Book: Chained Exploits
I have just finished reading this book and here is my review. Just FYI, this is my first time reading this book so I might have missed something.
Title: Chained Exploits: Advanced Hacking Attacks from Start to Finish
Authors: Andrew Whitaker, Keatron Evans and Jack B. Voth
Well, to begin with this book has almost nothing to do with practical exploitation. Don’t be fooled from the title. Its content is almost identical to those of “Stealing the Network” series of Syngress if you have read any. It includes eight different realistic scenarios separated in eight different chapters. All of them feature a “hacker” named Phoenix who hacks only for personal profit, in most scenarios that profit is money. The “chained exploits” in the title means the steps that an attacker has/can make to compromise a target. I wouldn’t recommend this book to anyone who wants something serious about exploitation or pen-testing. Nevertheless, it is a nice easy-reading book for the beach or something similar. If you want a security oriented novel and you have already read “Stealing the Network” series you can go for this. Don’t expect to find any advanced exploitation or even a single line of any programming language in there. It is just stories and Phoenix seems to be always using ready-to-use, public utilities with not even the slightest customization.