Ubuy
Explore
Added to Cart
empty_card_svg
Your shopping cart is emptyLets Change that !Continue Shopping
https://m.media-amazon.com/images/I/91UlU666haL._SL1500_.jpg
ubuy_authentic

Hacking: The Art of Exploitation, 2nd Edition 2nd Edition

Item #:239829
4.7 rating
Write a review

PKR 7797PKR 14985 You Save : 48%
0

This product is not Fulfilled by Ubuy and can take minimum 10 days in delivery. We might cancel the product from the order and refund you if any issue arise with the delivery of this product.
In Stock
left_quoteHacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques.right_quote

Product Details

    Features & Benefits

    • Learn the art of creative problem solving and exploiting holes in sloppy programming
    • Understand arcane hacking techniques and how they work
    • Includes a LiveCD with a Linux programming and debugging environment
    • Teaches programming in C, assembly language, and shell scripts
    • Covers topics such as buffer overflows, system memory corruption, and intrusion detection systems
    • Crack encrypted wireless traffic using the FMS attack and speed up brute force attacks using a password probability matrix

    Product Description

    Overview
    Have any Query?

    Customer Questions & Answers

    • Question : Do I need prior programming knowledge to understand this book?
      Answer : No, the book introduces the fundamentals of C programming from a hacker's perspective.
    • Question : Is the LiveCD provided with the book necessary to follow along with the examples?
      Answer : Yes, the LiveCD provides a complete Linux programming and debugging environment needed to follow along with the examples.
    • Question : Will this book teach me how to invent new exploits?
      Answer : Yes, the book teaches readers how to invent new exploits and hack creatively.
    • Question : Is programming experience required to understand this book?
      Answer : Yes, programming experience is definitely a plus. While the author starts from square one, it's recommended to have some knowledge of programming concepts and different number bases like binary and hex.
    • Question : Is the CD included with the book?
      Answer : No, the CD is a downloadable live CD that can be obtained from the website. It is not included physically with the book.
    • Question : Can the book be used without the CD?
      Answer : Some reviewers have found it difficult to follow the book without the CD for practical exercises. It is recommended to use the CD in a virtual machine environment.

    Customer Ratings

    4.7 out of 5
    197 customers ratings
    • 5 star
      79%
    • 4 star
      11%
    • 3 star
      7%
    • 2 star
      2%
    • 1 star
      1%

    Review this product

    Share your thoughts with other customers

    Hacking: The Art of Exploitation, 2nd Edition 2nd Edition

    Hacking: The Art of Exploitation, 2nd Edition is a book published in 2008 that focuses on low-level hacking techniques. The book is well-written and dives right into the subject matter. It requires programming experience, but not necessarily knowledge of Assembly or C. However, familiarity with different number bases like binary and hex is recommended. The book comes with a downloadable live CD that can be run on a virtual machine. While some customers received the book in good condition and found it very useful, others had issues with the missing CD or received damaged copies.

    Pros

    • Well-written book that dives right into the subject matter
    • Provides a hands-on approach to hacking with C code and GNU debugger
    • Explains concepts well and starts from square one
    • Comes with a downloadable live CD for practical exercises
    • Some customers received the book in excellent condition

    Cons

    • Outdated content
    • High price for a dated book with no CD
    • Some customers received damaged copies
    • CD not included with used copies

    Important Information

    1. Limitations : For products shipped internationally, please note that any manufacturer warranty may not be valid; manufacturer service options may not be available; product manuals, instructions, and safety warnings may not be in destination country languages; the products (and accompanying materials) may not be designed in accordance with destination country standards, specifications, and labeling requirements; and the products may not conform to destination country voltage and other electrical standards (requiring use of an adapter or converter if appropriate). The recipient is responsible for assuring that the product can be lawfully imported to the destination country. When ordering from Ubuy or its affiliates, the recipient is the importer of record and must comply with all laws and regulations of the destination country.
    2. Not all the products listed on Ubuy are for sale, as Ubuy is a global search engine. Products are subject to export/trade regulations.

    Hacking: The Art of Exploitation, 2nd Edition 2nd Edition

    View Cart & Checkout

    Stay Connected