Hacking: The Art of Exploitation

by Jon Erickson

Cybersecurity

Book Details

Book Title

Hacking: The Art of Exploitation

Author

Jon Erickson

Publisher

No Starch Press

Publication Date

2008

ISBN

9781593271442

Number of Pages

223

Language

English

Format

PDF

File Size

1.792MB

Subject

Cybersecurity

Table of Contents

  • Table of Contents
  • BackCover
  • Hacking - The Art of Exploitation
  • Preface
  • Chapter 1: 0x100 - Introduction
  • Chapter 2: 0x200 - Programming
  • 0x210 What Is Programming?
  • 0x220 Program Exploitation
  • 0x230 Generalized Exploit Techniques
  • 0x240 Multi-User File Permissions
  • 0x250 Memory
  • 0x260 Buffer Overflows
  • 0x270 Stack-Based Overflows
  • 0x280 Heap-and bss-Based Overflows
  • 0x290 Format Strings
  • 0x2a0 Writing Shellcode
  • 0x2b0 Returning into libc
  • Chapter 3: 0x300 - NETWORKING
  • 0x320 Interesting Layers in Detail
  • 0x330 Network Sniffing
  • 0x340 TCP/IP Hijacking
  • 0x350 Denial of Service
  • 0x360 Port Scanning
  • Chapter 4: 0x400 - Cryptology
  • 0x410 Information Theory
  • 0x420 Algorithmic Runtime
  • 0x430 Symmetric Encryption
  • 0x440 Asymmetric Encryption
  • 0x450 Hybrid Ciphers
  • 0x460 Password Cracking
  • 0x470 Wireless 802.11b Encryption
  • 0x480 WEP Attacks
  • Chapter 5: 0x500 - Conclusion
  • Index