The second edition of
Hacking: The Art of Exploitation is more comprehensive than its predecessor, building upon and expanding the original content. For instance, while shellcoding and exploitation were part of the
Programming chapter in the first edition, they have been split into their own dedicated sections in the second edition. With the addition of material on countermeasures, the second edition also explores defensive tactics, which is a valuable addition. Below are the chapters: •
0x100 Introduction: This chapter introduces the reader to the nature of hacking, which the author believes is often terribly misunderstood, while also providing a brief overview of hacking history. •
0x200 Programming: This chapter covers
control structures and other basic aspects of programming. •
0x300 Exploitation: This chapter covers exploit techniques such as
memory corruption,
buffer overflows and
format strings, especially using
Perl and
Bash shellcode. •
0x400 Networking: This chapter provides an in-depth look at computer networking, similar to the first edition, but expands on it with additional information. Particularly noteworthy is the addition of a chapter on
sockets. •
0x500 Shellcode: Shellcode is a custom code written by a hacker for execution upon gaining control over a program. •
0x600 Countermeasures: This part of the book is about having defenses and
intrusion prevention systems to stop known hacking exploits. •
0x700 Cryptology: This chapter covers the same information as the first edition but includes some minor adjustments and code additions. •
0x800 Conclusion: This chapter reflects on hacking as a whole, presenting it essentially as a practice of curiosity and invention when non-malicious, and discusses its benefits to society while acknowledging the presence of bad actors. ==See also==