Search  for anything...
NA

Buffer Overflow Attacks: Detect, Exploit, Prevent

  • Based on 23 reviews
Condition: New
Checking for the best price...
$27.45 Why this price?
Save $16.54 was $43.99

Buy Now, Pay Later


As low as $6 / mo
  • – 4-month term
  • – No impact on credit
  • – Instant approval decision
  • – Secure and straightforward checkout

Ready to go? Add this product to your cart and select a plan during checkout.

Payment plans are offered through our trusted finance partners Klarna, PayTomorrow, Affirm, Afterpay, Apple Pay, and PayPal. No-credit-needed leasing options through Acima may also be available at checkout.

Learn more about financing & leasing here.

Free shipping on this product

This item is eligible for return within 30 days of receipt

To qualify for a full refund, items must be returned in their original, unused condition. If an item is returned in a used, damaged, or materially different state, you may be granted a partial refund.

To initiate a return, please visit our Returns Center.

View our full returns policy here.


Availability: In Stock.
Fulfilled by Amazon

Arrives Wednesday, Sep 10
Order within 18 hours and 10 minutes
Available payment plans shown during checkout

Description

The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, making this class of attack one of the most common and most dangerous weapon used by malicious attackers. This is the first book specifically aimed at detecting, exploiting, and preventing the most common and dangerous attacks. Buffer overflows make up one of the largest collections of vulnerabilities in existence; And a large percentage of possible remote exploits are of the overflow variety. Almost all of the most devastating computer attacks to hit the Internet in recent years including SQL Slammer, Blaster, and I Love You attacks. If executed properly, an overflow vulnerability will allow an attacker to run arbitrary code on the victim’s machine with the equivalent rights of whichever process was overflowed. This is often used to provide a remote shell onto the victim machine, which can be used for further exploitation. A buffer overflow is an unexpected behavior that exists in certain programming languages. This book provides specific, real code examples on exploiting buffer overflow attacks from a hacker's perspective and defending against these attacks for the software developer.Over half of the "SANS TOP 10 Software Vulnerabilities" are related to buffer overflows. None of the current-best selling software security books focus exclusively on buffer overflows.This book provides specific, real code examples on exploiting buffer overflow attacks from a hacker's perspective and defending against these attacks for the software developer. Read more

Publisher ‏ : ‎ Syngress; 1st edition (January 29, 2005)


Publication date ‏ : ‎ January 29, 2005


Language ‏ : ‎ English


File size ‏ : ‎ 5550 KB


Text-to-Speech ‏ : ‎ Not enabled


Enhanced typesetting ‏ : ‎ Not Enabled


X-Ray ‏ : ‎ Not Enabled


Word Wise ‏ : ‎ Not Enabled


Print length ‏ : ‎ 512 pages


Frequently asked questions

If you place your order now, the estimated arrival date for this product is: Wednesday, Sep 10

Yes, absolutely! You may return this product for a full refund within 30 days of receiving it.

To initiate a return, please visit our Returns Center.

View our full returns policy here.

  • Klarna Financing
  • Affirm Pay in 4
  • Affirm Financing
  • Afterpay Financing
  • PayTomorrow Financing
  • Financing through Apple Pay
Leasing options through Acima may also be available during checkout.

Learn more about financing & leasing here.

Top Amazon Reviews


  • Clearly explains the internals of Buffer overflow attacks
I have not finished this book yet(still reading). But this book clearly explains the basics of stack overflow, off by one, heap overflow and string format attacks. The writing style is very good and if you have some knowledge of assembly language and want to write buffer overflow attack code from grounds up, spanning from Linux, freeBSD to Windows, this book is for you. One flaw of this book is some mistyping. ... show more
Reviewed in the United States on November 13, 2013 by Yeoun Jae Kim

  • Five Stars
Great!!!! As advertised...
Reviewed in the United States on September 3, 2015 by Super Man 7

  • Good
Good high level topics but definitely some topics are out of date
Reviewed in the United States on January 19, 2021 by Justin

  • Five Stars
nice book
Reviewed in the United States on July 20, 2015 by Fei Shan

  • Finally a book on BO attacks
Buffer overflow attacks have been around for over 30 years, finally there is a book on the topic. this is a valuable title and worth the wait!
Reviewed in the United States on March 30, 2005 by Eric Kent

  • Full of errors and inconsistencies
Does Syngress (the publisher) employ proof readers? I doubt it. This book is so full of errors and inaccuracies that it becomes painful to read after a while. Especially the annotated examples, where the line numbers for the code listings often bear no relation to the line numbers listed in the accompanying analysis. And then there's the confusion of ESP and EIP in several places throughout the book. For a collection of 'expert information' it comes off as a rather amateurish production. Makes you wonder... what else have they got wrong? You'll notice this is very much the same as the review I've posted for "Sockets, Shellcode, Porting & Coding"... that is because it too is horrendous for errors. This is 2 books from Syngress I've got that are very poor quality. What's going on guys? ... show more
Reviewed in the United States on July 29, 2008 by Byron Sonne

  • Disturbing
This book upset me. Not really the book itself, that's great, but what it implies: that this type of exploit hasn't gone away. I thought things were getting better, but the author explains that is an illusion: it's just that the reporting slacked off. It is hard to believe that programmers keep making the same mistakes over and over again. This book shows what those mistakes are and how hackers exploit them. You need a good understanding of assembly language to get much out of this, but if you do have that background, this is a real eye-opener. Extremely detailed, and some of this is a bit of a reach for me (it's been many a year since I did any C or Assembler), but it is fascinating, though in the same sense that watching a tiger stalk you would be: it's scary. Certainly recommended for people who are writing code today, and I hope more of them pay attention, though the authors attitude seems to be that these problems will continue to plague us. ... show more
Reviewed in the United States on February 26, 2005 by Anthony Lawrence

  • Better books are now available
I read "Buffer Overflow Attacks" as part of a collection of books on writing exploit code (reviewed separately). I have to give credit to the author team for writing one of the first books on this subject; Syngress published BOA in 2005, when the subject received less published coverage. However, better books are available now if you want to learn the sort of material found in BOA. I'd like to offer a few reasons for a two star review. First, the book is published in a weird format -- 8.8 x 6 x 1.3 inches. I don't know why the publisher produced such a physically small but thick book. Second, this book suffers from too many authors addressing the same issues. BOA is disorganized and internally repetitive. There's no consistent style; some chapters prefer to show memory as a line of characters, others show hex dumps, while others show screen captures. Third, in many sections the writing style is too difficult to follow. Often code is listed for the reader, followed by page upon page of "Analysis." It's tough to match the explanation with the code. Furthermore, many of these Analysis sections have mistakes or look incomplete. Finally, the material itself isn't very compelling. For example, the "introduction to assembly" in chapter 2 is weak, and the book doesn't mention the differences between Intel and AT&T syntax until p 179! One other point -- if you have the Syngress book Writing Security Tools and Exploits (WSTAE), you already have most of BOA. Ch 1 and Ch 2 appears to be the same in both books. Ch 3 in BOA is Ch 5 in WSTAE, 4 in BOA is 6 in WSTAE, 5 in BOA is 7 in WSTAE, and so on. Duplication of chapters was a problem for Syngress in the mid-2000s, unfortunately. Thankfully, Syngress and others are publishing much better offensive security books now. I recommend checking for newer resources. ... show more
Reviewed in the United States on July 28, 2011 by Richard Bejtlich

Can't find a product?

Find it on Amazon first, then paste the link below.
Checking for best price...