Shop top categories that ship internationally
Buy new:
$64.99
Delivery Wednesday, December 4
Ships from: Amazon
Sold by: Atasoys
$64.99
FREE International Returns
No Import Charges & $14.45 Shipping to Japan Details

Shipping & Fee Details

Price $64.99
AmazonGlobal Shipping $14.45
Estimated Import Charges $0.00
Total $79.44

Delivery Wednesday, December 4. Order within 15 hrs 7 mins
Or fastest delivery November 29 - December 2
Only 1 left in stock - order soon.
$$64.99 () Includes selected options. Includes initial monthly payment and selected options. Details
Price
Subtotal
$$64.99
Subtotal
Initial payment breakdown
Shipping cost, delivery date, and order total (including tax) shown at checkout.
Ships from
Amazon
Ships from
Amazon
Sold by
Sold by
Returns
Returnable until Jan 31, 2025
Returnable until Jan 31, 2025
For the 2024 holiday season, eligible items purchased between November 1 and December 31, 2024 can be returned until January 31, 2025.
Returns
Returnable until Jan 31, 2025
For the 2024 holiday season, eligible items purchased between November 1 and December 31, 2024 can be returned until January 31, 2025.
Payment
Secure transaction
Your transaction is secure
We work hard to protect your security and privacy. Our payment security system encrypts your information during transmission. We don’t share your credit card details with third-party sellers, and we don’t sell your information to others. Learn more
Payment
Secure transaction
We work hard to protect your security and privacy. Our payment security system encrypts your information during transmission. We don’t share your credit card details with third-party sellers, and we don’t sell your information to others. Learn more
$11.92
FREE International Returns
Item in acceptable condition including possible liquid damage. As well answers may be filled in. May be missing DVDs, CDs, Access code, etc. Item in acceptable condition including possible liquid damage. As well answers may be filled in. May be missing DVDs, CDs, Access code, etc. See less
Delivery Wednesday, December 4
Or fastest delivery Tuesday, December 3. Order within 4 hrs 52 mins
Only 1 left in stock - order soon.
$$64.99 () Includes selected options. Includes initial monthly payment and selected options. Details
Price
Subtotal
$$64.99
Subtotal
Initial payment breakdown
Shipping cost, delivery date, and order total (including tax) shown at checkout.
Access codes and supplements are not guaranteed with used items.
Added to

Sorry, there was a problem.

There was an error retrieving your Wish Lists. Please try again.

Sorry, there was a problem.

List unavailable.
Other sellers on Amazon
Kindle app logo image

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.

Read instantly on your browser with Kindle for Web.

Using your mobile phone camera - scan the code below and download the Kindle app.

QR code to download the Kindle App

Follow the authors

Something went wrong. Please try your request again later.

Exploiting Software: How to Break Code 1st Edition

4.5 4.5 out of 5 stars 42 ratings

{"desktop_buybox_group_1":[{"displayPrice":"$64.99","priceAmount":64.99,"currencySymbol":"$","integerValue":"64","decimalSeparator":".","fractionalValue":"99","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"An8CGC9Q6ZIYGvNsbn0dWT5BDm9%2BvfuJO2wfTBHaESwHVS8UnwgAvOx%2BSBudXzGRSis0S345A2m5RGeK8C1mHxyoUAl%2BWRiP8hHu5Q%2FPaTH8wqMLtZOIrVkcBYL4pvCYsU0deroNFpfISZohMslT%2F%2FOLaUAQ5qNojWnQdws5eO2712Elfd9CammZ7ZkhC01B","locale":"en-US","buyingOptionType":"NEW","aapiBuyingOptionIndex":0}, {"displayPrice":"$11.92","priceAmount":11.92,"currencySymbol":"$","integerValue":"11","decimalSeparator":".","fractionalValue":"92","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"An8CGC9Q6ZIYGvNsbn0dWT5BDm9%2BvfuJRNJP%2F68dfFU0X7ozpja224l9uiUuQSGLTvL8zZfQ5BWhxiIrT4Sa15BkxV1FmEB%2BoLn9LhB5ThREtQSzEYv45b%2BShReet123xZ7%2FzG09Ynzbkh%2BoK2VgdvwRxMhoR1%2BIwm8WXNzWk7RtLfem6sd3VByDHjDqGuaX","locale":"en-US","buyingOptionType":"USED","aapiBuyingOptionIndex":1}]}

Purchase options and add-ons

**Foreword by Avi Rubin. How does software break? How do attackers make software break on purpose? Why are firewalls, intrusion detection systems, and antivirus software not keeping out the bad guys? What tools can be used to break software? This book provides the answers. This book is studded with examples of real attacks, attack patterns, tools, and techniques used by bad guys to break software. If you want to protect your software from attack, you must first learn how real attacks are really carried out. Learn about: Why software exploit will continue to be a serious problem; When network security mechanisms do not work; Attack patterns; Reverse engineering; Classic attacks against server software; Surprising attacks against client software; Techniques for crafting malicious input; The technical details of buffer overflows; and Rootkits. This information needs to be understood and digested by security professionals so that they know the magnitude of the problem and they can begin to address it properly. Today, all developers should be security-minded. The knowledge here will arm you with a real understanding of the software security problem.

Frequently bought together

This item: Exploiting Software: How to Break Code
$64.99
Get it as soon as Monday, Dec 2
Only 1 left in stock - order soon.
Sold by Atasoys and ships from Amazon Fulfillment.
+
$54.12
Only 15 left in stock - order soon.
Ships from and sold by Amazon.com.
Total price: $00
To see our price, add these items to your cart.
Details
Added to Cart
spCSRF_Treatment
One of these items ships sooner than the other.
Choose items to buy together.

Customer reviews

4.5 out of 5 stars
42 global ratings

Customers say

Customers find the book relevant and educational. They say it includes great example code that helps explain concepts. Readers also mention the book is worth the price.

AI-generated from the text of customer reviews

Select to learn more
3 customers mention "Relevance"3 positive0 negative

Customers find the book profoundly educational and highly technical. They say it includes great example code that helps explain concepts.

"It’s an old (by Infosec standards) book. But it’s still relevant. I lost my original copy when we moved...." Read more

"...I highly recommend it. Highly technical, profoundly educational... relevant, intelligently written... just a great book. Buy it." Read more

"...The book includes some great example code very helpful for explaining the concepts and as a starting point for exploit development." Read more

3 customers mention "Value for money"3 positive0 negative

Customers find the book worthwhile and well worth the price.

"...Bought a new copy just recently to keep around as a reference. Worthwhile book." Read more

"...does deliver in a concise, easy to read format that makes the book a rewarding read." Read more

"...profoundly educational... relevant, intelligently written... just a great book. Buy it." Read more

Top reviews from the United States

Reviewed in the United States on January 14, 2022
It’s an old (by Infosec standards) book. But it’s still relevant. I lost my original copy when we moved. Bought a new copy just recently to keep around as a reference. Worthwhile book.
One person found this helpful
Report
Reviewed in the United States on June 9, 2008
This book is a great review of software security and deserves to be on any security professional's bookshelf. The chapter on Rootkits (Chapter 8) is well worth the price of the book. While the book isn't too long (at just over 400 pages) it does deliver in a concise, easy to read format that makes the book a rewarding read.
One person found this helpful
Report
Reviewed in the United States on February 22, 2014
I work in IT, for 22 years as a computer programmer ("software engineer") and now in IT Security as an Application Security Engineer (focusing on Web applications, thanks..) so this book is near and dear to me in both capacities. I highly recommend it. Highly technical, profoundly educational... relevant, intelligently written... just a great book. Buy it.
Reviewed in the United States on June 6, 2020
Still in chapter one, but so far so good! I'll come back and update my review once I get through the book. Thx.
One person found this helpful
Report
Reviewed in the United States on June 16, 2019
Excellent!! Good Deal, Very Fast Shipping. 5 Stars Seller. Thank You Very Much.
Reviewed in the United States on August 19, 2005
The one major strength of this book, from a computer science viewpoint, is its emphasis on "attack patterns". This systemization of these issues really differentiates this book from many of its competitors (which tend to be either the latest 500 hacks or descriptions of standards). Put simply CS is the study of algorithms, and this book fits nicely into that tradition.
10 people found this helpful
Report
Reviewed in the United States on April 18, 2010
Exploiting Software is a great reference both for reverse engineering beginners and for coders who have done some reversing. The book includes some great example code very helpful for explaining the concepts and as a starting point for exploit development.
One person found this helpful
Report
Reviewed in the United States on April 20, 2005
Anyone who's been in network security long enough will tell you that the current state of products and `solutions' to security problems are woefully inadequate.

Firewalls, intrusion detection systems, content filters and anti-virus solutions are all reactive technologies, and as a result, they fail to address the primary cause of security vulnerabilities.

This root cause is bad software. Viruses, worms and hackers exploit vulnerabilities in the design and logic of software applications to compromise, destroy and otherwise take control of important information. Once you accept this fact, you'll realize that the only path to good security is to write better code.

`Exploiting Software - How to Break Code' is a book that fires up the hacker in me. It does not aim to teach you about the latest scanning tool, instead, it teaches you how to find and exploit vulnerabilities in systems. While many of the ideas in the book (such as the omnipresent buffer overflow) are not new, there is simply no literary comparison to the treatment given to them in this book.

Application security is one of the highest regarded and specialized technical services in the security industry, and thus, finding people (let alone books) that delve in-depth into the topic is rare and refreshing. The first day I used this book, I was on an application security project. The target application was a distributed database application running on SQL server with a web front-end.

I happened to have this book along with me, and while reading through it, the section on equivalent requests was something I hadn't tried - sure enough, 20 minutes later I had full control of the application and a very good impression of this book.

I particularly like the conceptual sections of this book, especially their idea of `attack patterns' - generic scenarios that often lead to compromise in systems. A thorough study of all these attack patterns will leave you a much better analyst than when you started out, and it definitely pays off when it comes to testing.

The book is also chock-a-block full of code, something that other books don't have the guts to do. Better yet, we're not talking about `hello world' stuff here, while reading the excellent chapter on root kits I finally realized that the device driver code I was trying out was way over my head. That's something you like to find, because it gives you something to learn.

The art of reverse engineering, disassembly, writing IDA-Pro plugins, black / white and grey-box techniques, advanced payload creation on multiple architectures - this book has it all. The only thing I can possibly say against it is that this it caters to a niche audience.

If you're not a coder or seriously into security however, large parts of the book may be inaccessible to you. However if you're a hacker, security tester or application developer and you don't own a copy of this book, you're not reaching your full potential.
21 people found this helpful
Report

Top reviews from other countries

Translate all reviews to English
lv
5.0 out of 5 stars Ottimo libro
Reviewed in Italy on September 12, 2013
Sicuramente un libro non per tutti, ma solo per esperti del settore, però è molto utile per studiare la sicurezza