Hacking: The Art of Exploitation

by
Format: Trade Paper
Pub. Date: 2003-11-01
Publisher(s): No Starch Press
  • Free Shipping Icon

    This Item Qualifies for Free Shipping!*

    *Excludes marketplace orders.

List Price: $41.95

Rent Book

Select for Price
There was a problem. Please try again later.

New Book

We're Sorry
Sold Out

Used Book

We're Sorry
Sold Out

eBook

We're Sorry
Not Available

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

Emphasizing a true understanding of the techniques as opposed to just breaking the rules, the author helps readers determine which areas are prone to attack and why. Unlike other so-called hacking guides, this book does not gloss over technical details, and includes detailed sections on stack-based overflows, heap based overflows, format string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

Author Biography

Jon Erickson has a formal education in computer science and speaks frequently at computer security conferences around the world. He currently works as a cryptologist and security specialist in Northern California

Table of Contents

Introductionp. 1
Programming
What Is Programming?p. 8
Program Exploitationp. 11
Generalized Exploit Techniquesp. 14
Multi-User File Permissionsp. 15
Memoryp. 16
Memory Declarationp. 17
Null Byte Terminationp. 18
Program Memory Segmentationp. 18
Buffer Overflowsp. 22
Stack-Based Overflowsp. 23
Exploiting Without Exploit Codep. 27
Using the Environmentp. 31
Heap- and bss-Based Overflowsp. 41
A Basic Heap-Based Overflowp. 41
Overflowing Function Pointersp. 46
Format Stringsp. 54
Format Strings and printf()p. 54
The Format-String Vulnerabilityp. 59
Reading from Arbitrary Memory Addressesp. 61
Writing to Arbitrary Memory Addressesp. 62
Direct Parameter Accessp. 71
Detours with dtorsp. 74
Overwriting the Global Offset Tablep. 80
Writing Shellcodep. 84
Common Assembly Instructionsp. 84
Linux System Callsp. 85
Hello, World!p. 87
Shell-Spawning Codep. 90
Avoiding Using Other Segmentsp. 92
Removing Null Bytesp. 94
Even Smaller Shellcode Using the Stackp. 98
Printable ASCII Instructionsp. 101
Polymorphic Shellcodep. 102
ASCII Printable Polymorphic Shellcodep. 103
Dissemblerp. 118
Returning into libcp. 129
Returning into system()p. 130
Chaining Return into libc Callsp. 132
Using a Wrapperp. 133
Writing Nulls with Return into libcp. 134
Writing Multiple Words with a Single Callp. 136
Networking
What Is Networking?p. 139
OSI Modelp. 140
Interesting Layers in Detailp. 142
Network Layerp. 142
Transport Layerp. 143
Data-Link Layerp. 145
Network Sniffingp. 146
Active Sniffingp. 149
TCP/IP Hijackingp. 156
RST Hijackingp. 157
Denial of Servicep. 160
The Ping of Deathp. 160
Teardropp. 161
Ping Floodingp. 161
Amplification Attacksp. 161
Distributed DoS Floodingp. 162
SYN Floodingp. 162
Port Scanningp. 162
Stealth SYN Scanp. 163
FIN, X-mas, and Null Scansp. 163
Spoofing Decoysp. 163
Idle Scanningp. 163
Proactive Defense (Shroud)p. 165
Cryptology
Information Theoryp. 174
Unconditional Securityp. 174
One-Time Padsp. 175
Quantum Key Distributionp. 175
Computational Securityp. 176
Algorithmic Runtimep. 177
Asymptotic Notationp. 178
Symmetric Encryptionp. 178
Lov Grover's Quantum Search Algorithmp. 179
Asymmetric Encryptionp. 180
RSAp. 180
Peter Shor's Quantum Factoring Algorithmp. 184
Hybrid Ciphersp. 185
Man-in-the-Middle Attacksp. 186
Differing SSH Protocol Host Fingerprintsp. 189
Fuzzy Fingerprintsp. 192
Password Crackingp. 196
Dictionary Attacksp. 197
Exhaustive Brute-Force Attacksp. 199
Hash Lookup Tablep. 200
Password Probability Matrixp. 201
Wireless 802.11 b Encryptionp. 211
Wired Equivalent Privacy (WEP)p. 212
RC4 Stream Cipherp. 213
WEP Attacksp. 214
Offline Brute-Force Attacksp. 214
Keystream Reusep. 215
IV-Based Decryption Dictionary Tablesp. 216
IP Redirectionp. 216
Fluhrer, Mantin, and Shamir (FMS) Attackp. 217
Conclusion
Referencesp. 230
Indexp. 233
Table of Contents provided by Ingram. All Rights Reserved.

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.