AdvancedOffensiveBinary ExploitationReverse Engineering

The Shellcoder's Handbook

Discovering and Exploiting Security Holes

4 / 5

A foundational text on memory-corruption exploitation across Linux, Windows, Solaris and embedded targets. Pre-modern-mitigations in spirit but still the canonical introduction to the techniques the modern toolchain is built to defeat.

Buy on Amazon

As an Amazon Associate we earn from qualifying purchases. The link above is sponsored.

Published
2007
Publisher
Wiley
Pages
744
Language
English

Read this if

Readers committed to learning binary exploitation seriously, after they've already finished Hacking: The Art of Exploitation and want a multi-platform reference that goes deeper.

Skip this if

Anyone expecting modern (post-2010) mitigations or current heap allocators. The book pre-dates ASLR enforcement, modern heap hardening, CFI, and the entire arc of mitigations the modern toolchain assumes. It teaches the techniques modern systems are built to defeat.

Key takeaways

  • The Windows exploitation chapters are still the best print introduction to the SEH/PE-format-specific mechanics that don't exist in Erickson.
  • The heap chapters teach the conceptual vocabulary (unlinking, frontlinking, magic values, freelists) you need to read modern CTF write-ups, even though the specific allocators have moved on.
  • The "track patches, don't track exploits" chapter is the most underrated piece of vulnerability-research advice in print.

Notes

Read it as Volume 2 to Erickson's Hacking: The Art of Exploitation, knowing both books are pre-modern-mitigations primers, not a current operations manual. Pair with pwn.college and modern CTF write-ups for the post-2010 reality. Keep it on the shelf as the starting reference for any new platform you tackle (it covers Linux, Windows, Solaris, embedded, plus mobile fragments).