xorl %eax, %eax

Book: Chained Exploits

with 2 comments

I have just finished reading this book and here is my review. Just FYI, this is my first time reading this book so I might have missed something.


Title: Chained Exploits: Advanced Hacking Attacks from Start to Finish
Authors: Andrew Whitaker, Keatron Evans and Jack B. Voth

Well, to begin with this book has almost nothing to do with practical exploitation. Don’t be fooled from the title. Its content is almost identical to those of “Stealing the Network” series of Syngress if you have read any. It includes eight different realistic scenarios separated in eight different chapters. All of them feature a “hacker” named Phoenix who hacks only for personal profit, in most scenarios that profit is money. The “chained exploits” in the title means the steps that an attacker has/can make to compromise a target. I wouldn’t recommend this book to anyone who wants something serious about exploitation or pen-testing. Nevertheless, it is a nice easy-reading book for the beach or something similar. If you want a security oriented novel and you have already read “Stealing the Network” series you can go for this. Don’t expect to find any advanced exploitation or even a single line of any programming language in there. It is just stories and Phoenix seems to be always using ready-to-use, public utilities with not even the slightest customization.

Written by xorl

August 6, 2009 at 11:46

Posted in books

2 Responses

Subscribe to comments with RSS.

  1. Dissecting the Hack: The Forbidden Network
    by Jayson E Street
    is coming out soon and supposed to be in a similar style. Personally I like it. Makes an otherwise dry read more interesting.


    August 7, 2009 at 06:38

  2. This comes as a surpise to me because Addison-Wesley has a lot of good technical books like The Art of Software Security Assessment and the Fuzzing book. I don’t think mixing the titles this way is a good thing. They should use a different cover style for this kind of book.

    Sébastien Duquette

    August 12, 2009 at 22:03

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s