Chapter 1. Software—The Root of the Problem
So you want to break software, leave it begging for mercy in RAM after it has relinquished all of its secrets and conjured up a shell for you. Hacking the machine is almost always about exploiting software. And more often than not, the machine is not even a standard computer.[1] Almost all modern systems share a common Achilles' heel in the form of software. This book shows you how software breaks and teaches you how to exploit software weakness in order to control the machine.
There are plenty of good books on network security out there. Bruce Schneier's Secrets and Lies [2000] provides a compelling nickel tour of the facilities, filled to the brim with excellent examples and wise insight. Hacking Exposed ...
Get Exploiting Software How to Break Code now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.