BookOdyssey

Hacking by Jon Erickson


Listen Later

This text provides a comprehensive technical guide to the world of low-level programming and system exploitation. It bridges the gap between software development and hacking by detailing how C code is translated into x86 assembly and executed by the CPU. Readers are introduced to critical security vulnerabilities, such as buffer overflows, format string errors, and network protocol hijacking. Beyond offensive techniques, the source covers cryptographic principles like RSA and the practical implementation of network sniffers and shellcode. Ultimately, it portrays hacking as a form of creative problem-solving that leverages the internal logic of computers to bypass intended security constraints.

...more
View all episodesView all episodes
Download on the App Store

BookOdysseyBy Book Odyssey - Admin