The Shellcoder’s Handbook

The Shellcoder’s Handbook
-0 %
Der Artikel wird am Ende des Bestellprozesses zum Download zur Verfügung gestellt.
Discovering and Exploiting Security Holes
 E-Book
Sofort lieferbar | Lieferzeit: Sofort lieferbar

Unser bisheriger Preis:ORGPRICE: 41,26 €

Jetzt 35,99 €* E-Book

Artikel-Nr:
9781118079126
Veröffentl:
2011
Einband:
E-Book
Seiten:
752
Autor:
Chris Anley
eBook Typ:
EPUB
eBook Format:
Reflowable E-Book
Kopierschutz:
Adobe DRM [Hard-DRM]
Sprache:
Englisch
Beschreibung:

This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application New material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "e;unbreakable"e; software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and Vista Also features the first-ever published information on exploiting Cisco's IOS, with content that has never before been explored The companion Web site features downloadable code files
* This much-anticipated revision, written by the ultimate groupof top security experts in the world, features 40 percent newcontent on how to find security holes in any operating system orapplication* New material addresses the many new exploitation techniquesthat have been discovered since the first edition, includingattacking "unbreakable" software packages such as McAfee'sEntercept, Mac OS X, XP, Office 2003, and Vista* Also features the first-ever published information onexploiting Cisco's IOS, with content that has never before beenexplored* The companion Web site features downloadable code files
About the Authors.Acknowledgments.Introduction to the Second Edition.Part I: Introduction to Exploitation: Linux on x86.Chapter 1: Before You Begin.Chapter 2: Stack Overflows.Chapter 3: Shellcode.Chapter 4: Introduction to Format String Bugs.Chapter 5: Introduction to Heap Overflows.Part II: Other Platforms--Windows, Solaris, OS/X, andCisco.Chapter 6: The Wild World of Windows.Chapter 7: Windows Shellcode.Chapter 8: Windows Overflows.Chapter 9: Overcoming Filters.Chapter 10: Introduction to Solaris Exploitation.Chapter 11: Advanced Solaris Exploitation.Chapter 12: OS X Shellcode.Chapter 13: Cisco IOS Exploitation.Chapter 14: Protection Mechanisms.Part III: Vulnerability Discovery.Chapter 15: Establishing a Working Environment.Chapter 16: Fault Injection.Chapter 17: The Art of Fuzzing.Chapter 18: Source Code Auditing: Finding Vulnerabilities inC-Based Languages.Chapter 19: Instrumented Investigation: A Manual Approach.Chapter 20: Tracing for Vulnerabilities.Chapter 21: Binary Auditing: Hacking Closed Source Software.Part IV: Advanced Materials.Chapter 22: Alternative Payload Strategies.Chapter 23: Writing Exploits that Work in the Wild.Chapter 24: Attacking Database Software.Chapter 25: Unix Kernel Overflows.Chapter 26: Exploiting Unix Kernel Vulnerabilities.Chapter 27: Hacking the Windows Kernel.Index.

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.