Facebook
Diventa fan su Facebook
Diventa fan su Facebook

Clicca qui:

share
Raccomandaci
Spedizione in meno di 24 oreUn mese gratuito
trustedshops logo header

Hacking - Art of Exploitation

This book is perfect for everyone who dreams of becoming a hacker.

  • This book is very detailed instruction on hacking. Come with Linux Live CD to test the hacks without harming your own system.

Hacking - Art of Exploitation

This book is perfect for everyone who dreams of becoming a hacker.

articolo n. 4599

combinazione impossibile
Deine Auswahl ist leider nicht verfügbar. Wir haben daher Deine Auswahl angepasst.
Prodotto non disponibile
Lo stato di consegna di questo articolo non è chiaro. Un motivo potrebbe essere che il produttore ha interrotto la produzione. Attualmente non puoi ordinarlo.
39,95 € *

* più IVA incl. Spese di spedizione

Descrizione: Hacking - Art of Exploitation

  • This book is very detailed instruction on hacking. Come with Linux Live CD to test the hacks without harming your own system.

Nota
La descrizione di questo prodotto è disponibile solo in inglese. Stiamo lavorando alla traduzione, ci scusiamo per l'inconveniente.
This book is perfect for everyone who dreams of becoming a hacker: Rather than merely showing you how to run existing exploits, this book explains how mysterious hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, the book introduces the fundamentals of C programming from a hacker's perspective.

In detail, this book will teach you how to:

- Program computers using C, assembly language, and shell scripts.

- Corrupt system memory to run arbitrary code using buffer overflows and format strings.

- Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening.

- Outsmart common security measures like nonexecutable stacks and intrusion detection systems.

- Gain access to a remote server using port-binding or connect-back shell code, and alter a server's logging behavior to hide your presence.

- Redirect network traffic, conceal open ports, and hijack TCP connections.

- Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix.

Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, this book will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Additionally, a Linux Live CD is included so that you can try everything in the book without harming your own system.