๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

The shellcoder's handbook discovering and exploiting security holes. - Cover title. - Includes index

โœ Scribed by Anley, Chris


Publisher
Wiley Pub
Year
2007
Tongue
English
Leaves
744
Edition
2nd ed
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or applicationNew material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable" software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and VistaAlso features the first-ever published information on exploiting Cisco's IOS, with content that has never before been exploredThe companion Web site features downloadable co.

โœฆ Table of Contents


About the Authors. Acknowledgments. Introduction to the Second Edition. Part I: Introduction to Exploitation: Linux on x86. Chapter 1: Before You Begin. Chapter 2: Stack Overflows. Chapter 3: Shellcode. Chapter 4: Introduction to Format String Bugs. Chapter 5: Introduction to Heap Overflows. Part II: Other Platforms-Windows, Solaris, OS/X, and Cisco. Chapter 6: The Wild World of Windows. Chapter 7: Windows Shellcode. Chapter 8: Windows Overflows. Chapter 9: Overcoming Filters. Chapter 10: Introduction to Solaris Exploitation. Chapter 11: Advanced Solaris Exploitation. Chapter 12: OS X Shellcode. Chapter 13: Cisco IOS Exploitation. Chapter 14: Protection Mechanisms. Part III: Vulnerability Discovery. Chapter 15: Establishing a Working Environment. Chapter 16: Fault Injection. Chapter 17: The Art of Fuzzing. Chapter 18: Source Code Auditing: Finding Vulnerabilities in C-Based Languages. Chapter 19: Instrumented Investigation: A Manual Approach. Chapter 20: Tracing for Vulnerabilities. Chapter 21: Binary Auditing: Hacking Closed Source Software. Part IV: Advanced Materials. Chapter 22: Alternative Payload Strategies. Chapter 23: Writing Exploits that Work in the Wild. Chapter 24: Attacking Database Software. Chapter 25: Unix Kernel Overflows. Chapter 26: Exploiting Unix Kernel Vulnerabilities. Chapter 27: Hacking the Windows Kernel. Index.

โœฆ Subjects


Computer security;Data protection;Risk assessment


๐Ÿ“œ SIMILAR VOLUMES


The shellcoder's handbook discovering an
โœ Anley, Chris ๐Ÿ“‚ Library ๐Ÿ“… 2007 ๐Ÿ› Wiley Pub ๐ŸŒ English

This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or applicationNew material addresses the many new exploitation techniques that have been discovered since the firs

The shellcoder's handbook discovering an
โœ Chris Anley;John Heasman;Felix FX Lindner;Gerardo Richarte ๐Ÿ“‚ Library ๐Ÿ“… 2007;2011 ๐Ÿ› Wiley Publishing, Inc. ๐ŸŒ English

This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or applicationNew material addresses the many new exploitation techniques that have been discovered since the firs

The shellcoder's handbook discovering an
โœ Chris Anley;John Heasman;Felix FX Lindner;Gerardo Richarte ๐Ÿ“‚ Library ๐Ÿ“… 2007;2011 ๐Ÿ› Wiley Publishing, Inc. ๐ŸŒ English

This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or applicationNew material addresses the many new exploitation techniques that have been discovered since the firs

The Shellcoder's Handbook: Discovering a
โœ Chris Anley, John Heasman, Felix Lindner, Gerardo Richarte ๐Ÿ“‚ Library ๐Ÿ“… 2007 ๐Ÿ› Wiley ๐ŸŒ English

<ul><li>This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application<li>New material addresses the many new exploitation techniques that have been discovered si

The Shellcoder's Handbook: Discovering a
โœ Heasman, John; Richarte, Gerardo; Anley, Chris; Lindner, Felix ๐Ÿ“‚ Library ๐Ÿ“… 2013 ๐Ÿ› Wiley ๐ŸŒ English

UlliThis much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or applicationliNew material addresses the many new exploitation techniques that have been discovered since th

The Shellcoder's Handbook: Discovering a
โœ Chris Anley, John Heasman, Felix Lindner, Gerardo Richarte ๐Ÿ“‚ Library ๐Ÿ“… 2007 ๐Ÿ› Wiley ๐ŸŒ English

This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application New material addresses the many new exploitation techniques that have been discovered since the fi