$64.99$64.99
Delivery Wednesday, December 4
Ships from: Amazon Sold by: Atasoys
$11.92$11.92
Delivery Wednesday, December 4
Ships from: Amazon Sold by: Shakespeare Book House
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Follow the authors
OK
Exploiting Software: How to Break Code 1st Edition
Purchase options and add-ons
**Foreword by Avi Rubin. How does software break? How do attackers make software break on purpose? Why are firewalls, intrusion detection systems, and antivirus software not keeping out the bad guys? What tools can be used to break software? This book provides the answers. This book is studded with examples of real attacks, attack patterns, tools, and techniques used by bad guys to break software. If you want to protect your software from attack, you must first learn how real attacks are really carried out. Learn about: Why software exploit will continue to be a serious problem; When network security mechanisms do not work; Attack patterns; Reverse engineering; Classic attacks against server software; Surprising attacks against client software; Techniques for crafting malicious input; The technical details of buffer overflows; and Rootkits. This information needs to be understood and digested by security professionals so that they know the magnitude of the problem and they can begin to address it properly. Today, all developers should be security-minded. The knowledge here will arm you with a real understanding of the software security problem.
- ISBN-100201786958
- ISBN-13978-0201786958
- Edition1st
- Publication dateFebruary 17, 2004
- LanguageEnglish
- Dimensions9.26 x 7.1 x 1.24 inches
- Print length512 pages
Frequently bought together
Similar items that may deliver to you quickly
- Malware Reverse Engineering: Cracking The CodeRob BotwrightPaperback$6.99 shippingOnly 4 left in stock - order soon.
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on AmazonCustomers say
Customers find the book relevant and educational. They say it includes great example code that helps explain concepts. Readers also mention the book is worth the price.
AI-generated from the text of customer reviews
Customers find the book profoundly educational and highly technical. They say it includes great example code that helps explain concepts.
"It’s an old (by Infosec standards) book. But it’s still relevant. I lost my original copy when we moved...." Read more
"...I highly recommend it. Highly technical, profoundly educational... relevant, intelligently written... just a great book. Buy it." Read more
"...The book includes some great example code very helpful for explaining the concepts and as a starting point for exploit development." Read more
Customers find the book worthwhile and well worth the price.
"...Bought a new copy just recently to keep around as a reference. Worthwhile book." Read more
"...does deliver in a concise, easy to read format that makes the book a rewarding read." Read more
"...profoundly educational... relevant, intelligently written... just a great book. Buy it." Read more
-
Top reviews
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
Firewalls, intrusion detection systems, content filters and anti-virus solutions are all reactive technologies, and as a result, they fail to address the primary cause of security vulnerabilities.
This root cause is bad software. Viruses, worms and hackers exploit vulnerabilities in the design and logic of software applications to compromise, destroy and otherwise take control of important information. Once you accept this fact, you'll realize that the only path to good security is to write better code.
`Exploiting Software - How to Break Code' is a book that fires up the hacker in me. It does not aim to teach you about the latest scanning tool, instead, it teaches you how to find and exploit vulnerabilities in systems. While many of the ideas in the book (such as the omnipresent buffer overflow) are not new, there is simply no literary comparison to the treatment given to them in this book.
Application security is one of the highest regarded and specialized technical services in the security industry, and thus, finding people (let alone books) that delve in-depth into the topic is rare and refreshing. The first day I used this book, I was on an application security project. The target application was a distributed database application running on SQL server with a web front-end.
I happened to have this book along with me, and while reading through it, the section on equivalent requests was something I hadn't tried - sure enough, 20 minutes later I had full control of the application and a very good impression of this book.
I particularly like the conceptual sections of this book, especially their idea of `attack patterns' - generic scenarios that often lead to compromise in systems. A thorough study of all these attack patterns will leave you a much better analyst than when you started out, and it definitely pays off when it comes to testing.
The book is also chock-a-block full of code, something that other books don't have the guts to do. Better yet, we're not talking about `hello world' stuff here, while reading the excellent chapter on root kits I finally realized that the device driver code I was trying out was way over my head. That's something you like to find, because it gives you something to learn.
The art of reverse engineering, disassembly, writing IDA-Pro plugins, black / white and grey-box techniques, advanced payload creation on multiple architectures - this book has it all. The only thing I can possibly say against it is that this it caters to a niche audience.
If you're not a coder or seriously into security however, large parts of the book may be inaccessible to you. However if you're a hacker, security tester or application developer and you don't own a copy of this book, you're not reaching your full potential.