
This book is code intensive and if you don't have a programming background – preferably in Linux "C" – then this book may be of limited value. I just want to warn you that the introductions might be above the true beginner's head. It's not that I don't like the author's introductions – I do. Think of it as Kernighan and Ritchie in 100 pages.Įrickson covers other introductory topics in a hurry, such as his network sockets description in the Networking section (Chapter 4), and his "Crash Course in Signals" in the Countermeasures section (Chapter 6). In one chapter, Erickson takes us from basic Control Structures to Function Pointers. I can no longer do that because the programming chapter is now an "Expanded introduction to fundamental programming concepts for beginners." But it's like no introduction I've ever seen. In my first review, I recommended this book for the programming chapter alone. Erickson also bundles the source in a CD included with the book, but more on that later. At the publisher's web site, you can compare the first and second editions of the book view excerpts from the Exploitation, Networking, and Countermeasures chapters and download the book's source. In my reviews, I typically like to compare the differences between editions. In 2004, I reviewed the book's first edition. By writing Hacking: The Art of Exploitation, Jon Erickson proves his hat color is "mother of pearl." Don't let the title mislead you: Erickson isn't exploiting or vandalizing – he's instructing. Members of the Hacking world are known by the color of their hat – white for good, black for bad, and gray for those who aren't too sure.
