.
The front cover of Hacking shows the complete process: from reverse engineering to carrying out the attack, and developing an exploit for a program that is vulnerable to buffer overflow in its command-line arguments.
![]() | |
Author | Jon Erickson |
---|---|
Language | English (Second Edition) |
Series | Second Edition |
Genre | Computer Science |
Publisher | No Starch Press |
Publication date | February 2008 |
Publication place | United States (Original) |
Media type | Print Paperback |
Pages | 488 |
ISBN | 978-1593271442 |
The second edition of Hacking: The Art of Exploitation is more comprehensive than its predecessor, building upon and expanding the original content. For instance, while shellcoding and exploitation were part of the Programming chapter in the first edition, they have been split into their own dedicated sections in the second edition. With the addition of material on countermeasures, the second edition also explores defensive tactics, which is a valuable addition. Below are the chapters: