

#49023
Mentioned in 1 episodes
Hacking
The Art of Exploitation
Book • 2003
This book provides a detailed introduction to the techniques of exploitation and creative problem-solving methods in computer security.
It covers topics such as program exploitation (including buffer overflows and format strings), networking (including packet sniffing, connection hijacking, and port scanning), and cryptography (including symmetric and asymmetric encryption and quantum key distribution).
The book includes practical examples and a live CD with a Linux programming environment to help readers practice the techniques described.
It emphasizes hands-on learning and is designed to help readers understand the underlying logic behind various hacking attacks and how to defend against them.
It covers topics such as program exploitation (including buffer overflows and format strings), networking (including packet sniffing, connection hijacking, and port scanning), and cryptography (including symmetric and asymmetric encryption and quantum key distribution).
The book includes practical examples and a live CD with a Linux programming environment to help readers practice the techniques described.
It emphasizes hands-on learning and is designed to help readers understand the underlying logic behind various hacking attacks and how to defend against them.
Mentioned by
Mentioned in 1 episodes
Mentioned by Victor Poucheret as a book that gave him a hands-on approach with a live CD.

Finding criticals on well-tested targets - Victor “doomerhunter” Poucheret
Mentioned by ![undefined]()

, but she changed her mind about recommending it due to its outdated content.

Mia Z

Summer Recap: Phrack, Off-by-One, and RCEs