views:

112

answers:

2

I've just read "Hacking: The Art of Exploitation" and I'm interested in this subject. The thing is, this book seems irrelevant to hacking now that OSes have non-executable stacks, canary values on the stack, etc.

So, how what methods are used now to exploit computers?

Edit: Sorry, I wasn't clear. I was wondering about how hackers attack computer programs, not websites

+2  A: 

Off the top of my head (and the inspiration behind my user name) are SQL injection attacks.

I have inherited a number of sites I have had to clean up due to ad-hoc queries not properly scrubbing their data.

LittleBobbyTables
You also have cross-site scripting in the web world, which is generally more targetted at the end user rather than the system.
Anthony Pegram
If you've got a lot of old sites and don't have time to clean them all up, you might want to invest in a an application firewall (http://en.wikipedia.org/wiki/Application_firewall).
Gert G
@Gert G - Thanks, I'll definitely keep that in mind!
LittleBobbyTables
A: 

When it comes to Web attacks, the OWASP Top 10 for 2010 (here's the PDF) will tell you which attacks you ought to protect yourself against.

Gert G