Refer a friend and get % off! They'll get % off too.

Hacking: The Art of Exploitation, 2nd Edition

This book will teach you how to:
Program computers using C, assembly language, and shell scripts




Corrupt system memory to run arbitrary code using buffer overflows and format strings




Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening




Outsmart common security measures like nonexecutable stacks and intrusion detection systems




Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence




Redirect network traffic, conceal open ports, and hijack TCP connections




Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix

You will get a PDF (4MB) file

$ 9.00

$ 9.00

To be able to receive payments, please enter your payment details.

Discount has been applied.

Added to cart