Shop top categories that ship internationally
Buy new:
-61% EUR21.64
EUR 8.93 delivery Friday, March 20
Ships from: Amazon
Sold by: srwilson62
EUR 21.64 with 61 percent savings
List Price: EUR 55.96
No Import Charges & EUR 8.93 Shipping to Netherlands Details

Shipping & Fee Details

Price EUR 21.64
AmazonGlobal Shipping EUR 8.93
Estimated Import Charges EUR 0.00
Total EUR 30.56

EUR 8.93 delivery Friday, March 20
Or fastest delivery Tuesday, March 17
Only 1 left in stock - order soon.
EUR EUR 21.64 () Includes selected options. Includes initial monthly payment and selected options. Details
Price
Subtotal
EUR EUR 21.64
Subtotal
Initial payment breakdown
Shipping cost, delivery date, and order total (including tax) shown at checkout.
Ships from
Amazon
Amazon
Ships from
Amazon
Returns
FREE 30-day refund/replacement
FREE 30-day refund/replacement
This item can be returned in its original condition for a full refund or replacement within 30 days of receipt.
Read full return policy
Payment
Secure transaction
Your transaction is secure
We work hard to protect your security and privacy. Our payment security system encrypts your information during transmission. We don’t share your credit card details with third-party sellers, and we don’t sell your information to others. Learn more
EUR 8.12
FREE International Returns
100% Satisfaction Guaranteed. Ships direct from Amazon. 100% Satisfaction Guaranteed. Ships direct from Amazon. See less
EUR 8.93 delivery Thursday, March 19. Order within 5 hrs 46 mins
Or fastest delivery Tuesday, March 17
Only 1 left in stock - order soon.
EUR EUR 21.64 () Includes selected options. Includes initial monthly payment and selected options. Details
Price
Subtotal
EUR EUR 21.64
Subtotal
Initial payment breakdown
Shipping cost, delivery date, and order total (including tax) shown at checkout.
Access codes and supplements are not guaranteed with used items.
Added to

Sorry, there was a problem.

There was an error retrieving your Wish Lists. Please try again.

Sorry, there was a problem.

List unavailable.
Kindle app logo image

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.

Read instantly on your browser with Kindle for Web.

Using your mobile phone camera - scan the code below and download the Kindle app.

QR code to download the Kindle App

  • Exploiting Software: How to Break Code

Follow the authors

Get new release updates & improved recommendations
Something went wrong. Please try your request again later.

Exploiting Software: How to Break Code 1st Edition

4.5 out of 5 stars (43)

{"desktop_buybox_group_1":[{"displayPrice":"EUR 21.64","priceAmount":21.64,"currencySymbol":"EUR","integerValue":"21","decimalSeparator":".","fractionalValue":"64","symbolPosition":"left","hasSpace":true,"showFractionalPartIfEmpty":true,"offerListingId":"fUR78WeS4n6eI1RddUh2SuiZO0QSrMEaJmSzvRAevGyyfZpJ%2BS%2FgX6I6fzR8jasZkVlfrG%2F%2FSAZwSSlE8S31Cw0Cr%2BP2T4IqeEJQdmw2zLmX0MVW7XH%2BaiQWPRY7BFdaYkARmRwl5J31K2nVTgqH5YG3D9vVOh3AmYvuWTQifCl%2Bigp95FQb5g%3D%3D","locale":"en-US","buyingOptionType":"NEW","aapiBuyingOptionIndex":0}, {"displayPrice":"EUR 8.12","priceAmount":8.12,"currencySymbol":"EUR","integerValue":"8","decimalSeparator":".","fractionalValue":"12","symbolPosition":"left","hasSpace":true,"showFractionalPartIfEmpty":true,"offerListingId":"fUR78WeS4n6eI1RddUh2SuiZO0QSrMEawEigH2WqE5AVCbmVyaOb4OX88iGxmV%2FdPd2Hve5rq3qiExtRuBRVSKfiVIVJCr%2BhkOqWNtOhlmxs6OBh3J0MUb%2FxYLO9hyGVhkRar9AO09LXZDcnRIhQ%2F9XNh3Jzr29vQrasIAVtP7jGY%2F0c35grRA%3D%3D","locale":"en-US","buyingOptionType":"USED","aapiBuyingOptionIndex":1}]}

Purchase options and add-ons

**Foreword by Avi Rubin. How does software break? How do attackers make software break on purpose? Why are firewalls, intrusion detection systems, and antivirus software not keeping out the bad guys? What tools can be used to break software? This book provides the answers. This book is studded with examples of real attacks, attack patterns, tools, and techniques used by bad guys to break software. If you want to protect your software from attack, you must first learn how real attacks are really carried out. Learn about: Why software exploit will continue to be a serious problem; When network security mechanisms do not work; Attack patterns; Reverse engineering; Classic attacks against server software; Surprising attacks against client software; Techniques for crafting malicious input; The technical details of buffer overflows; and Rootkits. This information needs to be understood and digested by security professionals so that they know the magnitude of the problem and they can begin to address it properly. Today, all developers should be security-minded. The knowledge here will arm you with a real understanding of the software security problem.

Frequently bought together

This item: Exploiting Software: How to Break Code
EUR21.63
Get it as soon as Thursday, Mar 19
Only 1 left in stock - order soon.
Sold by FIG35 and ships from Amazon Fulfillment.
+
EUR39.67
Get it as soon as Thursday, Mar 19
Only 1 left in stock - order soon.
Sold by Hemmenity and ships from Amazon Fulfillment.
+
EUR28.69
Get it as soon as Wednesday, Mar 18
Only 1 left in stock - order soon.
Sold by TAKKA STORE and ships from Amazon Fulfillment.
Total price: $00
To see our price, add these items to your cart.
Details
Added to Cart
These items are shipped from and sold by different sellers.
Choose items to buy together.

Customers also bought or read

Loading...

Editorial Reviews

Amazon.com Review

Computing hardware would have no value without software; software tells hardware what to do. Software therefore must have special authority within computing systems. All computer security problems stem from that fact, and Exploiting Software: How to Break Code shows you how to design your software so it's as resistant as possible to attack. Sure, everything's phrased in offensive terms (as instructions for the attacker, that is), but this book has at least as much value in showing designers what sorts of attacks their software will face (the book could serve as a checklist for part of a pre-release testing regimen). Plus, the clever reverse-engineering strategies that Greg Hoglund and Gary McGraw teach will be useful in many legitimate software projects. Consider this a recipe book for mayhem, or a compendium of lessons learned by others. It depends on your situation.

PHP programmers will take issue with the authors' blanket assessment of their language ("PHP is a study in bad security"), much of which seems based on older versions of the language that had some risky default behaviors--but those programmers will also double-check their servers' register_globals settings. Users of insufficiently patched Microsoft and Oracle products will worry about the detailed attack instructions this book contains. Responsible programmers and administrators will appreciate what amounts to documentation of attackers' rootkits for various operating systems, and will raise their eyebrows at the techniques for writing malicious code to unused EEPROM chips in target systems. --David Wall

Topics covered: How to make software fail, either by doing something it wasn't designed to do, or by denying its use to its rightful users. Techniques--including reverse engineering, buffer overflow, and particularly provision of unexpected input--are covered along with the tools needed to carry them out. A section on hardware viruses is detailed and frightening.

From the Back Cover

Praise for Exploiting Software

Exploiting Software highlights the most critical part of the software quality problem. As it turns out, software quality problems are a major contributing factor to computer security problems. Increasingly, companies large and small depend on software to run their businesses every day. The current approach to software quality and security taken by software companies, system integrators, and internal development organizations is like driving a car on a rainy day with worn-out tires and no air bags. In both cases, the odds are that something bad is going to happen, and there is no protection for the occupant/owner. This book will help the reader understand how to make software quality part of the design―a key change from where we are today!”

Tony Scott
Chief Technology Officer, IS&S
General Motors Corporation

“It’s about time someone wrote a book to teach the good guys what the bad guys already know. As the computer security industry matures, books like Exploiting Software have a critical role to play.”

Bruce Schneier
Chief Technology Officer
Counterpane
Author of
Beyond Fear and Secrets and Lies

Exploiting Software cuts to the heart of the computer security problem, showing why broken software presents a clear and present danger. Getting past the ‘worm of the day’ phenomenon requires that someone other than the bad guys understands how software is attacked. This book is a wake-up call for computer security.”

Elinor Mills Abreu
Reuters’ correspondent

“Police investigators study how criminals think and act. Military strategists learn about the enemy’s tactics, as well as their weapons and personnel capabilities. Similarly, information security professionals need to study their criminals and enemies, so we can tell the difference between popguns and weapons of mass destruction. This book is a significant advance in helping the ‘white hats’ understand how the ‘black hats’ operate. Through extensive examples and ‘attack patterns,’ this book helps the reader understand how attackers analyze software and use the results of the analysis to attack systems. Hoglund and McGraw explain not only how hackers attack servers, but also how malicious server operators can attack clients (and how each can protect themselves from the other). An excellent book for practicing security engineers, and an ideal book for an undergraduate class in software security.”

Jeremy Epstein
Director, Product Security & Performance
webMethods, Inc.

“A provocative and revealing book from two leading security experts and world class software exploiters, Exploiting Software enters the mind of the cleverest and wickedest crackers and shows you how they think. It illustrates general principles for breaking software, and provides you a whirlwind tour of techniques for finding and exploiting soft

Product details

  • Publisher ‏ : ‎ Addison-Wesley Professional
  • Publication date ‏ : ‎ February 17, 2004
  • Edition ‏ : ‎ 1st
  • Language ‏ : ‎ English
  • Print length ‏ : ‎ 512 pages
  • ISBN-10 ‏ : ‎ 0201786958
  • ISBN-13 ‏ : ‎ 978-0201786958
  • Item Weight ‏ : ‎ 2.1 pounds
  • Dimensions ‏ : ‎ 9.26 x 7.1 x 1.24 inches
  • Best Sellers Rank: #2,575,505 in Books (See Top 100 in Books)
  • Customer Reviews:
    4.5 out of 5 stars (43)

About the authors

Follow authors to get new release updates, plus improved recommendations.

Customer reviews

4.5 out of 5 stars
43 global ratings

Top reviews from the United States

  • Reviewed in the United States on January 14, 2022
    Format: PaperbackVerified Purchase
    It’s an old (by Infosec standards) book. But it’s still relevant. I lost my original copy when we moved. Bought a new copy just recently to keep around as a reference. Worthwhile book.
    One person found this helpful
    Report
  • Reviewed in the United States on June 9, 2008
    Format: PaperbackVerified Purchase
    This book is a great review of software security and deserves to be on any security professional's bookshelf. The chapter on Rootkits (Chapter 8) is well worth the price of the book. While the book isn't too long (at just over 400 pages) it does deliver in a concise, easy to read format that makes the book a rewarding read.
    One person found this helpful
    Report
  • Reviewed in the United States on February 22, 2014
    Format: PaperbackVerified Purchase
    I work in IT, for 22 years as a computer programmer ("software engineer") and now in IT Security as an Application Security Engineer (focusing on Web applications, thanks..) so this book is near and dear to me in both capacities. I highly recommend it. Highly technical, profoundly educational... relevant, intelligently written... just a great book. Buy it.
  • Reviewed in the United States on June 6, 2020
    Format: PaperbackVerified Purchase
    Still in chapter one, but so far so good! I'll come back and update my review once I get through the book. Thx.
    One person found this helpful
    Report
  • Reviewed in the United States on August 19, 2005
    Format: PaperbackVerified Purchase
    The one major strength of this book, from a computer science viewpoint, is its emphasis on "attack patterns". This systemization of these issues really differentiates this book from many of its competitors (which tend to be either the latest 500 hacks or descriptions of standards). Put simply CS is the study of algorithms, and this book fits nicely into that tradition.
    11 people found this helpful
    Report
  • Reviewed in the United States on June 16, 2019
    Format: PaperbackVerified Purchase
    Excellent!! Good Deal, Very Fast Shipping. 5 Stars Seller. Thank You Very Much.
  • Reviewed in the United States on April 18, 2010
    Format: PaperbackVerified Purchase
    Exploiting Software is a great reference both for reverse engineering beginners and for coders who have done some reversing. The book includes some great example code very helpful for explaining the concepts and as a starting point for exploit development.
    One person found this helpful
    Report
  • Reviewed in the United States on April 14, 2004
    Format: Paperback
    Chapter 1 - Software - The Root of the Problem
    Software is indeed the root of the problem and this chapter makes that case and point. This chapter is a good introduction to software vulnerabilities (which make up all CERT advisories) and why this book is relevant.

    Chapter 2 - Attack Patterns
    This chapter provides and overview of types of attacks. It includes history of vulnerability types and predictions of future vulnerabilities.

    Chapter 3 - Reverse Engineering and Program Understanding
    This chapter begins with a good introduction to reverse engineering tools and techniquies. It then zooms into writing plugins for the IDA disassembler along with batch analysis with IDA disassembler. It also discusses writing your own cracking tools.

    Chapter 4 - Exploiting Server Software
    This chapter provides and over view of techniques for exploiting any server software. It is filled with real examples and loads of fun. Many attack patterns are covered in various levels of detail. Numerous tools are highlighted for finding injection points.

    Chapter 5 - Exploiting Client Software
    The logic of exploiting client software is different than exploiting server software, so there's and extra chapter. Again the focus is on techniques to look for exploitable bugs.

    Chapter 6 - Crafting (Malicious) Input
    This chapter discusses many different methods for crafing input to locate bugs. Many tools and professional techniques are highlighted. I didn't know a lot of this stuff was out there.

    Chapter 7 - Buffer Overflows
    It starts with a high level overview of traditional buffer overflows, then some non tradiditional buffer overflows are discussed. This chapter also covers format strings. One of the longer chapters in the book, it highlighes a lot of problem areas.

    Chapter 8 - Rootkits
    One of the authors is the creator of the first rootkit for windows, and he details some of his techniques here. Not only does he discuss root kit techniques, but he also discusses techniques that apply to malware in general.

    On the positive side: The writing is enjoyable, and the technical concepts are explained clearly. This is a good book for anyone interested in vulnerability research. I found chapters 4-6 to be the best. This book has a decent index. I've used it for reference a couple of times since I finished reading it which is always a measure of a worthwhile book.

    On the downside, I have a few minor complaints: Some of the tools mentioned in the book were no where to be found. Many were named without references, and Google searches revealed little about them or how to find them. Another tool was supposed to be available at one of the authors website, but I couldn't find it. The authors cover some material at a high level while other material is covered in depth without any apparent reason for the disparity.

    A good book for those interested in vulnerabiltiy research and software security. I also suggest the sister book "Building Secure Software" to compliment this one.
    7 people found this helpful
    Report

Top reviews from other countries

Translate all reviews to English
  • Gabriel And
    5.0 out of 5 stars Still relevant
    Reviewed in Brazil on July 20, 2025
    Format: PaperbackVerified Purchase
    Like others have said, it's an oldie but a goodie.

    Just like the shellcoders handbook and some other books by the same author, the knowledge contained here is still valuable.

    For me chapters 2, 7 and 8 were enough to convince me to buy it.

    The only downside is that I had a hard time finding some of the exploits mentioned in the book.

    For instance, chapter 2 mentions a vulnerability in StackGuard and there's even a link to the exploit but the site is down.

    In the end though the author does such a good job of explaining the attack that even without the exploit you are able to understand what's actually happening
  • lv
    5.0 out of 5 stars Ottimo libro
    Reviewed in Italy on September 12, 2013
    Format: PaperbackVerified Purchase
    Sicuramente un libro non per tutti, ma solo per esperti del settore, però è molto utile per studiare la sicurezza
    Report