Buy new:
-61%
EUR21.64EUR21.64
EUR 8.93 delivery Friday, March 20
Ships from: Amazon Sold by: srwilson62
Save with Used - Good
EUR8.12EUR8.12
EUR 8.93 delivery Thursday, March 19
Ships from: Amazon Sold by: TFavio
Return this item for free
Free returns are available for the shipping address you chose. You can return the item for any reason in new and unused condition: no return shipping charges.
Learn more about free returns.- Go to your orders and start the return
- Select your preferred free shipping option
- Drop off and leave!
Sorry, there was a problem.
There was an error retrieving your Wish Lists. Please try again.Sorry, there was a problem.
List unavailable.
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Follow the authors
OK
Exploiting Software: How to Break Code 1st Edition
Purchase options and add-ons
**Foreword by Avi Rubin. How does software break? How do attackers make software break on purpose? Why are firewalls, intrusion detection systems, and antivirus software not keeping out the bad guys? What tools can be used to break software? This book provides the answers. This book is studded with examples of real attacks, attack patterns, tools, and techniques used by bad guys to break software. If you want to protect your software from attack, you must first learn how real attacks are really carried out. Learn about: Why software exploit will continue to be a serious problem; When network security mechanisms do not work; Attack patterns; Reverse engineering; Classic attacks against server software; Surprising attacks against client software; Techniques for crafting malicious input; The technical details of buffer overflows; and Rootkits. This information needs to be understood and digested by security professionals so that they know the magnitude of the problem and they can begin to address it properly. Today, all developers should be security-minded. The knowledge here will arm you with a real understanding of the software security problem.
- ISBN-100201786958
- ISBN-13978-0201786958
- Edition1st
- Publication dateFebruary 17, 2004
- LanguageEnglish
- Dimensions9.26 x 7.1 x 1.24 inches
- Print length512 pages
Frequently bought together

Frequently purchased items with fast delivery
The Shellcoder's Handbook: Discovering and Exploiting Security HolesPaperbackEUR 9.88 shippingOnly 19 left in stock (more on the way).
The Hardware Hacking Handbook: Breaking Embedded Security with Hardware AttacksPaperbackEUR 8.01 shippingGet it as soon as Wednesday, Mar 18
Hacking: The Art of Exploitation, 2nd EditionPaperbackEUR 8.81 shippingGet it as soon as Wednesday, Mar 18Only 1 left in stock - order soon.
Customers also bought or read
- Rootkits: Subverting the Windows Kernel: Subverting the Windows Kernel
PaperbackEUR33.96EUR33.96EUR 8.50 delivery Wed, Mar 18 - Building Secure Software: How to Avoid Security Problems the Right Way
HardcoverEUR28.69EUR28.69EUR 9.22 delivery Wed, Mar 18 - Blue Team Field Manual (BTFM) (Field Manual Series)
PaperbackEUR12.91EUR12.91EUR 7.24 delivery Wed, Mar 18 - Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
PaperbackEUR25.29EUR25.29EUR 8.81 delivery Wed, Mar 18 - Penetration Testing: A Hands-On Introduction to Hacking
PaperbackEUR18.32EUR18.32EUR 8.81 delivery Mar 19 - Apr 1 - Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
PaperbackEUR41.22EUR41.22EUR 9.34 delivery Wed, Mar 18 - The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System: Escape and Evasion in the Dark Corners of the System
PaperbackEUR79.42EUR79.42EUR 9.88 delivery Thu, Mar 19 - The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
PaperbackEUR31.40EUR31.40EUR 9.34 delivery Wed, Mar 18 - Practical Threat Detection Engineering: A hands-on guide to planning, developing, and validating detection capabilities
PaperbackEUR24.27EUR24.27EUR 7.72 delivery Wed, Mar 18 - Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly
PaperbackEUR40.95EUR40.95EUR 8.94 delivery Wed, Mar 18 - Black Hat Python, 2nd Edition: Python Programming for Hackers and Pentesters
PaperbackEUR25.98EUR25.98EUR 7.38 delivery Wed, Mar 18 - Black Hat Bash: Creative Scripting for Hackers and Pentesters
PaperbackEUR40.14EUR40.14EUR 8.50 delivery Wed, Mar 18 - Evasive Malware: A Field Guide to Detecting, Analyzing, and Defeating Advanced Threats
PaperbackEUR44.25EUR44.25EUR 8.94 delivery Wed, Mar 18 - The Shellcoder's Handbook: Discovering and Exploiting Security Holes
PaperbackEUR31.95EUR31.95EUR 9.88 delivery Wed, Mar 18 - Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
PaperbackEUR33.29EUR33.29EUR 8.93 delivery Wed, Mar 18
Editorial Reviews
Amazon.com Review
PHP programmers will take issue with the authors' blanket assessment of their language ("PHP is a study in bad security"), much of which seems based on older versions of the language that had some risky default behaviors--but those programmers will also double-check their servers' register_globals settings. Users of insufficiently patched Microsoft and Oracle products will worry about the detailed attack instructions this book contains. Responsible programmers and administrators will appreciate what amounts to documentation of attackers' rootkits for various operating systems, and will raise their eyebrows at the techniques for writing malicious code to unused EEPROM chips in target systems. --David Wall
Topics covered: How to make software fail, either by doing something it wasn't designed to do, or by denying its use to its rightful users. Techniques--including reverse engineering, buffer overflow, and particularly provision of unexpected input--are covered along with the tools needed to carry them out. A section on hardware viruses is detailed and frightening.
From the Back Cover
Praise for Exploiting Software
“Exploiting Software highlights the most critical part of the software quality problem. As it turns out, software quality problems are a major contributing factor to computer security problems. Increasingly, companies large and small depend on software to run their businesses every day. The current approach to software quality and security taken by software companies, system integrators, and internal development organizations is like driving a car on a rainy day with worn-out tires and no air bags. In both cases, the odds are that something bad is going to happen, and there is no protection for the occupant/owner. This book will help the reader understand how to make software quality part of the design―a key change from where we are today!”
― Tony ScottChief Technology Officer, IS&S
General Motors Corporation
“It’s about time someone wrote a book to teach the good guys what the bad guys already know. As the computer security industry matures, books like Exploiting Software have a critical role to play.”
― Bruce SchneierChief Technology Officer
Counterpane
Author of Beyond Fear and Secrets and Lies
“Exploiting Software cuts to the heart of the computer security problem, showing why broken software presents a clear and present danger. Getting past the ‘worm of the day’ phenomenon requires that someone other than the bad guys understands how software is attacked. This book is a wake-up call for computer security.”
― Elinor Mills AbreuReuters’ correspondent
“Police investigators study how criminals think and act. Military strategists learn about the enemy’s tactics, as well as their weapons and personnel capabilities. Similarly, information security professionals need to study their criminals and enemies, so we can tell the difference between popguns and weapons of mass destruction. This book is a significant advance in helping the ‘white hats’ understand how the ‘black hats’ operate. Through extensive examples and ‘attack patterns,’ this book helps the reader understand how attackers analyze software and use the results of the analysis to attack systems. Hoglund and McGraw explain not only how hackers attack servers, but also how malicious server operators can attack clients (and how each can protect themselves from the other). An excellent book for practicing security engineers, and an ideal book for an undergraduate class in software security.”
― Jeremy EpsteinDirector, Product Security & Performance
webMethods, Inc.
“A provocative and revealing book from two leading security experts and world class software exploiters, Exploiting Software enters the mind of the cleverest and wickedest crackers and shows you how they think. It illustrates general principles for breaking software, and provides you a whirlwind tour of techniques for finding and exploiting soft
About the Author
Greg Hoglund has been a pioneer in the area of software security. He is CEO of HBGary, Inc., a leading provider of software security verification services. After writing one of the first network vulnerability scanners (installed in over half of all Fortune 500 companies), he created and documented the first Windows NT-based rootkit, founding rootkit.com in the process. Greg is a frequent speaker at Black Hat, RSA, and other security conferences.
Gary McGraw, Cigital's CTO, is a leading authority on software security. Dr. McGraw is coauthor of the groundbreaking books Building Secure Software and Exploiting Software (both from Addison-Wesley). While consulting for major software producers and consumers, he has published over ninety peer-reviewed technical publications, and functions as principal investigator on grants from DARPA, the National Science Foundation, and NIST's Advanced Technology Program. He serves on the advisory boards of Authentica, Counterpane, and Fortify Software. He is also an advisor to the computer science departments at University of California, Davis, and the University of Virginia, as well as the School of Informatics at Indiana University.
Product details
- Publisher : Addison-Wesley Professional
- Publication date : February 17, 2004
- Edition : 1st
- Language : English
- Print length : 512 pages
- ISBN-10 : 0201786958
- ISBN-13 : 978-0201786958
- Item Weight : 2.1 pounds
- Dimensions : 9.26 x 7.1 x 1.24 inches
- Best Sellers Rank: #2,575,505 in Books (See Top 100 in Books)
- #801 in Computer Systems Analysis & Design (Books)
- #835 in Software Testing
- #1,137 in Computer Hacking
- Customer Reviews:
About the authors

Gary McGraw is co-founder of the Berryville Institute of Machine Learning. He is a globally recognized authority on software security and the author of eight best selling books on this topic. His titles include Software Security, Exploiting Software, Building Secure Software, Java Security, Exploiting Online Games, and 6 other books; and he is editor of the Addison-Wesley Software Security series. Dr. McGraw has also written over 100 peer-reviewed scientific publications. Gary serves on the Advisory Boards of Maxmyinterest, NTrepid, Ravenwhite, and Secure Code Warrior. He has also served as a Board member of Cigital and Codiscope (acquired by Synopsys) and as Advisor to Black Duck (acquired by Synopsys), Dasient (acquired by Twitter), Fortify Software (acquired by HP), and Invotas (acquired by FireEye). Gary produced the monthly Silver Bullet Security Podcast for IEEE Security & Privacy magazine for thirteen years. His dual PhD is in Cognitive Science and Computer Science from Indiana University where he serves on the Dean’s Advisory Council for the School of Informatics, Computing, and Engineering.
https://garymcgraw.com
https://berryvilleiml.com/
@cigitalgem

Discover more of the author’s books, see similar authors, read book recommendations and more.
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on AmazonTop reviews from the United States
There was a problem filtering reviews. Please reload the page.
- Reviewed in the United States on January 14, 2022Format: PaperbackVerified PurchaseIt’s an old (by Infosec standards) book. But it’s still relevant. I lost my original copy when we moved. Bought a new copy just recently to keep around as a reference. Worthwhile book.
- Reviewed in the United States on June 9, 2008Format: PaperbackVerified PurchaseThis book is a great review of software security and deserves to be on any security professional's bookshelf. The chapter on Rootkits (Chapter 8) is well worth the price of the book. While the book isn't too long (at just over 400 pages) it does deliver in a concise, easy to read format that makes the book a rewarding read.
- Reviewed in the United States on February 22, 2014Format: PaperbackVerified PurchaseI work in IT, for 22 years as a computer programmer ("software engineer") and now in IT Security as an Application Security Engineer (focusing on Web applications, thanks..) so this book is near and dear to me in both capacities. I highly recommend it. Highly technical, profoundly educational... relevant, intelligently written... just a great book. Buy it.
- Reviewed in the United States on June 6, 2020Format: PaperbackVerified PurchaseStill in chapter one, but so far so good! I'll come back and update my review once I get through the book. Thx.
- Reviewed in the United States on August 19, 2005Format: PaperbackVerified PurchaseThe one major strength of this book, from a computer science viewpoint, is its emphasis on "attack patterns". This systemization of these issues really differentiates this book from many of its competitors (which tend to be either the latest 500 hacks or descriptions of standards). Put simply CS is the study of algorithms, and this book fits nicely into that tradition.
- Reviewed in the United States on June 16, 2019Format: PaperbackVerified PurchaseExcellent!! Good Deal, Very Fast Shipping. 5 Stars Seller. Thank You Very Much.
- Reviewed in the United States on April 18, 2010Format: PaperbackVerified PurchaseExploiting Software is a great reference both for reverse engineering beginners and for coders who have done some reversing. The book includes some great example code very helpful for explaining the concepts and as a starting point for exploit development.
- Reviewed in the United States on April 14, 2004Format: PaperbackChapter 1 - Software - The Root of the Problem
Software is indeed the root of the problem and this chapter makes that case and point. This chapter is a good introduction to software vulnerabilities (which make up all CERT advisories) and why this book is relevant.
Chapter 2 - Attack Patterns
This chapter provides and overview of types of attacks. It includes history of vulnerability types and predictions of future vulnerabilities.
Chapter 3 - Reverse Engineering and Program Understanding
This chapter begins with a good introduction to reverse engineering tools and techniquies. It then zooms into writing plugins for the IDA disassembler along with batch analysis with IDA disassembler. It also discusses writing your own cracking tools.
Chapter 4 - Exploiting Server Software
This chapter provides and over view of techniques for exploiting any server software. It is filled with real examples and loads of fun. Many attack patterns are covered in various levels of detail. Numerous tools are highlighted for finding injection points.
Chapter 5 - Exploiting Client Software
The logic of exploiting client software is different than exploiting server software, so there's and extra chapter. Again the focus is on techniques to look for exploitable bugs.
Chapter 6 - Crafting (Malicious) Input
This chapter discusses many different methods for crafing input to locate bugs. Many tools and professional techniques are highlighted. I didn't know a lot of this stuff was out there.
Chapter 7 - Buffer Overflows
It starts with a high level overview of traditional buffer overflows, then some non tradiditional buffer overflows are discussed. This chapter also covers format strings. One of the longer chapters in the book, it highlighes a lot of problem areas.
Chapter 8 - Rootkits
One of the authors is the creator of the first rootkit for windows, and he details some of his techniques here. Not only does he discuss root kit techniques, but he also discusses techniques that apply to malware in general.
On the positive side: The writing is enjoyable, and the technical concepts are explained clearly. This is a good book for anyone interested in vulnerability research. I found chapters 4-6 to be the best. This book has a decent index. I've used it for reference a couple of times since I finished reading it which is always a measure of a worthwhile book.
On the downside, I have a few minor complaints: Some of the tools mentioned in the book were no where to be found. Many were named without references, and Google searches revealed little about them or how to find them. Another tool was supposed to be available at one of the authors website, but I couldn't find it. The authors cover some material at a high level while other material is covered in depth without any apparent reason for the disparity.
A good book for those interested in vulnerabiltiy research and software security. I also suggest the sister book "Building Secure Software" to compliment this one.
Top reviews from other countries
Gabriel AndReviewed in Brazil on July 20, 20255.0 out of 5 stars Still relevant
Format: PaperbackVerified PurchaseLike others have said, it's an oldie but a goodie.
Just like the shellcoders handbook and some other books by the same author, the knowledge contained here is still valuable.
For me chapters 2, 7 and 8 were enough to convince me to buy it.
The only downside is that I had a hard time finding some of the exploits mentioned in the book.
For instance, chapter 2 mentions a vulnerability in StackGuard and there's even a link to the exploit but the site is down.
In the end though the author does such a good job of explaining the attack that even without the exploit you are able to understand what's actually happening
-
lvReviewed in Italy on September 12, 20135.0 out of 5 stars Ottimo libro
Format: PaperbackVerified PurchaseSicuramente un libro non per tutti, ma solo per esperti del settore, però è molto utile per studiare la sicurezza














