𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Exploiting software how to break code

✍ Scribed by Greg Hoglund, Gary McGraw


Book ID
127435289
Publisher
Addison-Wesley Professional
Year
2004
Tongue
English
Weight
8 MB
Category
Library
ISBN
0201786958

No coin nor oath required. For personal study only.

✦ Synopsis


Computing hardware would have no value without software; software tells hardware what to do. Software therefore must have special authority within computing systems. All computer security problems stem from that fact, and Exploiting Software: How to Break Code shows you how to design your software so it's as resistant as possible to attack. Sure, everything's phrased in offensive terms (as instructions for the attacker, that is), but this book has at least as much value in showing designers what sorts of attacks their software will face (the book could serve as a checklist for part of a pre-release testing regimen).
Plus, the clever reverse-engineering strategies that Greg Hoglund and Gary McGraw teach will be useful in many legitimate software projects. Consider this a recipe book for mayhem, or a compendium of lessons learned by others. It depends on your situation.

PHP programmers will take issue with the authors' blanket assessment of their language ("PHP is a study in bad security"), much of which seems based on older versions of the language that had some risky default behaviors--but those programmers will also double-check their servers' register_globals settings. Users of insufficiently patched Microsoft and Oracle products will worry about the detailed attack instructions this book contains. Responsible programmers and administrators will appreciate what amounts to documentation of attackers' rootkits for various operating systems, and will raise their eyebrows at the techniques for writing malicious code to unused EEPROM chips in target systems. --David Wall

Topics covered: How to make software fail, either by doing something it wasn't designed to do, or by denying its use to its rightful users. Techniques--including reverse engineering, buffer overflow, and particularly provision of unexpected input--are covered along with the tools needed to carry them out. A section on hardware viruses is detailed and frightening.

✦ Subjects


Кибербезопасность и киберпреступления


📜 SIMILAR VOLUMES


How to break into politics
✍ Edison, Charles 📂 Article 📅 1947 🏛 Wiley (John Wiley & Sons) ⚖ 456 KB
cover
✍ Ruthanna Witter 📂 Fiction 📅 2018 🏛 Clovercroft Publishing 🌐 English ⚖ 770 KB

"They weren't here to steal. They were here to kill me... worse yet, I had the dreadful sense that this wasn't the end. It was the beginning of something worse. Something much worse." Working as an undercover hacker for the FBI, Amber Gibson lives her life from one daring encounter to another; she t

cover
✍ Denis, Daire St 📂 Fiction 📅 2012 🏛 Daire St. Denis 🌐 English ⚖ 42 KB

Meet Tessa Savage. With no fixed address, Tessa travels the world for business...and in search of pleasure. From the Rocky Mountains to the Greek Islands, there's no place Tessa won't explore and very few sexual positions she won't try. At the end of the day, Tessa believes that love is love, no

How to break bad news
✍ Amanda Billson; Jenny Tyrrell 📂 Article 📅 2003 🏛 Elsevier Science 🌐 English ⚖ 83 KB