• The Art of Exploit Development

  • A Practical Guide to Writing Custom Exploits for Red Teamers
  • By: Josh Luberisse
  • Narrated by: Virtual Voice
  • Length: 3 hrs and 31 mins

Prime logo Prime members: New to Audible?
Get 2 free audiobooks during trial.
Pick 1 audiobook a month from our unmatched collection.
Listen all you want to thousands of included audiobooks, Originals, and podcasts.
Access exclusive sales and deals.
Premium Plus auto-renews for $14.95/mo after 30 days. Cancel anytime.
The Art of Exploit Development  By  cover art

The Art of Exploit Development

By: Josh Luberisse
Narrated by: Virtual Voice
Try for $0.00

$14.95/month after 30 days. Cancel anytime.

Buy for $14.99

Buy for $14.99

Pay using card ending in
By confirming your purchase, you agree to Audible's Conditions of Use and Amazon's Privacy Notice. Taxes where applicable.
Background images

This title uses virtual voice narration

Virtual voice is computer-generated narration for audiobooks

Publisher's summary

In an era where cyber threats loom large, understanding the art of exploit development is essential for any cybersecurity professional. This book is an invaluable guide for those looking to gain a deep understanding of this critical aspect of cybersecurity.

"The Art of Exploit Development: A Practical Guide to Writing Custom Exploits for Red Teamers” delivers an exhaustive, hands-on tour through the entire exploit development process. Crafted by an experienced cybersecurity professional, this resource is not just a theoretical exploration, but a practical guide rooted in real-world applications. It balances technical depth with accessible language, ensuring it’s equally beneficial for newcomers and seasoned professionals.

The book begins with a comprehensive exploration of vulnerability discovery, guiding readers through the various types of vulnerabilities, the tools and techniques for discovering them, and the strategies for testing and validating potential vulnerabilities. From there, it dives deep into the core principles of exploit development, including an exploration of memory management, stack and heap overflows, format string vulnerabilities, and more.

But this guide doesn't stop at the fundamentals. It extends into more advanced areas, discussing how to write shellcode for different platforms and architectures, obfuscate and encode shellcode, bypass modern defensive measures, and exploit vulnerabilities on various platforms. It also provides a thorough look at the use of exploit development tools and frameworks, along with a structured approach to exploit development.

"The Art of Exploit Development" also recognizes the importance of responsible cybersecurity practices. It delves into the ethical considerations of exploit development, outlines secure coding practices, runtime exploit prevention techniques, and discusses effective security testing and penetration testing.

Complete with an extensive glossary and appendices that include reference material, case studies, and further learning resources, this book is a complete package, providing a comprehensive understanding of exploit development.

With "The Art of Exploit Development," you’re not just reading a book—you're enhancing your toolkit, advancing your skillset, and evolving your understanding of one of the most vital aspects of cybersecurity today.

What listeners say about The Art of Exploit Development

Average customer ratings

Reviews - Please select the tabs below to change the source of reviews.