Full description not available
J**M
BAD and GOOD...you choose
This book has some really good explanations....but then has some really bad explanations. The ROP explanation is HORRIBLE...the author lists out for several pages the actual code and comments. This goes on for several long pages and then suddenly it ends and there is a conclusion paragraph and the reader can't help but feel overwhelmed and lost. Horrible. Want a good explanation read this: "Return Oriented Programming" by Saif El-Sherei.Also the author completely wastes space throughout the book by copying and pasting a lot of garbage about using Sulley- the same info in each chapter. I might also add that he is completely not using Sulley correctly....he talks about being a smart security researcher by utilizing a fuzzer and manual discovery to help maximize efforts. However, I found the authors examples to be a waste of time, only half using Sulley (to generate the fuzzing files) instead of using Sulley to actually replicate the crash and determine a lot of the information for him. Needless to say I am only halfway through the book and I am already disappointed - especially for this price.Save yourself the high price tag of this book and look at the table of contents and research all this yourself. TIP - look for whitepapers!
M**R
Waaaayyyyy too expensive.....
Seriously? $500? Half the book is stuff from his other books that cost $50 and the first several chapters are all stuff you can find for free on the net. Click the "View Inside" button and look at the Table of Contents....
P**E
Awesome book
Awesome book. Although I was skeptical initially about buying this one but this book covers all the basics of Stack and Heap overflows in Windows applications. I have been able to pick up a lot of new tricks and techniques that I did not know before reading this book. Overall a really good book for people who want to save money on courses that cost like 3-4k usually.
M**R
fuzzing to actual vulnerability exploitation aspect which is an important aspect especially for newbies like me. This book provi
'This book is definitely on par with some of the other hacking books out there. The author has taken extreme pain to explain the details of Windows stack and Use after free exploitation. I have been looking for a book that teach windows exploitation techniques for a while now. Although there are some books out there that give introduction to that topic, none of them seem to cover the detailed stack exploitation from reverse engg, fuzzing to actual vulnerability exploitation aspect which is an important aspect especially for newbies like me. This book provides a perfect tutorial from start to end of how someone can exploit windows applications. I like that the book also provides everything from VMware images to scripts required just as someone who would teach in a class. I think in comparison to paying lot of money for courses out there, I think this book is perfect for someone on a budget and who wants to learn advanced windows exploitation.'
Trustpilot
4 days ago
1 day ago