---
product_id: 48012806
title: "Hacking: The Art of Exploitation, 2nd Edition"
price: "372 zł"
currency: PLN
in_stock: true
reviews_count: 13
url: https://www.desertcart.pl/products/48012806-hacking-the-art-of-exploitation-2nd-edition
store_origin: PL
region: Poland
---

# Hacking: The Art of Exploitation, 2nd Edition

**Price:** 372 zł
**Availability:** ✅ In Stock

## Quick Answers

- **What is this?** Hacking: The Art of Exploitation, 2nd Edition
- **How much does it cost?** 372 zł with free shipping
- **Is it available?** Yes, in stock and ready to ship
- **Where can I buy it?** [www.desertcart.pl](https://www.desertcart.pl/products/48012806-hacking-the-art-of-exploitation-2nd-edition)

## Best For

- Customers looking for quality international products

## Why This Product

- Free international shipping included
- Worldwide delivery with tracking
- 15-day hassle-free returns

## Description

Review: Landmark on the genre - This book is like no other book in its field/segment/genre whatever you want to call it, this book won't "dummy" guide you through already made up stuff, that will turn you into a BOT. This book lays ground and rules to think and develop your skills outside of what you have been taught, it teaches you in a way that will let you evolve further without the book, and in no time you will be developing your own exploits, this book would be only worth for its programming side, it is that good. It comes with a a linux distro with some tools you can use, I have decided to use my own linux distro, but further in the book, it is advised to use the one provided by the book, because, some exploits have already been patched in later distributions, and all of the exploits and tools work on the one provided by the book. Also the package was adequate and it came in excellent condition. Absolutely recommended, although not recommended for someone with very little computer knowledge, or someone that have never written a line of code before, if that is your case this will be very difficult to pick up.
Review: Very interesting - Dont be expecting to hack your mates facebook account, facebook has very advanced security, this book will show you the kind of exploits like the recnt heartbleed vulnerability, it realy gets down to the bits and bytes and focuses on C and Assembly language. Extremely interesting and the information will certainly aid you as a penetration tester, youll learn all sorts or techniques to take advantage of overlooked 'mistakes' in the code written by apparently 'good' programmers, this teaches you to be better than them, it teaches you that a program that is executed that was written in C does no contain IF statements and FOR statements and all that, it contains 1101011101101, or translation to assembly, things like mov ecx, ebx add eax, ecx sub edx, eax ... you get the gist, it doesnt execute as C, but as binary code, the key difference between a programmer and a HACKER!!!

## Technical Specifications

| Specification | Value |
|---------------|-------|
| Best Sellers Rank | 24,657 in Books ( See Top 100 in Books ) 15 in Computer Information Systems 58 in Web Administration 74 in Computing & Internet Programming |
| Customer reviews | 4.6 4.6 out of 5 stars (1,516) |
| Dimensions  | 18.11 x 2.54 x 23.5 cm |
| Edition  | 2nd ed. |
| ISBN-10  | 1593271441 |
| ISBN-13  | 978-1593271442 |
| Item weight  | 805 g |
| Language  | English |
| Print length  | 480 pages |
| Publication date  | 28 Jan. 2008 |
| Publisher  | No Starch Press |

## Images

![Hacking: The Art of Exploitation, 2nd Edition - Image 1](https://m.media-amazon.com/images/I/81hKQ74+fRL.jpg)

## Customer Reviews

### ⭐⭐⭐⭐⭐ Landmark on the genre
*by G***A on 30 March 2013*

This book is like no other book in its field/segment/genre whatever you want to call it, this book won't "dummy" guide you through already made up stuff, that will turn you into a BOT. This book lays ground and rules to think and develop your skills outside of what you have been taught, it teaches you in a way that will let you evolve further without the book, and in no time you will be developing your own exploits, this book would be only worth for its programming side, it is that good. It comes with a a linux distro with some tools you can use, I have decided to use my own linux distro, but further in the book, it is advised to use the one provided by the book, because, some exploits have already been patched in later distributions, and all of the exploits and tools work on the one provided by the book. Also the package was adequate and it came in excellent condition. Absolutely recommended, although not recommended for someone with very little computer knowledge, or someone that have never written a line of code before, if that is your case this will be very difficult to pick up.

### ⭐⭐⭐⭐⭐ Very interesting
*by D***N on 2 May 2014*

Dont be expecting to hack your mates facebook account, facebook has very advanced security, this book will show you the kind of exploits like the recnt heartbleed vulnerability, it realy gets down to the bits and bytes and focuses on C and Assembly language. Extremely interesting and the information will certainly aid you as a penetration tester, youll learn all sorts or techniques to take advantage of overlooked 'mistakes' in the code written by apparently 'good' programmers, this teaches you to be better than them, it teaches you that a program that is executed that was written in C does no contain IF statements and FOR statements and all that, it contains 1101011101101, or translation to assembly, things like mov ecx, ebx add eax, ecx sub edx, eax ... you get the gist, it doesnt execute as C, but as binary code, the key difference between a programmer and a HACKER!!!

### ⭐⭐⭐⭐⭐ Excellent introduction
*by J***N on 21 February 2021*

The techniques themseves and the systems at which they are targeted are (largely) long gone, but it is a great introduction to the basic techniques. For those worried about the fact that the CD is out of date, I found it was straightforward to get hold online and upload the required software (VirtualBox and the book code) at no cost.

## Frequently Bought Together

- Hacking: The Art of Exploitation, 2nd Edition
- Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali
- Black Hat Python, 2nd Edition: Python Programming for Hackers and Pentesters

---

## Why Shop on Desertcart?

- 🛒 **Trusted by 1.3+ Million Shoppers** — Serving international shoppers since 2016
- 🌍 **Shop Globally** — Access 737+ million products across 21 categories
- 💰 **No Hidden Fees** — All customs, duties, and taxes included in the price
- 🔄 **15-Day Free Returns** — Hassle-free returns (30 days for PRO members)
- 🔒 **Secure Payments** — Trusted payment options with buyer protection
- ⭐ **TrustPilot Rated 4.5/5** — Based on 8,000+ happy customer reviews

**Shop now:** [https://www.desertcart.pl/products/48012806-hacking-the-art-of-exploitation-2nd-edition](https://www.desertcart.pl/products/48012806-hacking-the-art-of-exploitation-2nd-edition)

---

*Product available on Desertcart Poland*
*Store origin: PL*
*Last updated: 2026-04-24*