Forum Thread: Best Book to Read on Hacking

Hi all

I enjoy reading articles on null-byte, and love the community that comes with it, but I would like some advice on the best books/ebooks to read on the subject of hacking for some more in depth information on how create your own exploits.

I am familiar with Linux, and have a basic knowledge of all the main programming languages, and it would be nice if the book featured practical code examples.

Any help much appreciated, and thanks in advance.

8 Responses

Oh, we've just been talking about it here

Check my question in the forum, you can get good references there.

i also recommend you to read the Introduction of "Practical Reverse Engineering - bruce dang,..." , the authors provide a path to you, in order to be an effective reverse engineer/hacker.

here is the link of the ebook:


Go to the Home, and scroll down three posts.

There will be no single good book to read on the subject; the best way to go about this is to build a collection comprising of the various aspects of hacking. I'm talking books on cryptography, code, even information security philosophy.

Don't limit your learning, take knowledge from everywhere, just make sure it's correct information (another reason why reading multiple books is a good thing to do, you will pick out the false information very quickly this way).


And multiple resources about a same topic, so you can compare different point of views. Make sure to follow the global infosec news too.

Thanks everyone for all your thoughts, both on this thread and the one referred to.

For the sake of people actually reading this, I will advocate real and up to date books on security that I read a few months ago.

First there How to Hack Like a Pornstar by Sparc Flow. A complete breakdown of a real hacking engagement, from phishing to penetrating a bank and stealing their data. It cannot get more real than this. This is THE book if you are looking for a practical step by step process.

Then I would recommend Windows sysinternals and The art of memory forensics. They are not so much about hacking as they are about system fundementals: how do rootkits work, etc. They contain fundemental knowledge about Windows that any hacker should be familiar with.

Then there is the web application handbook, an extensive study of all major web vulnerabilities and how to look for them.

As you read these, you will find hundreds of other resources to check, so I will not spoil the road for you...enjoy !

Share Your Thoughts

  • Hot
  • Active