Any comments or Recommendation on These Books ?

Viewing 5 reply threads
  • Author
    • #2259

      Hello EH-NetER,

      I’m planning on Buying These Two Books:

      Hacking: The Art of Exploitation, 2nd Edition

      The Shellcoder’s Handbook: Discovering and Exploiting Security Holes

      any Thoughts, comments or Recommendation.


    • #17175

      the first book i have read the first edition three years ago, it is practical, and fluff free, i have already subscribed to the 2nd edition through SafariOnline, so far it looks the same as the original edition with more exercises, and updated material. the Author uses hex numbers for numbering chapters, and sections  8)

      I have the shellcoder’s handbook, however i have not read it yet, skimmed through it when i wanted to learn more about bufferoverflows, it examins it deep both in windows, and Linux. it came highly reccomened by members in the security team where i work.

    • #17176

      Good book for research . Please add these two more
      The Art of Computer Virus Research and Defense … by Peter Szor
      Malware: Fighting Malicious Code … by Ed Skoudis


    • #17177

      Okay, I bought those books:
      Hacking: The Art of Exploitation, 2nd Edition
      The Shellcoder’s Handbook: Discovering and Exploiting Security Holes
      Malware: Fighting Malicious Code

      and I’m expecting them to arrive in few days.

    • #17178

      I know you have already bought the books, but I figured I’d share anyway.  I have looked over Hacking: The art of Exploitation and it looked good.  I’ve had some other people recommend it to me as well.  I just got the Shell Coders Handbook and have made it through the first 2 chapters.  It is incredibly in depth, with great examples that you can follow along with.  It is however, one of those “makes your brain hurt” books if you haven’t done assembly and OS stuff in a while.  I’m really glad that I have it.. and I’m also really glad that I don’t have time to sit down and read it for long periods of time, otherwise I might pull something 🙂  Other stuff that has helped me a lot lately that are more free resources, are and looking at some of the code to metasploit.  I “borrowed” the shell code from metasploit for use in another languages exploit and their method of putting forth the exploit itself and the stuff you’re going to be injecting is really informative.  Also sans has some great webcasts that are archived, for instance after you’ll be all “I know kung-fu” and someone else will be all “show me”.  Anyway, hope this helps someone 🙂

    • #17179

      will, thanks for stopping by and telling your opinion it helped 🙂

Viewing 5 reply threads
  • You must be logged in to reply to this topic.

Copyright ©2021 Caendra, Inc.

Contact Us

Thoughts, suggestions, issues? Send us an email, and we'll get back to you.


Sign in with Caendra

Forgot password?Sign up

Forgot your details?