---
product_id: 115671002
title: "Hacking: The Art of Exploitation, 2nd Edition"
price: "£41.36"
currency: GBP
in_stock: true
reviews_count: 9
url: https://www.desertcart.co.uk/products/115671002-hacking-the-art-of-exploitation-2nd-edition
store_origin: GB
region: United Kingdom
---

# Hacking: The Art of Exploitation, 2nd Edition

**Price:** £41.36
**Availability:** ✅ In Stock

## Quick Answers

- **What is this?** Hacking: The Art of Exploitation, 2nd Edition
- **How much does it cost?** £41.36 with free shipping
- **Is it available?** Yes, in stock and ready to ship
- **Where can I buy it?** [www.desertcart.co.uk](https://www.desertcart.co.uk/products/115671002-hacking-the-art-of-exploitation-2nd-edition)

## Best For

- Customers looking for quality international products

## Why This Product

- Free international shipping included
- Worldwide delivery with tracking
- 15-day hassle-free returns

## Description

desertcart.com: Hacking: The Art of Exploitation, 2nd Edition eBook : Erickson, Jon: Kindle Store

Review: A hacking book that teaches you mindset - I've read quite a few books on hacking, many of which focus on specific technologies—such as using tools to perform reconnaissance on websites and identify potential attack targets. This book, however, takes a different approach. It starts by teaching the fundamentals of assembly and C programming, then moves on to help you identify programs vulnerable to buffer overflows. You'll learn how to write shellcode to exploit these vulnerabilities. What sets this book apart is its minimal reliance on abstractions. For instance, it teaches you how to build your own simple web server, which you can then exploit. Need to perform a SYN flood against a target? No problem—you'll write your own in C to fully understand the process. This hands-on approach will give you a solid understanding of networking. There's even a chapter dedicated to cryptography, which will deepen your knowledge in this critical area. To top it off, the book culminates in a project where you'll learn to crack WEP encryption—not with third-party tools, but by exploiting weak initialization vectors (IVs) and doing it all yourself. While some of the examples, such as the buffer overflow scenarios, may not work in real-world environments, this book is still an invaluable resource. It covers essential foundational knowledge that will serve you well on your hacking journey. There are books that quickly get outdated because they teach you how to use tools. This book is a classic. It teaches you understanding. After reading this, you’ll have a better understanding of how third-party tools work, or you can write your own!
Review: Covers Everything. Be Warned. - I picked this book up a number of years ago when I got interested in understanding exploits. I've got experience writing code, and even some basic knowledge of networking. However it was difficult to get past the first 3 chapters. I stopped, and started elsewhere. This book will cover everything you need to know, and while that sounds great it's not for beginners or people looking to start quickly. I recommend seeking introductory knowledge elsewhere, C, OSI, TCP/IP, operating systems etc. Penetration Testing a Hands on Guide by Georgia Weidmam is a good way to get started with just getting hands on practice. Once I went back and got a grip on these concepts and had some practice the book was easier to understand and I came to appreciate it much more. Its not an easy read, and you need to have some solid understanding of the machine as a whole. After I played with buffer overflows in a VM I went back and appreciated chapter 0x200s coverage of registers and what they do. Buy this book only if you have a solid understanding of the computer as a whole, or will develop it alongside. The book will not get you started. It will definitely help you develop the understanding of why a buffer overflow script written in Python works, and how. If you want to get up and running quickly look elsewhere. But that doesn't mean it's a bad text, it's well done, insightful, and will help you understand the why of exploiting software.

## Technical Specifications

| Specification | Value |
|---------------|-------|
| ASIN  | B004OEJN3I |
| Accessibility  | Learn more |
| Best Sellers Rank | #262,103 in Kindle Store ( See Top 100 in Kindle Store ) #17 in Computer Hacking #35 in Online Safety & Piracy #45 in Network Security (Kindle Store) |
| Customer Reviews | 4.6 4.6 out of 5 stars (1,584) |
| Edition  | 2nd |
| Enhanced typesetting  | Enabled |
| File size  | 4.0 MB |
| ISBN-13  | 978-1593273385 |
| Language  | English |
| Page Flip  | Enabled |
| Print length  | 815 pages |
| Publication date  | February 1, 2008 |
| Publisher  | No Starch Press |
| Screen Reader  | Supported |
| Word Wise  | Not Enabled |
| X-Ray  | Not Enabled |

## Images

![Hacking: The Art of Exploitation, 2nd Edition - Image 1](https://m.media-amazon.com/images/I/91dLDp5XzYL.jpg)

## Customer Reviews

### ⭐⭐⭐⭐⭐ A hacking book that teaches you mindset
*by R***L on February 7, 2025*

I've read quite a few books on hacking, many of which focus on specific technologies—such as using tools to perform reconnaissance on websites and identify potential attack targets. This book, however, takes a different approach. It starts by teaching the fundamentals of assembly and C programming, then moves on to help you identify programs vulnerable to buffer overflows. You'll learn how to write shellcode to exploit these vulnerabilities. What sets this book apart is its minimal reliance on abstractions. For instance, it teaches you how to build your own simple web server, which you can then exploit. Need to perform a SYN flood against a target? No problem—you'll write your own in C to fully understand the process. This hands-on approach will give you a solid understanding of networking. There's even a chapter dedicated to cryptography, which will deepen your knowledge in this critical area. To top it off, the book culminates in a project where you'll learn to crack WEP encryption—not with third-party tools, but by exploiting weak initialization vectors (IVs) and doing it all yourself. While some of the examples, such as the buffer overflow scenarios, may not work in real-world environments, this book is still an invaluable resource. It covers essential foundational knowledge that will serve you well on your hacking journey. There are books that quickly get outdated because they teach you how to use tools. This book is a classic. It teaches you understanding. After reading this, you’ll have a better understanding of how third-party tools work, or you can write your own!

### ⭐⭐⭐⭐⭐ Covers Everything. Be Warned.
*by J***N on August 8, 2017*

I picked this book up a number of years ago when I got interested in understanding exploits. I've got experience writing code, and even some basic knowledge of networking. However it was difficult to get past the first 3 chapters. I stopped, and started elsewhere. This book will cover everything you need to know, and while that sounds great it's not for beginners or people looking to start quickly. I recommend seeking introductory knowledge elsewhere, C, OSI, TCP/IP, operating systems etc. Penetration Testing a Hands on Guide by Georgia Weidmam is a good way to get started with just getting hands on practice. Once I went back and got a grip on these concepts and had some practice the book was easier to understand and I came to appreciate it much more. Its not an easy read, and you need to have some solid understanding of the machine as a whole. After I played with buffer overflows in a VM I went back and appreciated chapter 0x200s coverage of registers and what they do. Buy this book only if you have a solid understanding of the computer as a whole, or will develop it alongside. The book will not get you started. It will definitely help you develop the understanding of why a buffer overflow script written in Python works, and how. If you want to get up and running quickly look elsewhere. But that doesn't mean it's a bad text, it's well done, insightful, and will help you understand the why of exploiting software.

### ⭐⭐⭐⭐⭐ Regained my lost book
*by S***W on January 17, 2025*

I had the first edition copy of this book that I studied. This second edition has a lot more knowledge and sets the mindset to have. It’s very insightful and tackles concept in an easy to grasp way. The first edition had a CD in the back, but since then they have gone away with the physical disk and have a link in the back of the book to set up your vm or machine to practice the concepts in a safe environment. This is a great addition to anyone curious about computers and wanting to do a hands on approach. I’d recommend for beginners up to advanced. It’s a handy reference and great for getting your feet wet.

---

## Why Shop on Desertcart?

- 🛒 **Trusted by 1.3+ Million Shoppers** — Serving international shoppers since 2016
- 🌍 **Shop Globally** — Access 737+ million products across 21 categories
- 💰 **No Hidden Fees** — All customs, duties, and taxes included in the price
- 🔄 **15-Day Free Returns** — Hassle-free returns (30 days for PRO members)
- 🔒 **Secure Payments** — Trusted payment options with buyer protection
- ⭐ **TrustPilot Rated 4.5/5** — Based on 8,000+ happy customer reviews

**Shop now:** [https://www.desertcart.co.uk/products/115671002-hacking-the-art-of-exploitation-2nd-edition](https://www.desertcart.co.uk/products/115671002-hacking-the-art-of-exploitation-2nd-edition)

---

*Product available on Desertcart United Kingdom*
*Store origin: GB*
*Last updated: 2026-05-22*