𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Hacker Debugging Uncovered (Uncovered Series)

✍ Scribed by Kris Kaspersky


Publisher
A-List Publishing
Year
2005
Tongue
English
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Tips for the practical use of debuggers, such as NuMega SoftIce, Microsoft Visual Studio Debugger, and Microsoft Kernel Debugger, with minimum binding to a specific environment are disclosed in this debugger guide. How debuggers operate and how to overcome obstacles and repair debuggers is demonstrated. Programmers will learn how to look at what is inside a computer system, how to reconstruct the operating algorithm of a program distributed without source code, how to modify the program, and how to debug drivers. The use of debugging applications and drivers in Windows and Unix operating systems on Intel Pentium/DEC Alpha-based processors is also detailed.


πŸ“œ SIMILAR VOLUMES


Hacker Disassembling Uncovered
✍ Kris Kaspersky πŸ“‚ Library πŸ“… 2003 πŸ› A-List Publishing 🌐 English

Text shows how to analyze programs without its source code, using a debugger and a disassembler. Covers hacking methods including virtual functions, local and global variables, branching, loops, objects and their hierarchy, and mathematical operators. For intermediate to advanced level programmers.

Hacker Linux Uncovered
✍ Michael Flenov πŸ“‚ Library πŸ“… 2005 πŸ› A-List Publishing 🌐 English

Concentrating on Linux installation, tuning, and administration, this guide to protecting systems from security attacks demonstrates how to install Linux so that it is tuned for the highest security and best performance, how to scan the network and encrypt the traffic for securing all private traffi

BIOS Disassembly Ninjutsu Uncovered (Unc
✍ Darmawan Salihun πŸ“‚ Library πŸ“… 2006 πŸ› A-List Publishing 🌐 English

Explaining security vulnerabilities,Β possible exploitation scenarios, and prevention in a systematic manner, this guide to BIOS exploitationΒ describes the reverse-engineering techniques used to gather information from BIOS and expansion ROMs. SMBIOS/DMI exploitation techniquesβ€”including BIOS rootkit

Hacker Web Exploition Uncovered
✍ Marsel Nizamutdinov πŸ“‚ Library πŸ“… 2005 πŸ› Unknown 🌐 English

A description and analysis of the vulnerabilities caused by programming errors in Web applications, this book is written from both from the attacker's and security specialist's perspective. Covered is detecting, investigating, exploiting, and eliminating vulnerabilities in Web applications as well a