Hacking The Art Of Exploitation Live Cd Mac

  1. The Art Of Hacking
  2. Hacking The Art Of Exploitation Live Cd Machines
  3. Hacking Live Cd

This repository contains the source code that comes from the book: Hacking The Art of Exploitation.

Notes

Jun 15, 2010  Has anyone read the book Hacking: The Art of Exploitation? I'm having trouble running the Live CD that came with it, so I tried to torrent it, burn it, then run it, but that didn't work either. And then I tried to run it via a virtual machine running ubuntu, but that. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Hacking: The Art of Exploitation cd. I bought Hacking: The Art of Exploitation but I didn't like the old Ubuntu. I'm thinking to use same cd files on ubuntu 32 bit. Is that a good idea? Save hide report. This thread is archived. Feb 04, 2008  Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective. How arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.The included LiveCD provides a complete Linux.

The VM that this code runs on is an Ubuntu-based Live Linux Distro. It contains all of the sourcecode and the code all compiles under GCC version 3.3.6.

It's also worth noting that much of the exploits won't work under GCC 4 with the buffer overflowdetection. Instead of stack-smashing and moving on, it will detect buffer overflows and seg faultwithout overflowing the buffers. (Using the VM lets you play with the exploits).

Related Links

  • get the live linux disc: downlooad here
  • http://www.amazon.com/Hacking-The-Art-Exploitation-Edition/dp/1593271441 - buy your own copy of the book
作者: Jon Erickson
出版社: No Starch Press
副标题: The Art of Exploitation, 2nd Edition
出版年: 2008-2-4
页数: 488
定价: USD 49.95
装帧: Paperback
ISBN: 9781593271442
9.3
5星68.4%
4星24.6%
3星3.5%

The Art Of Hacking


2星1.8%
1星1.8%
  • 加入购书单已在购书单

内容简介 · · · · · ·

While other books merely show how to run existing exploits, Hacking: The Art of Exploitation broke ground as the first book to explain how hacking and software exploits work and how readers could develop and implement their own. In the second edition, author Jon Erickson again uses practical examples to illustrate the most common computer security issues in three related fields...

While other books merely show how to run existing exploits, Hacking: The Art of Exploitation broke ground as the first book to explain how hacking and software exploits work and how readers could develop and implement their own. In the second edition, author Jon Erickson again uses practical examples to illustrate the most common computer security issues in three related fields: programming, networking and cryptography. All sections have been extensively updated and expanded, including a more thorough introduction to the complex, low-level workings of a computer. Readers can easily follow along with example code by booting the included live CD, which provides a Linux programming environment and all of its benefits without the hassle of installing a new operating system.

作者简介 · · · · · ·

Jon Erickson has a formal education in computer science and speaks frequently at computer security conferences around the world. He works as a cryptologist and security specialist in Northern California.

目录 · · · · · ·

Chapter 0x100: Introduction
Chapter 0x200: Programming
Chapter 0x300: Exploitation
Chapter 0x400: Networking
Chapter 0x500: Shellcode
Chapter 0x600: Countermeasures
· · · · · · (更多)

豆瓣成员常用的标签(共52个) · · · · · ·

喜欢读'Hacking'的人也喜欢的电子书 · · · · · ·

1.99元
18.00元

喜欢读'Hacking'的人也喜欢 · · · · · ·

The Shellcoder's Handbook
Violent Python
Data Structures and Algorithms in ...
The Web Application Hacker's Han...
Programming Massively Parallel Pr...
How Linux Works
Recommender Systems
Is Parallel Programming Hard, And...
Understanding the Linux Virtual Me...
Algorithms Illuminated

> 更多短评 12 条

无论是一部作品、一个人,还是一件事,都往往可以衍生出许多不同的话题。将这些话题细分出来,分别进行讨论,会有更多收获。
我要写书评

Hacking的书评 · · · · · · ( 全部 4 条 )

热门 / 最新 / 好友

Hacking The Art Of Exploitation Live Cd Machines

出版社的缺点与原书的优点

今天拿到手一看是中文版,本来是想买英文版的。。。。。。 似乎这个出版社很马虎,现在至少发现2个问题。 1,最重要的,原书配的光盘原作者说可以直接用光盘启动进ubuntu,但是这个出版社搞的不行,我在亚马逊上也看到有人反映这个情况。 ... (展开)
Umae未知出版社2009版

很好的书

这当然不是一本神奇的书^_^。 先说一下好的地方:本书附带了一个光盘,配置好了环境,便于新手练习。例子都可以执行。当然,要说明一下,随书附带的光盘一如既往地不可用,也是在电驴上另外下载的光盘才可以使用。 这本书虽然说是介绍漏洞挖掘的,但是主要针对... (展开)

解决启动光盘的问题

自带的光盘启动信息被抹掉了,可以从veryce上下载光盘,而且就是2nd版本的。 我昨天从首图借了光盘,对比发现内容和网上下载的一致,所以需要光盘的童鞋直接下载即可。 话说我的英文确实不怎么样,看了两章英文的,再看第一版的中文版,发现很多句子意思理解的不正确。 还是琢... (展开)
你猜我是谁未知出版社2009版
Hacking The Art Of Exploitation Live Cd Mac

Hacking Live Cd

糟蹋了这个名字

有一定基础的人还是看别的吧,真糟蹋了这个名字,里面东西,基础,太基础,现在啥玩意就喜欢用个xx之道。抱歉,你的评论太短了。抱歉,你的评论太短了。抱歉,你的评论太短了。抱歉,你的评论太短了。抱歉,你的评论太短了。 (展开)

> 更多书评 4篇