Refer a friend and get % off! They'll get % off too.

Hacking: The Art of Exploitation, 2nd Edition

This book will teach you how to:
Program computers using C, assembly language, and shell scripts

Corrupt system memory to run arbitrary code using buffer overflows and format strings

Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening

Outsmart common security measures like nonexecutable stacks and intrusion detection systems

Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence

Redirect network traffic, conceal open ports, and hijack TCP connections

Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix

You will get a PDF (4MB) file

$ 9.00

$ 9.00

To be able to receive payments, please enter your payment details.

Discount has been applied.

Added to cart