Shellcoders Programming Uncovered (Uncovered series)
Chapter 3: Hacking Using GPRS Uncovered
- Table 3.1: Approximate format of the information stored in NAM
- Table 3.2: Main types of memory chips used by manufacturers of cellular phones
Chapter 6: Specifiers Under Control
- Table 6.1: Main functions for formatted input and output with brief descriptions
Chapter 8: Searching for Overflowing Buffers
- Table 8.1: Potentially dangerous functions of the standard C library
Chapter 11: The Technique of Writing Portable Shellcode
- Table 11.1: Different methods of searching for addresses of API functions
Chapter 16: Life Cycle of a Worm
- Table 16.1: Top ten network worms
Chapter 18: Viruses in Scripts
- Table 18.1: Typical indications of virus presence
Chapter 28: Databases Under Attack
- Table 28.1: Main SQL commands
- Table 28.2: Ports tracked by different database servers