• Home
  • About 404TS
  • Contact

404 Tech Support

Where IT Help is Found

  • Articles
    • Code
    • Entertainment
    • Going Green
    • Hardware, Gadgets, and Products
    • Management
    • Network
    • News
    • Operating Systems
    • Security and Privacy
    • Software
    • System Administration
    • Talking Points
    • Tech Solutions
    • Web
    • Webmaster
  • Reviews
  • Media
    • Infographics
    • Videos
  • Tech Events
  • Tools
    • How do I find my IP address?
    • Browser and plugin tests
  • Get a Technical Consultation
You are here: Home / Articles / Code / Book Review: Exploiting Software – How to Break Code

Book Review: Exploiting Software – How to Break Code

2009-02-03 by Jason

Exploiting Software – How to Break Code by Greg Hoglund and Gary McGraw is an earlier work by the same authors of the previously reviewed Rootkits. This one dives into the security risks for poorly coded software. Copyright 2004, the book provides lots of examples of exploitable code from wrongfully used functions and improper coding methods five years ago. Despite its age (5 years can be significant in the technology industry), the relevance is still just as potent for Exploiting Software.

The book contains chapters dedicated to:

  1. Software–The Root of the Problem
  2. Attack Patterns
  3. Reverse Engineering and Program Understanding
  4. Exploiting Server Software
  5. Exploiting Client Software
  6. Crafting (Malicious) Input
  7. Buffer Overflow
  8. Rootkits

Similar to Rootkits, there is a disclaimer about who this information is intended for. Some might fear that publishing this information puts it too readily into the hands of those who do malicious things but the book insists that they already know this information and they are letting the general public in on the secret. This book is intended for defenders and developers to understand how malicious users are viewing their programs.  It contains a lot of good basic rules and explanations about best practices and things to keep in mind when developing an application.

Exploiting Software seems less technical than Rootkits and does a good job of really bringing the relevance of the topic around with plenty of examples. The book also covers lots of tools that can be used to protect against exploits (during the development phase) or debug an application to evaluate if you should trust it on your network. Everything from packet sniffing, port scanning, and buffer overflows are covered in this book with advice on preventing or identifying if an application is vulnerable along with what to watch for if you suspect malicious traffic across your network through attack patterns.

Filed Under: Code, Reviews, Security and Privacy

Trending

  • $99 Samsung Gear VR and other announcements from Oculus Connect 2
    In Entertainment, Hardware, Gadgets, and Products
  • Dropbox Terms of Service Updated Twice. Are Cautious Users Switching Backup and Sync Services?
    In News, Security and Privacy, Software
  • Microsoft Launches The Xbox Kinect SDK Beta
    In Code, Entertainment, Hardware, Gadgets, and Products

Latest Media Posts

Find Out Where To Download SNES ROMs

Find Out Where To Download SNES ROMs

Multifunctional Video Conversion Tools – Wondershare Video Converter

Multifunctional Video Conversion Tools – Wondershare Video Converter

  • Popular
  • Latest
  • Today Week Month All
  • How to ‘Unblock’ multiple files at a time with PowerShell How to 'Unblock' multiple files at a time with PowerShell
  • Increase IIS Private Memory Limit to improve WSUS availability Increase IIS Private Memory Limit to improve WSUS availability
  • SOLVED: “This modification is not allowed because the selection is locked.” SOLVED: "This modification is not allowed because the selection is locked."
  • Creating and editing views in phpMyAdmin Creating and editing views in phpMyAdmin
  • Configure Outlook to recurring appointments for the last weekday of the month Configure Outlook to recurring appointments for the last weekday of the month
  • 3d rendering circuit cloud for cloud computing technology Build and Deploy a Modern Web 3.0 Blockchain App in 2022
  • Telecom Application Development: When to Outsource Telecom Application Development: When to Outsource
  • Printer printing document wirelessly from mobile phone or smartphone wifi connection vector flat cartoon illustration, file air print on fax or ink jet via cellphone bluetooth modern design Why Your Business Needs Online Fax Services In 2022
  • 6 Best Ways to Protect Your Business Account 6 Best Ways to Protect Your Business Account
  • How to download videos from Instagram How to download videos from Instagram
Ajax spinner

Elevator Pitch

404 Tech Support documents solutions to IT problems, shares worthwhile software and websites, and reviews hardware, consumer electronics, and technology-related books.

Subscribe to 404TS articles by email.

Recent Posts

  • Build and Deploy a Modern Web 3.0 Blockchain App in 2022
  • Telecom Application Development: When to Outsource
  • Why Your Business Needs Online Fax Services In 2022

Search

FTC Disclaimer

404TechSupport is an Amazon.com affiliate; when you click on an Amazon link from 404TS, the site gets a cut of the proceeds from whatever you buy. This site also uses Skimlinks for smart monetization of other affiliate links.
Use of this site requires displaying and viewing ads as they are presented.

Copyright © 2022 · Magazine Pro Theme on Genesis Framework · WordPress · Log in