Exploiting Software: How to Break Code

Addison-Wesley has just released a new book entitled ‘Exploiting Software: How to Break Code’. This book is going to be released on Feb 20th and looks like a really very interesting book. Here’s more info on the book from the Addison-Wesley release I got.

Exploiting Software: How to Break Code

Greg Hoglund, Gary McGraw
Paperback: 512 pages
Publisher: Pearson Higher Education; (February 20, 2004)
ISBN: 0201786958

How does software break? How do attackers make software break on purpose? Why are firewalls, intrusion detection systems, and antivirus software not keeping out the bad guys? What tools can be used to break software? This book provides the answers.

Programs have a preponderance of guts, where the real fun happens. These guts can be very complex. Exploiting software usually requires some level of understanding of software guts. DOWNLOAD a PDF of chapter 3, “Reverse Engineering and Program Understanding”, to find out about the tools, concepts and assumptions behind reverse engineering, including how to write your own cracking tools.

This must-have book may shock you–and it will certainly educate you.Getting beyond the script kiddie treatment found in many hacking books, you will learn about

  • Why software exploit will continue to be a serious problem
  • When network security mechanisms do not work
  • Attack patterns
  • Reverse engineering
  • Classic attacks against server software
  • Surprising attacks against client software
  • Techniques for crafting malicious input
  • The technical details of buffer overflows
  • Rootkits

Check out the Book page for sample chapter at Addison-Wesley