..Hacking:TheArtofExploitationbyJonEricksonISBN:1593270070NoStarchPress©2003(241pages)Thistextintroducesthespiritandtheoryofhackingaswellasthesciencebehinditall;italsoprovidessomecoretechniquesandtricksofhackingsoyoucanthinklikeahacker,writeyourownhacksorthwartpotentialsystemattacks.TableofContentsHacking?TheArtofExploitationPrefaceChapter1-0x100—IntroductionChapter2-0x200—ProgrammingChapter3-0x300—NETWORKINGChapter4-0x400—CryptologyChapter5-0x500—ConclusionIndexThisdocumentwascreatedbyanunregisteredChmMagic,pleasegotohttp://www.bisenter.comtoregisterit.Thanks.BackCoverHackingistheartofcreatingproblemsolving,whetherusedtofindanunconventionalsolutiontoadifficultproblemortoexploitholesinsloppyprogramming.Manypeoplecallthemselveshackers,butfewhavethestrongtechnicalfoundationthatahackerneedstobesuccessful.Hacking:TheArtofExploitationexplainsthingsthateveryrealhackershouldknow.Whilemanyhackingbooksshowyouhowtorunotherpeople’sexploitswithoutreallyexplainingthetechnicaldetails,Hacking:TheArtofExploitationintroducesyoutothespiritandtheoryofhackingaswellasthesciencebehinditall.Bylearningsomeofthecoretechniquesandclevertricksofhacking,youwillbegintounderstandthehackermindset.Onceyoulearntothinklikeahacker,youcanwriteyourownhacksandinnovatenewtechniques,oryoucanthwartpotentialattacksonyoursystem.InHacking:TheArtofExploitationyouwilllearnhowto:ExploitprogramsusingbufferoverflowsandformatstringsWriteyourownprintableASCIIpolymorphicshellcodeDefeatnon-executablestacksbyreturningintolibcRedirectnetworktraffic,concealopenports,andhijackTCPconnectionsCrackencrypted802.11bwirelesstrafficusingtheFMSattackIfyou’reseriousabouthacking,thisbookisforyou,nomatterwhichsideofthefenceyou’reon.AbouttheAuthorJonEricksonhasaformaleducationincomputerscienceandspeaksfrequentlyatcomputersecurityconferencesaroundtheworld.HecurrentlyworksasacryptologistandsecurityspecialistinNorthernCalifornia.ThisdocumentwascreatedbyanunregisteredChmMagic,pleasegotohttp://www.bisenter.comtoregisterit.Thank...