Hacking: the Art of Exploitation
Hacking: the Art of Exploitation

Author: Jon Erickson
Publisher: No Starch Press, 2008
Pages: 488
ISBN: 978-1593271442
Aimed at: Hackers
Rating: 3
Pros: Some practical advice on using programming flaws and hence how to avoid them
Cons: A lot of irrelevant material included
Reviewed by: Harry Fairhead


Books on hacking all seem to suffer from a common fault and this one is no exception. The fault in question is trying to cater for the complete beginner while dealing with material that is far too difficult.

Author: Jon Erickson
Publisher: No Starch Press, 2008
Pages: 488
ISBN: 978-1593271442
Aimed at: Hackers
Rating: 3
Pros: Some practical advice on using programming flaws and hence how to avoid them
Cons: A lot of irrelevant material included
Reviewed by: Harry Fairhead

Books on hacking all seem to suffer from a common fault and this one is no exception. The fault in question is trying to cater for the complete beginner while dealing with material that is far too difficult for the self same beginner. The reason for this fault seems to be the desire to latch onto the enthusiasm, or supposed enthusiasm, for hacking that the young, innocent and impressionable might have.

This is silly and misguided as hacking is a serious business that takes a lot of top grade knowledge before you can even begin. Rather than trying to explain the basic concepts of programming this book would be better off assuming them and telling any reader who hasn't got them to come back later.

If you are interested in hacking techniques that go beyond the social engineering approach of tricking people into revealing their passwords or using trojans then this might well be a book for you. However it's heavily into Intel architecture assembler, Linux and, in particular, the C programming language.

The book starts off with a discussion of how to exploit overflow bugs. If you can make an application overflow its stack then you can get it to run a program of your design. Similarly, but more difficult, are heap overflows and C-style format string errors. This is the most interesting part of the book, but once you have even the vaguest hint of the idea it's obvious what you have to do and how you could elaborate it to make it better. If these ideas are new then you will find yourself constantly saying "of course".

From this point the book is all down hill. We have chapters dealing with network hacking, cryptography and wireless network hacks. Much of this part of the book is very well-known and available information. There is also a good deal of unnecessary theoretical speculation on quantum cryptography. This, and the over-long listings of outputs, gives the impression that padding was necessary to reach the final size of this book. If the extraneous material were cut and the ideas presented in a concise form you would probably have one or two magazine articles that would make good reading.

So for the few nuggets of information that it contains, this is a good book but it is it worth the price? Probably not.

Banner


Lauren Ipsum

Author: Carlos Bueno
Publisher: No Starch Press
Pages: 196
ISBN: 9781593275747
Print: 1593275749
Kindle: B00QL616IC
Audience: Children, parents and teachers
Rating: 4
Reviewer: Janet Swift

 

This adventure story follows a young girl through “a land where logic and computer science come t [ ... ]



The Java Tutorial 6th Ed

Author: Raymond Gallardo, Scott Hommel, Sowmya Kannan and Joni Gordon
Publisher: Addison-Wesley
Pages:864
ISBN:  978-0134034089
Print:0134034082
Kindle:B00QIUP56U
Audience: Intended for Java beginners, but you need to have some programming background
Rating: 3
Reviewer: Alex Armstrong

 [ ... ]


More Reviews

Last Updated ( Tuesday, 09 March 2010 )
 
 

   
Banner
RSS feed of book reviews only
I Programmer Book Reviews
RSS feed of all content
I Programmer Book Reviews
Copyright © 2017 i-programmer.info. All Rights Reserved.
Joomla! is Free Software released under the GNU/GPL License.